Installing Protected Software Product Using Unprotected Installation Image
First Claim
1. A method for installing a protected software product using an unprotected installation image, comprising:
- initiating an installation process on a client computer system for installation of a protected software product;
in response to initiating the installation process, installing an unprotected software executable file included in a first installation image into the client computer system;
deleting the unprotected software executable from the client computer system after installing the unprotected software and before terminating the installation process; and
writing a protected version of the software executable to a memory of the client computer in place of the unprotected software executable that is deleted from the client computer system, to complete installation of the protected software product.
6 Assignments
0 Petitions
Accused Products
Abstract
An installation image for installing an unprotected software product is used to install a protected version of the same product. A protected version of the executable file is embedded in a new installation image with the original installation image, in which the unprotected version of the executable file is damaged so as to be unusable and unreadable. The new installation image causes the original installation image to operate, installing the damaged installation file and other data files. The new installation image then replaces the damaged installation file with the protected installation file.
-
Citations
24 Claims
-
1. A method for installing a protected software product using an unprotected installation image, comprising:
-
initiating an installation process on a client computer system for installation of a protected software product; in response to initiating the installation process, installing an unprotected software executable file included in a first installation image into the client computer system; deleting the unprotected software executable from the client computer system after installing the unprotected software and before terminating the installation process; and writing a protected version of the software executable to a memory of the client computer in place of the unprotected software executable that is deleted from the client computer system, to complete installation of the protected software product. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-readable medium encoded with instructions comprising:
-
initiating an installation process on a client system for installation of a protected software executable; in response to initiating the installation process, installing an unprotected software executable file included in a first installation image into the client computer system; deleting the unprotected software executable from the client system after installing the unprotected software and before terminating the installation process; and writing the protected software executable to a memory of the client computer in place of the unprotected software executable that is deleted from the client computer system, to complete installation of the protected software product. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
17. A method for altering an unprotected software installation image to install a protected software version of an unprotected executable file included in the installation image, instead of installing the unprotected executable file, the method comprising:
-
receiving a first installation image configured for installing a first executable file in a target computer; receiving a second executable file that is identical in function to the first software executable file except for incorporating additional code configured to protect the second executable file from unauthorized use; receiving a third executable file configured for replacing the first executable file with the second executable file in a computer-readable medium, in response to completion of installation of the first executable file in the computer-readable medium; and integrating the first installation image, the second executable file, and the third executable file to produce a second installation image configured for installing the second executable file instead of the first executable file. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24)
-
Specification