Method and system for discouraging unauthorized copying of a computer program
First Claim
1. A method for determining the authenticity of a computer software product, the computer software product comprising a computer-readable medium and a transponder, the computer-readable medium having stored thereon a copy of a computer program, the method comprising:
- generating an electromagnetic field to energize the transponder;
receiving from the transponder a value of an identification number of a copy of the computer program;
analyzing the identification number value to determine whether the identification number value is valid; and
allowing or denying the installation of the copy of the computer program based on the analyzing step.
2 Assignments
0 Petitions
Accused Products
Abstract
A transponder used in conjunction with a computer software product discourages unauthorized copying. The transponder is attached to or embedded in the computer-readable media (e.g. the CD-ROMs, DVDs) that comes with the product. Before the software product can be installed on a user'"'"'s computer, the installation software may activate a radio-frequency (RF) device and query the transponder for an identification number. The identification number is associated with the particular copy of the software that the user is attempting to install. The installation software attempts to verify the identification number and, if successful, proceeds with the installation of the software.
-
Citations
29 Claims
-
1. A method for determining the authenticity of a computer software product, the computer software product comprising a computer-readable medium and a transponder, the computer-readable medium having stored thereon a copy of a computer program, the method comprising:
-
generating an electromagnetic field to energize the transponder;
receiving from the transponder a value of an identification number of a copy of the computer program;
analyzing the identification number value to determine whether the identification number value is valid; and
allowing or denying the installation of the copy of the computer program based on the analyzing step. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method for installing a software package on a computer, the method comprising:
-
executing an installation program of the software package, the installation program being stored on a computer software product comprising a transponder;
in accordance with the installation program, sending a radio frequency signal to a reader that is linked to the computer, thereby causing the radio frequency reader to query the transponder for a product identification number of the computer software product, wherein the product identification number identifies the particular copy of the software package being installed;
analyzing the product identification number to determine whether it is valid; and
based on the analyzing step, determining whether or not to install the software on the computer. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer software product comprising:
-
a computer-readable medium having stored thereon programs comprising an application program and an installation program; and
a transponder attached to the computer readable medium, wherein the transponder transmits an authentication signal to a reader that is communicatively linked to a computer, the authentication signal representing data comprising the product identification number, thereby allowing the computer to make a determination of the authenticity of the computer software product and to install the application program based on the authenticity determination. - View Dependent Claims (14, 15, 16, 17, 18, 19)
-
-
20. A system for discouraging unauthorized copying of a computer program, the system comprising:
-
a computer;
a computer software product comprising;
a computer-readable medium having stored thereon one or more programs including an installation program; and
a transponder having stored thereon a number for identifying the computer software product;
and a reader in communication with the computer, wherein when the computer executes the installation program, the computer signals the reader to query the transponder for the number and analyzes the number to determine the authenticity of the computer software product. - View Dependent Claims (21, 22, 23, 24)
-
-
25. An apparatus for use in preventing the unauthorized duplication of a computer program, the apparatus comprising:
a transponder having stored therein an identification number associated with a particular copy of the computer program. - View Dependent Claims (26, 27, 28)
-
29. A credit card having a hole that is sized to fit on a spindle of an optical disk reader of a computer, the credit card comprising:
a transponder having stored thereon data for allowing an RF reader communicatively linked to the computer to verify the authenticity of the credit card.
Specification