Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)

Inactive Publication Date: 2014-05-01
ARRIS TECH
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The technical effect of this patent text is to improve the efficiency and accuracy of infrared temperature measurement for non-contact type thermometers, especially for small measurement targets.

Problems solved by technology

Each Hook IP solution is driven by a technical problem.
Problem1 is the secure transfer problem, or the need to provide encryption necessary to protect some Asset.
Trade Secrets can, however, be legally overcome by a party's reverse engineering, which nullifies their enforcement.
The Solution1 regime, without patent rights for enforcement, has very little survivability in a competitive world, and can be substantially ineffective in protecting the Asset.
For a Licensing Entity choosing to use Solution2, there is an uncertain multi-year delay period where the Licensing Entity does not know if it can effectively enforce its control.
The enforcement utility of EPT, however, is confined to the grant period before the patents expire.
For the EPT to be valid at the time of the Licensing Entity's decision to use it, since the patent period of 20 years begins at filing, the patent probably has been granted for some years, leaving an average of only perhaps 8-12 years remaining Once the EPT patents expire, Solution3 has the negative characteristics of Solution1 above, or worse since some copyright or trade secret protection may remain in Solution1, and it will be ineffective in protecting the Asset the Licensing Entity seeks.
Solution3 can therefore have a short useful lifespan.
Solution2 is highly speculative and has limited confident business control for the Licensing Entity until the PPT grant.
Solution1 offers minimal utility with no patent protection available.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)
  • BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)
  • BUSINESS METHOD INCLUDING CHALLENGE-RESPONSE SYSTEM TO SECURELY AUTHENTICATE SOFTWARE APPLICATION PROGRAM INTERFACES (APIs)

Examples

Experimental program
Comparison scheme
Effect test

case 1

[0089]B. Multiple Actors, Single Function

[0090]In this embodiment of the present invention, the Licensing Entity control multiple Actors that need to access a single function F1. This is achieved by beginning with a license agreement imposed upon an Actor A1 that owns or implements F1. The desirability of F1 then transfers the Licensing Regime to all other indirect users of F1, thereby spreading the Licensing Regime. Note that only Actor A1 implements F1; other users of F1 use F1 indirectly by asking A1 to operation function F1 for them through the Handshake Protocol, typically through an interface or API, where the requester acts as a Handshake Claimant and Actor A1 acts as the Handshake Verifier.

[0091]For this embodiment there must always be an “Alpha Actor” that is the very first to sign up to the Licensing Regime. The Alpha Actor will design their software or device to require the Handshake and Hook IP to perform its function F1 for other “Beta Actor” devices or software. This ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system for securely authenticating software Application Program Interfaces (APIs) includes a handshake protocol that is provided to validate whether the parties involved are licensed to use the system which includes rights to Intellectual Property (IP) and corresponding obligations. The handshake is a Challenge-Response protocol that includes several steps. First, a Claimant sends a request to a Verifier requesting access to a function through an API. The Verifier reacts to the request by outputting a Challenge that is sent to the Claimant. The Challenge is also retained by the Verifier for use in its internal calculation to verify the Claimant's response. The Claimant next processes the Challenge using components under the license, known as Hook IP, and issues a Response to the Verifier. The Verifier compares the possibly-correct Candidate Response from the Claimant to the known-correct Target Response and if a match occurs the Verifier allows the Claimant access to the API.

Description

BACKGROUND CROSS REFERENCE TO RELATED APPLICATIONS[0001]This Application claims priority under 35 U.S.C. §119(e) from earlier filed U.S. Provisional Application Ser. Nos. 61 / 719,923 and 61 / 719,928, both filed on Oct. 29, 2012, and both incorporated herein by reference in their entirety.BACKGROUND[0002]1. Technical Field[0003]The present invention relates to secure authentication of access to software capabilities through Application Program Interfaces (APIs). In particular, the present invention relates to the use of a regime to enable software API usage and authentication using a concept known as Hook IP.[0004]2. Related ArtI. Hook IP—General Definition[0005]Hook IP provides a way often to enable access to some patented technology, often as part of a trust establishment mechanism. This means that anyone wanting to implement a software function or API such as Digital Rights Management (DRM) must do so in a way that will be covered by certain “Hook IP” patents. A condition of obtaini...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10
CPCG06F21/10H04N21/4431H04N21/4433G06F21/57G06F21/629H04N21/2351H04N21/4353H04N21/64715H04L63/126G06F21/105G06F21/121
Inventor SPRUNK, ERIC J.DEPIETRO, MARK G.MEDVINSKY, ALEXANDERMORONEY, PAULQIU, XIN
Owner ARRIS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products