System for making it ineffective to tamper with a software application by nullifying or removing calls to a license manager because the application can be run without a call to the license manager
First Claim
1. A method of preventing applications to run successfully if the calls to the License Manager system are removed or nullified, comprisinga. Extracting parts of the code and data of the applicationb. Placing the extracted code and data on a serverc. Requiring the application to connect with the server to retrieve the extracted code and datad. The server performing validation checks of the calling application and delivering the extracted code and data only if it determines that the application is legal, authorized and has permission.
0 Assignments
0 Petitions
Accused Products
Abstract
Many software applications are protected from illegal or unauthorized use by the use of a License Manager. All installations of the application are required to obtain a license from the License Manager to run. Software pirates routinely circumvent this copy protection by disabling the call to the license manager or change the code of the application so it seems to have passed the license verification. The present invention makes such efforts ineffective. The installed application cannot run, unless the call to the License Manager is made, since important code and data has been extracted from the installation and must be delivered by the License Manager. Obviously, if the call to the License Manager is disabled or manipulated, the extracted code and data will not be delivered to the installed application and it will not run.
3 Citations
6 Claims
-
1. A method of preventing applications to run successfully if the calls to the License Manager system are removed or nullified, comprising
a. Extracting parts of the code and data of the application b. Placing the extracted code and data on a server c. Requiring the application to connect with the server to retrieve the extracted code and data d. The server performing validation checks of the calling application and delivering the extracted code and data only if it determines that the application is legal, authorized and has permission.
Specification