Method and apparatus for monitoring software using encryption
First Claim
1. A method for securing software to reduce unauthorized use of the software, the method comprising:
- associating a series of authorization codes with the software;
repeatedly requiring the user to obtain a new authorization code from an administrator to continue using the software;
encrypting information exchanged with the user, and transferring an authorization code for continued use of the software from the administrator such that the software is useable without requiring continuous communication with the administrator.
0 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for securing software to reduce unauthorized use and provide repeated contact with a software user to transfer information which may include advertising, promotional, or marketing information include repeatedly contacting the software manufacturer or third party representative or agent for an authorization code for continued use of the software. Authorization codes and registration information may be used with encryption to transfer information from the authorized representative to resist tampering by unauthorized users. The user and/or software contacts an authorized representative of the software to obtain authorization information which may be downloaded directly to the software or provided to the user for entry. Authorization intervals may vary depending upon the particular application. For example, in one embodiment, the present invention provides authorization information which allows continued use of the software for a period based on value of the software. The value of the software may be based on price or the availability of a subsequent version of the software. Authorization intervals of decreasing length may be supplied for software of increasing value. As the value of the software decreases, for example when one or more subsequent versions are released, the authorization intervals may increase accordingly.
165 Citations
53 Claims
-
1. A method for securing software to reduce unauthorized use of the software, the method comprising:
-
associating a series of authorization codes with the software;
repeatedly requiring the user to obtain a new authorization code from an administrator to continue using the software;
encrypting information exchanged with the user, and transferring an authorization code for continued use of the software from the administrator such that the software is useable without requiring continuous communication with the administrator. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19)
comparing registration information to previously obtained registration information to determine if the registration information is valid prior to providing the authorization code to the user.
-
-
13. The method of claim 12 wherein obtaining valid registration information comprises comparing registration information with registration information obtained during first use of the software.
-
14. The method of claim 1 wherein the authorization code authorizes continued use of the software for a period based on value of the software.
-
15. The method of claim 14 wherein the period is a calendar period of time.
-
16. The method of claim 14 wherein the period is a period of elapsed execution time of the software.
-
17. The method of claim 14 wherein the period is based on a number of times the software has been executed.
-
18. The method of claim 14 wherein the period is based on a version number associated with the software.
-
19. The method of claim 14 wherein the period is based on a new version of the software being released such that the period for authorized use of the user'"'"'s version increases based on a number of subsequently released versions of the software.
-
20. A method for providing continuing contact with a software user to repeatedly transfer information to the user, the method comprising:
-
receiving registration information from the user;
encrypting authorization information based on the registration information from the user;
transferring the encrypted authorization information from an administrator to authorize continued use of the software beyond a current authorization interval such that the software is useable without requiring continuous communication with the administrator; and
selectively transferring marketing, promotional, or advertising information when the user or software requests authorization for continued use beyond the current authorization interval. - View Dependent Claims (21, 22, 23, 24)
comparing at least a portion of the registration information with previously received registration information; and
transferring authorization information which authorizes continued use of the software only if the registration information is substantially similar to the previously received information.
-
-
24. The method of claim 20 further comprising:
-
comparing the registration information with previously received registration information to determine whether the user is an authorized user;
transferring authorization information which authorizes continued use of the software if the registration information indicates that the user is an authorized user;
transferring information which disables continued operation of the software if the registration information indicates that the user is an unauthorized user; and
transferring the marketing, promotional, or advertising information regardless of whether the registration information indicates the user is authorized or unauthorized.
-
-
25. A method for securing software to reduce unauthorized use of the software while providing repeated contact with a software user, the method comprising;
-
providing computer-specific information to an authorized representative;
based at least partially on the computer-specific information, transferring encrypted information including an authorization code for the software authorizing continued use of the software such that the software is useable without requiring continuous communication with the authorized representative; and
subsequently requiring another authorization code to continue using the software. - View Dependent Claims (26, 27, 28, 29, 30)
requiring entry of registration information prior to receiving another authorization code to continue using the software.
-
-
31. A computer readable storage medium having stored data which is directly or indirectly readable by a computer, representing instructions executable by a computer to secure software and reduce unauthorized use of the software, the computer readable storage medium comprising:
-
instructions for repeatedly requiring the user to obtain a new authorization code to continue using the software; and
instructions for processing an encrypted authorization code received from an administrator to authorize continued use of the software such that the software is usable without requiring continuous communication with the administrator. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
instructions for associating a series of authorization codes with the software.
-
-
33. The computer readable storage medium of claim 31 further comprising:
instructions for encrypting information exchanged with an authorized software representative.
-
34. The computer readable storage medium of claim 33 wherein the instructions for encrypting include instructions for encrypting at least a portion of registration information of the user.
-
35. The computer readable storage medium of claim 33 wherein the instructions for encrypting use at least a portion of computer specific information of a computer of the user running the software.
-
36. The computer readable storage medium of claim 35 wherein the computer specific information includes an electronic serial number which uniquely characterizes hardware configuration of the computer.
-
37. The computer readable storage medium of claim 35 wherein the computer specific information includes a motherboard serial number.
-
38. The computer readable storage medium of claim 35 wherein the computer specific information includes at least a portion of the information stored in a registry associated with the computer.
-
39. The computer readable storage medium of claim 33 wherein the instructions for encrypting include instructions for encrypting at least a portion of the authorization code.
-
40. The computer readable storage medium of claim 39 wherein the authorization code is encoded as an alphanumeric string which appears to the user to be randomly generated.
-
41. The computer readable storage medium of claim 39 wherein the authorization code comprises a hexadecimal string.
-
42. The computer readable storage medium of claim 39 wherein the authorization code comprises a binary string.
-
43. The computer readable storage medium of claim 31 further comprising:
instructions for comparing registration information to previously obtained registration information to determine if the registration information is valid.
-
44. A method for securing software to reduce unauthorized use of the software, the method comprising:
-
generating authorization codes;
repeatedly requiring a user to obtain a new authorization code from an administrator to continue using the software; and
encrypting at least a portion of each authorization code before providing the authorization code to the user to authorize continued use of the software such that the software is useable without requiring continuous communication with the administrator. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53)
comparing registration information to previously obtained registration information to determine if the registration information is valid prior to providing the authorization code to the user.
-
-
47. The method of claim 46 wherein determining if the registration information is valid includes comparing at least a portion of the registration information with registration information obtained during first use of the software.
-
48. The method of claim 44 wherein the authorization code authorizes continued use of the software for a period based on value of the software.
-
49. The method of claim 48 wherein the period is a calendar period of time.
-
50. The method of claim 48 wherein the period is a period of elapsed execution time of the software.
-
51. The method of claim 48 wherein the period is based on a number of times the software has been executed.
-
52. The method of claim 48 wherein the period is based on a version number associated with the software.
-
53. The method of claim 48 wherein the period is based on a new version of the software being released such that the period for authorized use of the user'"'"'s version increases based on a number of subsequently released versions of the software.
Specification