Secure machine counting
First Claim
Patent Images
1. A computer-readable medium having computer-executable instructions for performing steps comprising:
- generating an activation bypass message, wherein the activation bypass message comprises a machine identifier and a software identifier associated with a software application that is to undergo activation bypass;
sending the activation bypass message to a binding service machine;
receiving from the binding service machine a binding service message that comprises a machine count;
comparing the machine count to a predetermined count; and
if the machine count is equal to or greater than the predetermined count, allowing activation bypass for the software application.
3 Assignments
0 Petitions
Accused Products
Abstract
A method and computer-readable medium for deterring software piracy in a volume license environment. An activation bypass message is generated and sent. Information contained in the activation bypass message is compared to a list of machine identifiers. A binding service message contains a count of the machine identifiers in the list. Once the count reaches a predetermined threshold, software activation bypass may occur.
-
Citations
20 Claims
-
1. A computer-readable medium having computer-executable instructions for performing steps comprising:
-
generating an activation bypass message, wherein the activation bypass message comprises a machine identifier and a software identifier associated with a software application that is to undergo activation bypass;
sending the activation bypass message to a binding service machine;
receiving from the binding service machine a binding service message that comprises a machine count;
comparing the machine count to a predetermined count; and
if the machine count is equal to or greater than the predetermined count, allowing activation bypass for the software application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A computer-readable medium having computer-executable instructions for performing steps comprising:
-
receiving an activation bypass message from a client machine, wherein the activation bypass message comprises a client machine identifier and a software identifier associated with a software application having an activation requirement to be bypassed;
determining whether the received client machine identifier is among a list of machine identifiers;
if the received client machine identifier is not among the list of machine identifiers, adding the received client machine identifier to the list;
determining a number of machine identifiers within the list; and
sending a binding service message, wherein the binding service message comprises the number of unique machine identifiers. - View Dependent Claims (12, 13, 14, 15, 16, 17)
-
-
18. A method of deterring piracy in a volume license environment, comprising:
-
generating an activation bypass message at a client machine, wherein the activation bypass message comprises a machine identifier and a software identifier associated with a software application the activation of which is to be bypassed;
sending the activation bypass message to a binding service machine;
determining, at the binding service machine, whether the received client machine identifier is among a list of machine identifiers;
if the received client machine identifier is not among the list of machine identifiers, adding, at the binding service machine, the received client machine identifier to the list;
determining, at the binding service machine, a number of machine identifiers within the list;
sending a binding service message to the client machine, wherein the binding service message comprises the number of unique machine identifiers;
comparing, at the client machine, the machine count to a predetermined count; and
if the machine count is equal to or greater than the predetermined count, allowing activation bypass for the software application. - View Dependent Claims (19, 20)
-
Specification