Patents by Inventor Michael Zunke

Michael Zunke has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20090172631
    Abstract: What is provided is a method of adding a functionality to an executable first module of a program package, wherein the executable first module, during execution, provides an internal function or utilizes an internal function of an executable second module of the program package; wherein, when the first module is not executed, an externally visible reference pointing to said internal function is determined, auxiliary code is added to the first module and a redirection is permanently provided in the first module as a function of the reference thus determined such that a modified executable first module is present, wherein, when the internal function is requested during execution, a redirection is made to the auxiliary code which causes the functionality to be provided during execution.
    Type: Application
    Filed: May 5, 2006
    Publication date: July 2, 2009
    Applicant: ALADDIN EUROPE GMBH
    Inventors: Michael Zunke, Andreas Lange
  • Publication number: 20090006865
    Abstract: An efficient symmetrical-cryptographic method for using a fast but insecure host to perform encryption/decryption based on a secret key in a secure, but slow hardware token, such as a smartcard or similar device, without revealing the secret key to the host, and such that the ciphertext and plaintext are exactly the same size. The present method is suitable for use in Digital Rights Management and Software Rights Management applications which require precise interchangeability of ciphertext and plaintext in pre-allocated areas of data storage.
    Type: Application
    Filed: June 28, 2007
    Publication date: January 1, 2009
    Inventors: Michael Zunke, Yanki Margalit, Dani Margalit
  • Publication number: 20080312943
    Abstract: A method and system for issuing and redeeming digital coupons for requesting and granting modifications of licensed computer data products. Modifications include versions and configurations of the licensed data product as well as licensing issues related thereto. A product licensor issues authenticated coupons to customer organizations which utilize the licensed data products. The coupons are not necessarily specific to any particular computer or device, data product, version, license or configuration. Coupons can thereby be easily distributed to users within the organization. A user fills out the coupon with a request for the desired modifications and sends the coupon to the licensor, who fulfills the request by sending modification installation code directly to the user, thereby avoiding unnecessary overhead burdens on the organization. Digital coupons may be used in conjunction with external hardware devices (“dongles”) or with internal software licensing modules.
    Type: Application
    Filed: June 17, 2007
    Publication date: December 18, 2008
    Inventors: Michael Zunke, Yanki Margalit, Dani Margalit
  • Publication number: 20080226065
    Abstract: There is provided a method for secure communication between a secure hardware device connected to a computer and said computer, said method comprising the steps of: a) defining a group of secret sets including at least two secret sets, each of which includes a secret and an assigned identifier, b) storing the group of secret sets in the secure hardware device in such a manner that the secure hardware device can retrieve the secret of any of said secret sets from the assigned identifier, c) selecting a first one of said secret sets and storing said selected first secret set in a first application, d) delivering the first application which includes the first secret set to a user who executes the first application on a computer being connected to the secure hardware device, e) wherein the first application defines a first session key and generates first session key indication data based on the first secret set, said first session key indication data including the identifier of the first secret set as the only e
    Type: Application
    Filed: March 13, 2007
    Publication date: September 18, 2008
    Applicant: Aladdin Europe GmbH
    Inventor: Michael Zunke
  • Publication number: 20080228649
    Abstract: There is provided a method for obtaining a protected application protected against unauthorized use by implementing a predetermined licensing model, said method comprising the steps of: adding a software product to said application, said software product providing the possibility of defining one of several different manners of realizing a functionality to be used for implementing the predetermined licensing model, and defining one of the several manners of realizing the functionality and an apparatus for obtaining a protected application protected against unauthorized use by implementing a predetermined licensing model, which apparatus adds a software product to said application, said software product providing the possibility of defining one of several different manners of realizing a functionality to be used for implementing the predetermined licensing model, and defines one of the several manners of realizing the functionality.
    Type: Application
    Filed: March 13, 2007
    Publication date: September 18, 2008
    Applicant: ALADDIN EUROPE GMBH
    Inventor: Michael Zunke
  • Publication number: 20080209558
    Abstract: A method and system of computer program modules for extending the cover time of protection for a licensed software product, by increasing the difficulty and time required for an attacker to produce a workable cracked version of the program. When an attack is detected, critical information about the effectiveness of the attack are withheld from the attacker by simulating the behavior of a cracked program, thereby inducing the attacker to prematurely consider the attack successful. Latent license enforcement features are provided, whose activation is suspended until predefined environmental conditions are met.
