ACTIVATION CODE SYSTEM AND METHOD FOR PREVENTING SOFTWARE PIRACY
First Claim
1. A non-transitory computer-readable medium encoded with a computer program comprising:
- software that requires an activation code to activate at least part of the functionality of the software;
program code that requires an identification code which identifies the software;
program code that enables the software to receive the activation code from a remote source over a network, the remote source being under the control of a remote service provider for activating at least part of the functionality of the software, said activation code representing that the number of times that said software has been previously activated on separate user systems, in a manner that is independent of the identity of the user, is less than a predetermined threshold, said predetermined threshold being at least two.
1 Assignment
0 Petitions
Accused Products
Abstract
A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions.
13 Citations
12 Claims
-
1. A non-transitory computer-readable medium encoded with a computer program comprising:
-
software that requires an activation code to activate at least part of the functionality of the software; program code that requires an identification code which identifies the software; program code that enables the software to receive the activation code from a remote source over a network, the remote source being under the control of a remote service provider for activating at least part of the functionality of the software, said activation code representing that the number of times that said software has been previously activated on separate user systems, in a manner that is independent of the identity of the user, is less than a predetermined threshold, said predetermined threshold being at least two. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of protecting against software piracy, said method including the steps of:
-
configuring a software to enable it to receive an activation code over a network for activating at least part of the functionality of said software; distributing said software, said software requiring the activation code to activate at least part of the functionality thereof and wherein said software further has a unique identifier associated therewith to uniquely identify such software; maintaining a remote service provider to track activation of such software, the remote service provider including an electronic computer coupled to the network, the remote service provider being under the control of a manufacturer of the software; keeping count in the electronic computer of the remote service provider, for each unique identifier associated with such software, of the number of times that an activation code is provided for activation on separate user systems in a manner that is independent of the identity of a user; and providing an activation code over the network when the number of times that said software has been previously activated on separate user systems, in a manner that is independent of the identity of the user, is less than a predetermined threshold, said predetermined threshold being at least two. - View Dependent Claims (7, 8, 9)
-
-
10. A remote service provider comprising:
-
a data storage element that records the amount of activations for an authorized copy of software, wherein said amount of activations pertains to the number of times that the authorized copy of software has been activated, each authorized copy of software having an identification code associated therewith; a processing element that examines the amount of activations recorded in the data storage element associated with an identification code in order to determine the number of times that the particular authorized copy of software associated with such identification code has been activated and wherein an activation code is provided for activating the authorized copy of software when the number of times that it has been previously activated on separate user systems, in a manner that is independent of the identity of the user, is less than a predetermined threshold, said predetermined threshold being at least two; wherein the remote service provider is under the control of a manufacturer of the software, and wherein said separate user systems are remotely situated relative to said processing element of said remote service provider. - View Dependent Claims (11, 12)
-
Specification