ANTI-PIRACY SOFTWARE PROTECTION SYSTEM AND METHOD
First Claim
1. A computer-implemented method for protecting distributed software containing an executable program over a client server network, the method comprising:
- providing to a user a copy of the distributed software, the distributed software comprising an incomplete executable program requiring a security module to be installed prior to execution on the client computer;
transmitting to the user a registration code for use with the distributed software;
requesting user registration from the user upon attempted execution of the distributed software;
receiving registration information including the registration code from the user;
validating the registration code received from the user;
constructing the security module upon validation of the registration code;
transmitting the security module to the client computer; and
integrating the security module with the distributed software to allow execution of the executable program.
9 Assignments
0 Petitions
Accused Products
Abstract
A method and system for protecting software products from unauthorized use and distribution is described. The system comprises a client process executed on a client computer coupled to a producer computer over a network. The method comprises the steps of providing to a user a copy of the distributed software, the distributed software comprising an incomplete executable program requiring a security module to be installed prior to execution on the client computer. The user receives a registration code for use with the distributed software. Upon attempted execution of the distributed software the producer computer requests user registration from the user. Upon receipt of the registration information including the registration code from the user, the producer computer validates the registration code and constructing a security module for transmission to the client computer. The security module is integrated with the distributed software to allow execution of the executable program.
61 Citations
17 Claims
-
1. A computer-implemented method for protecting distributed software containing an executable program over a client server network, the method comprising:
-
providing to a user a copy of the distributed software, the distributed software comprising an incomplete executable program requiring a security module to be installed prior to execution on the client computer; transmitting to the user a registration code for use with the distributed software; requesting user registration from the user upon attempted execution of the distributed software; receiving registration information including the registration code from the user; validating the registration code received from the user; constructing the security module upon validation of the registration code; transmitting the security module to the client computer; and integrating the security module with the distributed software to allow execution of the executable program. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A client-server computer system for protecting distributed software containing an executable program distributed from a server computer to a client computer over the network, the system comprising:
-
means for providing to a user a copy of the distributed software, the distributed software comprising an incomplete executable program requiring a security module to be installed prior to execution on the client computer; means for transmitting to the user a registration code for use with the distributed software; means for requesting user registration from the user upon attempted execution of the distributed software; means for receiving registration information including the registration code from the user; means for validating the registration code received from the user; means for constructing the security module upon validation of the registration code; means for transmitting the security module to the client computer; and means for integrating the security module with the distributed software to allow execution of the executable program. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification