Patents by Inventor Paul Cronce

Paul Cronce has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 7747531
    Abstract: A system and method for delivery of secure software license information to authorize the use of a software program is disclosed. The method and system comprises a computer system for executing the software program and the authorizing program, and a license server, connected to the computer system over a network. The method and system include associating a publisher certificate and a signed product key pair with the program to be authorized, generating a license request containing user and product information and signed by the private key from the product key pair, transmitting the license request to a license server, generating a license using data extracted from the license request and license terms, signing the license with the publisher private key associated with the publisher certificate, transmitting the license to the authorization program, validating the license using the publisher certificate, and using the license terms to control the use of the software program.
    Type: Grant
    Filed: February 5, 2002
    Date of Patent: June 29, 2010
    Assignee: Pace Anti-Piracy
    Inventor: Paul A. Cronce
  • Patent number: 7742992
    Abstract: A method for delivery of a licensed toolset to a software publisher for creating license-managed software products is disclosed. The method comprises providing an authorization process, and implementing the authorization process for both a toolset publisher and related toolset and a software publisher and related software product, whereby the same authorization process is used to obtain respective licenses. The authorization process includes creating a first public and private key pair for the software publisher, creating a second public and private key pair for the software product, creating an authorization program for the software program, with embedded copies of the first and second public keys, and combining the software program and the authorization program, such that when the authorization program is invoked, the authorization program obtains a license for controlling the use of the software program.
    Type: Grant
    Filed: February 21, 2002
    Date of Patent: June 22, 2010
    Assignee: Pace Anti-Piracy
    Inventor: Paul A. Cronce
  • Patent number: 7730542
    Abstract: A method for anti-piracy protection of a software application by obfuscation of the execution of portions of the applications code is described. The method includes providing a language specification and library to implement the functions of the language, providing a compiler to translate the language into byte codes, and providing an interpreter to execute the byte codes using the library. The method further includes providing the language specifications, library, compiler, interpreter, and instructions to a software publisher, where the software publisher embeds the library and interpreter in the application to be protected, and selects and prepares application code segments for processing into byte codes by the compiler. The application is then executed using the embedded library and interpreter, where the execution of the application is obfuscated by the use of byte codes.
    Type: Grant
    Filed: June 30, 2006
    Date of Patent: June 1, 2010
    Assignee: Pace Anti-Piracy
    Inventors: Paul A. Cronce, Joseph M. Fontana, Eric C. Anderson
  • Publication number: 20090133131
    Abstract: A method and system for managing licenses over a network is disclosed. The method and system include establishing a user account on a server coupled to the network, and allowing a user or publisher to upload or download licenses from a computer to or from the server. The licenses are then associated with the user account, and the user is allowed to log into the user account to review the account and associated uploaded licenses. The method and system further include allowing the user to review and retrieve the licenses for download to the user computer in the case of a lost or damaged license.
    Type: Application
    Filed: January 20, 2009
    Publication date: May 21, 2009
    Applicant: PACE Anti-Piracy
    Inventors: Paul A. Cronce, Andrew A. Kirk
  • Patent number: 7483860
    Abstract: A method and system for managing licenses over a network is disclosed. The method and system include establishing a user account on a server coupled to the network from a user computer, and allowing the user to upload licenses used by the computer to the server. The server then associates the uploaded licenses with the user account, and allows the user to log into the user account to review the account and associated uploaded licenses. The user may also retrieve the licenses for download to the user computer in the case of a lost or damaged license.
    Type: Grant
    Filed: March 8, 2002
    Date of Patent: January 27, 2009
    Assignee: Pace Anti-Piracy
    Inventors: Paul A. Cronce, Andrew A. Kirk
  • Patent number: 7188241
    Abstract: A method and system for providing anti-piracy protection to a software application on a server connected to a target machine over a network is described. The method includes providing a server with a server application for modifying the application software based on a machine fingerprint of the target machine, and for receiving and storing the application software. The server application receives the target machine fingerprint in conjunction with a license transaction between the server and the target machine. The server then modifies the application software using the received machine fingerprint, and provides the resulting modified software to the target machine, wherein the supplied software will only operate correctly on the target machine.
