Method for providing activation key protection
First Claim
Patent Images
1. A method for providing activation key protection comprising:
- installing a software application onto an information handling system;
providing a manufacturing key and a verification key for the software application;
combining the manufacturing key and the verification key to provide an activation key;
activating the software application using the activation key; and
, associating the verification key with the software application to enable a user to verify proper activation and license of the software application.
1 Assignment
0 Petitions
Accused Products
Abstract
A software activation method is disclosed which uses a two-key paradigm. The method provides increased piracy protection while providing a relatively straight forward process for a user to satisfy a license claim.
-
Citations
20 Claims
-
1. A method for providing activation key protection comprising:
-
installing a software application onto an information handling system;
providing a manufacturing key and a verification key for the software application;
combining the manufacturing key and the verification key to provide an activation key;
activating the software application using the activation key; and
,associating the verification key with the software application to enable a user to verify proper activation and license of the software application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method of manufacturing an information handling system comprising:
-
installing a software application onto the information handling system, the software application including an associated manufacturing key and verification key, the manufacturing key and the verification key being combined to provide an activation key;
activating the software application using the activation key; and
,associating the verification key with the software application to enable a user to verify proper activation and license of the software application. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. An information handling system comprising:
-
a processor;
a memory coupled to the processor;
a software application stored on the memory, the software application including an associated manufacturing key and verification key, the manufacturing key and the verification key being combined to provide an activation key, the software being activated via the activation key, the manufacturing key being destroyed after activating the software application, the verification key being stored on the memory and being associated with the software application to enable a user to verify proper activation and license of the software application. - View Dependent Claims (18, 19, 20)
-
Specification