5,182,770 A * 1/1993 Medveczky et al 705/56
5,790,783 A * 8/1998 Leeetal 726/20
6,134,659 A * 10/2000 Sprong et al 713/190
6,243,468 Bl * 6/2001 Pearceetal 380/255
6,678,665 Bl* 1/2004 Benson etal 705/51
2004/0107368 Al* 6/2004 Colvin 713/202
FOREIGN PATENT DOCUMENTS CA 2310032 Al * 12/2001
"Inside Windows Product Activation" © 2001 Fully Licensed GmbH.
Coutinho, S.C., The Mathematics of Ciphers, Chapter 7, Systems of
Congruences, Published by A K Paters Ltd., pp. 107-119 (1999).*
Crandall et al. Prime Numbers, Chapter 8, The Ubiquity of Prime
Numbers, Published by Springer-Verlag, pp. 351-404 (2001).*
Schneier, Bruce. Applied Cryptography, Second Edition, Published
by John Wiley & Sons, Chapter 11, pp. 259-260 (1996).*
* cited by examiner
Primary Examiner—Kimyen Vu
Assistant Examiner—Thomas Gyorfi
(74) Attorney, Agent, or Firm—Merchant & Gould, PC.
Systems and methods for binding a secret to a computer system are disclosed. Systems and methods for generating a strong hardware identification (SHWID) for a given computer system are also disclosed. The strong hardware identification (SHWID) is coupled to a bound secret. The strong hardware identification (SHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system.
7 Claims, 7 Drawing Sheets