    Type: Grant
    Filed: October 16, 2002
    Date of Patent: March 6, 2007
    Assignee: Pace Antipiracy
    Inventors: Paul A. Cronce, Eric C. Anderson
  • Publication number: 20060271921
    Abstract: A method for anti-piracy protection of a software application by obfuscation of the execution of portions of the applications code is described. The method includes providing a language specification and library to implement the functions of the language, providing a compiler to translate the language into byte codes, and providing an interpreter to execute the byte codes using the library. The method further includes providing the language specifications, library, compiler, interpreter, and instructions to a software publisher, where the software publisher embeds the library and interpreter in the application to be protected, and selects and prepares application code segments for processing into byte codes by the compiler. The application is then executed using the embedded library and interpreter, where the execution of the application is obfuscated by the use of byte codes.
    Type: Application
    Filed: June 30, 2006
    Publication date: November 30, 2006
    Applicant: PACE ANTIPIRACY
    Inventors: Paul Cronce, Joseph Fontana, Eric Anderson
  • Patent number: 7124445
    Abstract: A method for anti-piracy protection of a software application by obfuscation of the execution of portions of the applications code is described. The method comprises providing a language specification and library to implement the functions of the language, providing a compiler to translate the language into byte codes, and providing an interpreter to execute the byte codes using the library. The method further comprises providing the language specifications, library, compiler, interpreter, and instructions to a software publisher, wherein the software publisher embeds the library and interpreter in the application to be protected, and selects and prepares application code segments for processing into byte codes by the compiler. The application is then executed using the embedded library and interpreter, wherein the execution of the application is obfuscated by the use of byte codes.
    Type: Grant
    Filed: June 21, 2002
    Date of Patent: October 17, 2006
    Assignee: PACE Anti-Piracy, Inc.
    Inventors: Paul A. Cronce, Joseph M. Fontana, Eric C. Anderson
  • Publication number: 20060174349
    Abstract: An authorization system and associated method for selectively authorizing a host system to use one or more items of protected information associated with the host system. The authorization system includes a portable authorization device that is removably couplable to the host system. The portable authorization device is capable of receiving and storing multiple items of authorization information associated with a plurality of respective items of protected information from one or more information authorities. Preferably, the portable authorization device is capable of communicating with multiple types of information authorities. The portable authorization device selectively authorizes the host system to use the one or more respective items of protected information based upon the respective authorization information stored therein.
    Type: Application
    Filed: March 31, 2006
    Publication date: August 3, 2006
    Inventors: Paul Cronce, Joseph Fontana
  • Patent number: 6880149
    Abstract: The present invention provides a method and system for runtime code integrity validation. The method and system include providing a software tool for processing a software program, as well as instructions on how to modify the software program for submission to the tool. The modified software program executable generated for submission to the tool includes checksum information for use by the tool. The tool uses the checksum information to compute checksums on blocks specified by the checksum information, and stores the computed checksums in locations specified by the checksum information. Next, the tool strips the checksum information from the executable. The resulting executable code is delivered as a protected software application that generates a new checksum at runtime and compares it with the computed checksum, and determines that the software program has been modified if the checksums fail to match.
    Type: Grant
    Filed: April 1, 2002
    Date of Patent: April 12, 2005
    Assignee: Pace Anti-Piracy
    Inventor: Paul A. Cronce
  • Patent number: 6871192
    Abstract: A method and system for protecting software from unauthorized use on a computer system using an external security device is disclosed. The method and system include encrypting the software to be protected using an encryption key. The use of the software on the computer system is then authorized by generating the encryption key within the security device using information supplied from the software. Once the encryption key generated by the security device is received on the computer system, the encryption key used to decrypt the encrypted software for execution on the computer system.
    Type: Grant
    Filed: December 20, 2001
    Date of Patent: March 22, 2005
    Assignee: Pace Anti-Piracy
    Inventors: Joseph M. Fontana, Paul A. Cronce
  • Publication number: 20040078585
    Abstract: A method and system for providing anti-piracy protection to a software application on a server connected to a target machine over a network is described. The method includes providing a server with a server application for modifying the application software based on a machine fingerprint of the target machine, and for receiving and storing the application software. The server application receives the target machine fingerprint in conjunction with a license transaction between the server and the target machine. The server then modifies the application software using the received machine fingerprint, and provides the resulting modified software to the target machine, wherein the supplied software will only operate correctly on the target machine.