    Type: Application
    Filed: February 22, 2007
    Publication date: August 28, 2008
    Applicant: Aladdin Knowledge Systems
    Inventors: Michael Zunke, Yanki Margalit, Dany Margalit
  • Publication number: 20080209559
    Abstract: A method for determining if a software program having a protective envelope has been cracked, and signaling an indication thereof. A direct determination is made of whether the protective envelope is intact or has been compromised by an attack, without requiring a license violation to occur. Executable code in the protective envelope generates an envelope confirmation which is validated by executable code in the program itself. Any disabling or separation of the envelope from the program will be detectable by the program at validation time. Provisions are made for a secure envelope confirmation, the use of arguments as input to the confirmation generation, and for incorporating information related to the computer and user to facilitate identifying the attacker. Signaled indications can include network messaging to alert the licensor that the program has been cracked.
    Type: Application
    Filed: February 22, 2007
    Publication date: August 28, 2008
    Applicant: Aladdin Knowledge Systems
    Inventors: Michael Zunke, Yanki Margalit, Dany Margalit
  • Publication number: 20080208754
    Abstract: A method for issuing and updating a software program license for a computer, with a unique identifier data object embedded in the computer and referenced by the license. The unique identifier may also be used with a conventional computer fingerprint. The software program does not run on a computer without a license that references the unique identifier. The license is issued via a server over a network (such as the Internet) and must be regularly updated by the server. When updating, the present unique identifier is sent to the server, to verify that the unique identifier is the latest unique identifier issued for that license. If an unauthorized copy is made for operation on an unlicensed computer, such as by cloning the licensed computer, this is detected when the second computer is updated, because the unique identifier sent with the update request is no longer current.
    Type: Application
    Filed: February 22, 2007
    Publication date: August 28, 2008
    Applicant: Aladdin Knowledge Systems
    Inventors: Michael Zunke, Yanki Margalit, Dany Margalit
  • Publication number: 20070143630
    Abstract: What is provided is a computer-implemented method for protection of a program comprising a functional block, wherein the functional block is encrypted, additional code is added to the program and a protected program is thus generated, which is executable only in the presence of a predetermined license in a computer system which comprises a working memory, into which the protected program is loaded during execution, and a protection module for protection against unauthorized execution of the protected program, wherein, if the encrypted functional block is to be executed during execution of the protected program, the additional code is executed and, if a license is present, said additional code, together with the protection module, a) causes decryption of the functional block such that the functional block is present in the working memory of the computer system in decrypted form; b) allows execution of the decrypted functional block, and c) upon completion of execution of the decrypted functional block, causes
    Type: Application
    Filed: December 17, 2006
    Publication date: June 21, 2007
    Applicant: Aladdin Knowledge Systems (Deutschland) GmbH
    Inventor: MICHAEL ZUNKE
  • Patent number: 7225336
    Abstract: A system for giving run authorization to a program installed on a computer, comprising a checking unit having a receiving device and, at least partially, forms part of the computer or is linked with the latter via a data link, and a device which is transportable separately from the computer and from the checking unit and connectable to the receiving device within a predetermined distance therefrom by a wireless link through which an identification code contained in said device is transmitted to the checking unit, said checking unit comparing the transmitted identification code with a reference code and giving the run authorization, if both codes are identical.
    Type: Grant
    Filed: December 10, 2001
    Date of Patent: May 29, 2007
    Assignee: Aladdin Europe GmbH
    Inventor: Michael Zunke
  • Patent number: 7191325
    Abstract: A method of operating a computer system on which an application is installed comprises the steps of: verifying whether a predetermined run authorization for the application is present, and, in the absence of said predetermined run authorization, decreasing the speed of execution of the application on the computer system as compared to the speed of execution of the application in the presence of the predetermined run authorization.
    Type: Grant
    Filed: July 31, 2003
    Date of Patent: March 13, 2007
    Assignee: Aladdin Knowledge Systems (Deutschland) GmbH
    Inventor: Michael Zunke
  • Publication number: 20060137016
    Abstract: The present invention is directed to a method for preventing unauthorized use of a software application which is protected by a key device, the method comprising the steps of: testing the application for unauthorized use; if the testing finds the unauthorized use of the application: indicating the unauthorized use of the application and blocking the key device. According to one embodiment of the invention, indicating unauthorized use of the application may be carried out by: upon invoking an operation of the software application (e.g. executing a software application, executing the software application, executing a process, performing a task, performing a function, and so forth), setting a flag; upon terminating the operation, clearing the flag; upon re-invoking the operation, if the flag is set, indicating that the software application has been debugged; thereby indicating unauthorized use of the software application.
