System and method for preventing unauthorized installation, use and reproduction of software
First Claim
1. A method for preventing unauthorized installation of computer software stored on an install storage medium, comprising the steps of:
- a) initiating communication between a key storage medium and a computer onto which the software is to be installed;
b) verifying that file attributes of files stored on the key storage medium correspond to file attributes defined by the software contained on the install storage medium; and
c) authorizing installation of the computer software from the install storage medium onto the computer.
0 Assignments
0 Petitions
Accused Products
Abstract
A method for preventing unauthorized installation of computer software stored on an install storage medium, comprising the steps of initiating communication between a key storage medium and a computer onto which the software is to be installed, verifying that file attributes of files stored on the key storage medium correspond to file attributes defined by the software contained on the install storage medium, and authorizing installation of the computer software from the install storage medium onto the computer. The method can include the step of verifying that disk attributes of the key storage medium correspond to disk attributes defined by the software.
82 Citations
23 Claims
-
1. A method for preventing unauthorized installation of computer software stored on an install storage medium, comprising the steps of:
-
a) initiating communication between a key storage medium and a computer onto which the software is to be installed;
b) verifying that file attributes of files stored on the key storage medium correspond to file attributes defined by the software contained on the install storage medium; and
c) authorizing installation of the computer software from the install storage medium onto the computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method for preventing unauthorized use of a software program installed on a computer, comprising the steps of:
-
a) reading a current date from the computer and verifying that the current date corresponds to a target date defined by the software program;
b) initiating communication between the computer and a key storage medium;
c) verifying that file attributes of files stored on the key storage medium correspond to file attributes defined by the software program; and
d) authorizing execution of the computer software by the computer. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A method for preventing unauthorized installation of computer software stored on an install storage medium, comprising the steps of:
-
a) associating a character string with a volume label of a key storage medium;
b) initiating communication between the key storage medium and a computer onto which the software is to be installed;
c) verifying that the character string associated with the volume label of the key storage medium corresponds to a character string defined by the software contained on the install storage medium; and
d) authorizing installation of the computer software from the install storage medium onto the computer. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23)
-
Specification