    Type: Application
    Filed: October 16, 2002
    Publication date: April 22, 2004
    Inventors: Paul A. Cronce, Eric C. Anderson
  • Publication number: 20030236986
    Abstract: A method for anti-piracy protection of a software application by obfuscation of the execution of portions of the applications code is described. The method comprises providing a language specification and library to implement the functions of the language, providing a compiler to translate the language into byte codes, and providing an interpreter to execute the byte codes using the library. The method further comprises providing the language specifications, library, compiler, interpreter, and instructions to a software publisher, wherein the software publisher embeds the library and interpreter in the application to be protected, and selects and prepares application code segments for processing into byte codes by the compiler. The application is then executed using the embedded library and interpreter, wherein the execution of the application is obfuscated by the use of byte codes.
    Type: Application
    Filed: June 21, 2002
    Publication date: December 25, 2003
    Inventors: Paul A. Cronce, Joseph M. Fontana, Eric C. Anderson
  • Publication number: 20030212639
    Abstract: A method and system for providing a secure authoring service for protected software is disclosed. The method and system include creating a protection authoring toolset on a networked server, and receiving a copy of the software product to be protected from a software publisher over a network. The method and system further include processing the software product on the server using the protection authoring toolset, such that the software product is wrapped with a protection wrapper, and returning the protected software product to the publisher over the network for testing and delivery to customers.
    Type: Application
    Filed: May 6, 2002
    Publication date: November 13, 2003
    Inventors: Paul A. Cronce, Richard Hoiberg, Joseph M. Fontana
  • Publication number: 20030188231
    Abstract: The present invention provides a method and system for runtime code integrity validation. The method and system include providing a software tool for processing a software program, as well as instructions on how to modify the software program for submission to the tool. The modified software program executable generated for submission to the tool includes checksum information for use by the tool. The tool uses the checksum information to compute checksums on blocks specified by the checksum information, and stores the computed checksums in locations specified by the checksum information. Next, the tool strips the checksum information from the executable. The resulting executable code is delivered as a protected software application that generates a new checksum at runtime and compares it with the computed checksum, and determines that the software program has been modified if the checksums fail to match.
    Type: Application
    Filed: April 1, 2002
    Publication date: October 2, 2003
    Inventor: Paul A. Cronce
  • Publication number: 20030172035
    Abstract: A method and system for managing licenses over a network is disclosed. The method and system include establishing a user account on a server coupled to the network from a user computer, and allowing the user to upload licenses used by the computer to the server. The server then associates the uploaded licenses with the user account, and allows the user to log into the user account to review the account and associated uploaded licenses. The user may also retrieve the licenses for download to the user computer in the case of a lost or damaged license.
    Type: Application
    Filed: March 8, 2002
    Publication date: September 11, 2003
    Inventors: Paul A. Cronce, Andrew A. Kirk
  • Publication number: 20030156719
    Abstract: A method for delivery of a licensed toolset to a software publisher for creating license-managed software products is disclosed. The method comprises providing an authorization process, and implementing the authorization process for both a toolset publisher and related toolset and a software publisher and related software product, whereby the same authorization process is used to obtain respective licenses. The authorization process includes creating a first public and private key pair for the software publisher, creating a second public and private key pair for the software product, creating an authorization program for the software program, with embedded copies of the first and second public keys, and combining the software program and the authorization program, such that when the authorization program is invoked, the authorization program obtains a license for controlling the use of the software program.
    Type: Application
    Filed: February 21, 2002
    Publication date: August 21, 2003
    Inventor: Paul A. Cronce
  • Publication number: 20030149670
    Abstract: A system and method for delivery of secure software license information to authorize the use of a software program is disclosed. The method and system comprises a computer system for executing the software program and the authorizing program, and a license server, connected to the computer system over a network. The method and system include associating a publisher certificate and a signed product key pair with the program to be authorized, generating a license request containing user and product information and signed by the private key from the product key pair, transmitting the license request to a license server, generating a license using data extracted from the license request and license terms, signing the license with the publisher private key associated with the publisher certificate, transmitting the license to the authorization program, validating the license using the publisher certificate, and using the license terms to control the use of the software program.
    Type: Application
    Filed: February 5, 2002
    Publication date: August 7, 2003
    Inventor: Paul A. Cronce
  • Publication number: 20030120605
    Abstract: A method and system for protecting software from unauthorized use on a computer system using an external security device is disclosed. The method and system include encrypting the software to be protected using an encryption key. The use of the software on the computer system is then authorized by generating the encryption key within the security device using information supplied from the software. Once the encryption key generated by the security device is received on the computer system, the encryption key used to decrypt the encrypted software for execution on the computer system.
    Type: Application
    Filed: December 20, 2001
    Publication date: June 26, 2003
    Inventors: Joseph M. Fontana, Paul A. Cronce