    Type: Application
    Filed: April 6, 2005
    Publication date: June 22, 2006
    Inventors: Dany Margalit, Yanki Margalit, Michael Zunke
  • Publication number: 20040073517
    Abstract: A method for determining a licensing policy of using a digital product by a group of users, comprises conducting a tolerant licensing policy during a trial period, monitoring usage parameter(s) of the digital product during the trial period, examining the performance of the licensing policy according to samples of the monitored parameter(s), and determining a new licensing policy according to the examination. Optionally, the newly determined licensing policy can be monitored during a subsequent period, after which the licensing policy can be examined and adjusted accordingly. According to one embodiment of the invention, the group of users is determined manually. According to another embodiment of the invention, the group of users is determined automatically, by e.g. the N users that have used the product in general or for a predefined period.
    Type: Application
    Filed: July 7, 2003
    Publication date: April 15, 2004
    Inventors: Michael Zunke, Yanki Margalit, Dany Margalit
  • Publication number: 20040025049
    Abstract: A method of operating a computer system on which an application is installed comprises the steps of:
    Type: Application
    Filed: July 31, 2003
    Publication date: February 5, 2004
    Inventor: Michael Zunke
  • Publication number: 20030191961
    Abstract: A method of operating a computer system comprises the following steps:
    Type: Application
    Filed: April 8, 2003
    Publication date: October 9, 2003
    Inventor: Michael Zunke
  • Publication number: 20030115075
    Abstract: A system and method for use in a communication network and including at least one first device, at least one second device and a communication quality ameliorator. The communication quality ameliorator includes a first interface providing first interaction with said at least one first device and a second interface providing second interaction with said at least one second device, said second interaction including at least BLUETOOTH® communication.
    Type: Application
    Filed: December 19, 2001
    Publication date: June 19, 2003
    Applicant: ALADDIN KNOWLEDGE SYSTEMS LTD.
    Inventor: Michael Zunke
  • Publication number: 20030110417
    Abstract: A method of executing a program (2) on a computer (3) comprising a main memory (6) divided into pages comprises the steps of:
    Type: Application
    Filed: March 21, 2002
    Publication date: June 12, 2003
    Inventors: Adrian Jascau, Horatiu Guja, Michael Zunke
  • Publication number: 20020197528
    Abstract: A method for extending an application, which is to be installed using an installation program, by a function, wherein the application to be installed comprises a component to be installed by the installation program, the component being stored in a program archive, and wherein the installation program, together with the program archive, forms a software package, comprises carrying out the following steps: adding to the software package a version of the component to be installed, the version being extended by the function, and an auxiliary code without removing the component from the program archive, and modifying the installation program such that its execution leads to the execution of the auxiliary code. The auxiliary code causes the extended component to be installed instead of the component.
    Type: Application
    Filed: September 19, 2001
    Publication date: December 26, 2002
    Applicant: Aladdin Knowledge Systems GmbH & Co. KG
    Inventor: Michael Zunke
  • Publication number: 20020141586
    Abstract: A device and method capable of communicating with a communication network via a Bluetooth communication protocol, wherein the device includes at least one authentication functionality, at least part of at least one of which is operative to communicate authentication information via the Bluetooth communication protocol.
    Type: Application
    Filed: March 29, 2001
    Publication date: October 3, 2002
    Applicant: ALADDIN KNOWLEDGE SYSTEMS LTD.
    Inventors: Yanki Margalit, Dany Margalit, Michael Zunke
  • Publication number: 20020087873
    Abstract: A system for giving run authorization to a program installed on a computer, comprising a checking unit having a receiving device and, at least partially, forms part of the computer or is linked with the latter via a data link, and a device which is transportable separately from the computer and from the checking unit and connectable to the receiving device within a predetermined distance therefrom by a wireless link through which an identification code contained in said device is transmitted to the checking unit, said checking unit comparing the transmitted identification code with a reference code and giving the run authorization, if both codes are identical.
    Type: Application
    Filed: December 10, 2001
    Publication date: July 4, 2002
    Inventor: Michael Zunke