Systems and methods for using machine attributes to deter software piracy in an enterprise environment
First Claim
Patent Images
1. A computer-implemented method of deterring software piracy in a volume license environment, comprising:
- receiving a volume license key embedded within a volume license file, wherein the volume license key has first data derived from at least one machine attribute of the environment;
authenticating the volume license file using second data derived from at least one machine attribute of the environment; and
activating a software package associated with the volume license key on at least one computing device in the environment.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer-readable medium for deterring software piracy in a volume license environment. A volume license key embedded within a volume license file is received. The volume license key has first data derived from at least one machine attribute of the environment. The volume license file is authenticated using second data derived from at least one machine attribute of the environment. A software package associated with the volume license key is then activated on at least one computing device in the environment.
-
Citations
20 Claims
-
1. A computer-implemented method of deterring software piracy in a volume license environment, comprising:
-
receiving a volume license key embedded within a volume license file, wherein the volume license key has first data derived from at least one machine attribute of the environment;
authenticating the volume license file using second data derived from at least one machine attribute of the environment; and
activating a software package associated with the volume license key on at least one computing device in the environment. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for deterring software piracy in a computing environment, comprising:
-
a software package associated with a volume license key that is embedded within a volume license file, wherein the volume license file has first data derived from a machine attribute of the computing environment;
an authentication routine for deriving second data from a machine attribute of the computing environment and comparing the second data to the first data; and
an activation routine for activating the software package according to the volume license key and in response to authenticating the volume license file. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer-readable medium having computer-executable instructions for performing a method of deterring software piracy in a volume license environment, the method comprising:
-
receiving a volume license key embedded within a volume license file, wherein the volume license key has first data derived from at least one machine attribute of the environment;
authenticating the volume license file using second data derived from at least one machine attribute of the environment; and
activating a software package associated with the volume license key on at least one computing device in the environment. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification