POST-PRODUCTION PREPARATION OF AN UNPROTECTED INSTALLATION IMAGE FOR DOWNLOADING AS A PROTECTED SOFTWARE PRODUCT
First Claim
1. A method for altering an unprotected software installation image to install a protected software version of an unprotected executable file included in the installation image, instead of installing the unprotected executable file, the method involving assembling a master installation image at a server, the master installation image for download from the server to a target computer, wherein the master installation image is assembled by:
- receiving a first installation image configured for installing a first executable file in the target computer;
receiving a second executable file that is identical in function to the first software executable file except for incorporating additional code configured to protect the second executable file from unauthorized use;
receiving a third executable file configured for replacing the first executable file with the second executable file in a computer-readable medium, in response to completion of installation of the first executable file in the computer-readable medium; and
integrating the first installation image, the second executable file, and the third executable file to produce the master installation image configured for installing the second executable file instead of the first executable file.
2 Assignments
0 Petitions
Accused Products
Abstract
An installation image for installing an unprotected software product is used to install a protected version of the same product. A protected version of the executable file is embedded in a new installation image with the original installation image, in which the unprotected version of the executable file is damaged so as to be unusable and unreadable. The new installation image causes the original installation image to operate, installing the damaged installation file and other data files. The new installation image then replaces the damaged installation file with the protected installation file.
9 Citations
8 Claims
-
1. A method for altering an unprotected software installation image to install a protected software version of an unprotected executable file included in the installation image, instead of installing the unprotected executable file, the method involving assembling a master installation image at a server, the master installation image for download from the server to a target computer, wherein the master installation image is assembled by:
-
receiving a first installation image configured for installing a first executable file in the target computer; receiving a second executable file that is identical in function to the first software executable file except for incorporating additional code configured to protect the second executable file from unauthorized use; receiving a third executable file configured for replacing the first executable file with the second executable file in a computer-readable medium, in response to completion of installation of the first executable file in the computer-readable medium; and integrating the first installation image, the second executable file, and the third executable file to produce the master installation image configured for installing the second executable file instead of the first executable file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
Specification