Secure system for activating personal computer software at remote locations
DCFirst Claim
1. A method of activating a program file, comprising the steps of:
- providing a program file including a loader segment and a registration shell portion to a remote computer having a display, said program file lacking a critical portion, preventing said program file from operating properly,entering user identification information in said registration shell portion;
transmitting said user identification information from said registration shell to a separate registration program provided in a registration computer, said registration program merging user identification data with said critical portion to generate a unique overlay file;
transmitting said unique overlay file from said registration program to said registration shell, said overlay file containing the critical portion originally lacking from said program file; and
installing said overlay file in said program file, thereby allowing operation of said program file only when user identification contained in said overlay file is presently installed.
3 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A process and system for activating various programs are provided in a personal computer. The computer is initially provided with a portion of a main program. A data link is established between the personal computer and a registration computer. By providing the registration computer with various information, a potential licensee can register to utilize the program. Once the registration process is complete, a tamperproof overlay program is constructed at the registration computer and transferred to the personal computer. The tamperproof overlay includes critical portions of the main program, without which the main program would not operate and also contains licensee identification and license control data.
-
Citations
13 Claims
-
1. A method of activating a program file, comprising the steps of:
-
providing a program file including a loader segment and a registration shell portion to a remote computer having a display, said program file lacking a critical portion, preventing said program file from operating properly, entering user identification information in said registration shell portion; transmitting said user identification information from said registration shell to a separate registration program provided in a registration computer, said registration program merging user identification data with said critical portion to generate a unique overlay file; transmitting said unique overlay file from said registration program to said registration shell, said overlay file containing the critical portion originally lacking from said program file; and installing said overlay file in said program file, thereby allowing operation of said program file only when user identification contained in said overlay file is presently installed. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system for activating a program file for a limited or unlimited period of time comprising;
-
at least one remote computer, initially provided with a program file containing an overlay loader segment but lacking at least one critical program segment, preventing operation of the program file, said overlay loader segment only enabling activation of the program file when an authentic overlay file is presently installed, said remote computer provided with a registration shell program, said registration shell program enabling a user to enter various user identification information; a registration computer provided with a registration program, a means for receiving and processing said user identification information, a means for creating a unique overlay file containing the critical program segment lacking from the program file and all or portions of the user identification information, and a means for transmitting said overlay file to said remote computer, wherein transmission of said overlay file to said remote computer would allow operation of said program file only when user identification contained in said overlay file is presently installed. - View Dependent Claims (10, 11, 12, 13)
-
Specification