Systems and Methods for Auditing Software Usage Using a Covert Key
First Claim
1. A system for auditing software usage comprising:
- a network interface disposed to receive a device fingerprint associated with a covert key;
a memory holding program instructions operable for accessing a database storing a plurality of previously received device fingerprints associated with license keys and determining whether the device fingerprint associated with the covert key corresponds to any one of the plurality of previously received device fingerprints associated with license keys; and
a processor, in communication with the network interface and the memory, the processor configured for operating the program instructions.
3 Assignments
0 Petitions
Accused Products
Abstract
System and method for auditing for usage of licensed software in which a client executing the software generates and transmits a license key and a covert key to a server via network connection. The license key is transmitted to the server upon activation of the licensed software at the client. The covert key is generated based on at least a portion of the software code activated at the client and is transmitted to the server at random or at predetermined time intervals after transmission of the licensed key so as to avoid detection by a user. The license and covert keys are each associated with a device fingerprint that uniquely identifies the device transmitting each one of the respective keys. Unauthorized software usage at a client is determined at least when a covert key does not correspond to a device fingerprint having an associated license key.
114 Citations
10 Claims
-
1. A system for auditing software usage comprising:
-
a network interface disposed to receive a device fingerprint associated with a covert key; a memory holding program instructions operable for accessing a database storing a plurality of previously received device fingerprints associated with license keys and determining whether the device fingerprint associated with the covert key corresponds to any one of the plurality of previously received device fingerprints associated with license keys; and a processor, in communication with the network interface and the memory, the processor configured for operating the program instructions.
-
-
2. A method for auditing software usage comprising:
-
receiving a device fingerprint associated with a covert key; accessing a database storing a plurality of previously received device fingerprints associated with license keys; and determining whether the device fingerprint associated with the covert key corresponds to any one of the plurality of previously received device fingerprints associated with license keys. - View Dependent Claims (3, 4, 5, 6)
-
-
7. A method for auditing software usage at a client device comprising:
-
sending, from a client device, an identifier for the software installed on the client device and a device fingerprint uniquely identifying the client device; receiving a license key operable to unlock at least a portion of the software for use at the client device; generating a covert key based on at least a portion of the software unlocked by the license key; and sending the covert key and the device fingerprint. - View Dependent Claims (8, 9, 10)
-
Specification