System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
DCFirst Claim
1. A method for use with the Internet for detecting pirating of digitized information, comprising:
- providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers;
automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and
determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied.
0 Assignments
Litigations
0 Petitions
Accused Products
Abstract
A system and method for detecting and locating improper or illicit use of digitized information such as illegal pirating, copying, alteration, and the like. The digitized information may include software, digital music, digital movies, multimedia or the like that may be placed on a user'"'"'s computer and possibly copied to other computers. The system or method preferably operates in the background so as to be unnoticeable to the user and preferably does not interfere with operation of the digitized information even if determined that copying or alteration has occurred. Thus, there is little motivation to remove the routine that effects transmission over the Internet to a server of information such as a program identification indicia, a computer identification indicia, program alteration identification. The computer routine may be installed on the user'"'"'s computer by many methods and acts to determine and store the information until such time as an Internet connection is made whereupon the information is transmitted to a server for storage. If information received by the server indicates the same program identification on numerous computers then a signal may be provided or produced that would cause further investigation. The system and method may also provide a routine to detect if alterations have been made to the digitized information to be protected.
139 Citations
18 Claims
-
1. A method for use with the Internet for detecting pirating of digitized information, comprising:
-
providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers;
automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and
determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 14, 15, 16)
automatically determining whether one of said plurality of substantially identical packets of digitized information has been altered, and automatically sending information related to whether said one of said plurality of substantially identical packets of digitized information has been altered.
-
-
3. The method of claim 1, further comprising:
-
determining whether one of said plurality of computers in connected to an intranet that includes a plurality of intranet computers, storing intranet information concerning said first identification indicia and one or more of said plurality of intranet computers, and transmitting said intranet information to said server.
-
-
4. The method of claim 3, further comprising:
determining whether said first identification indicia is associated with more than one of said plurality of intranet computers.
-
5. The method of claim 1, further comprising:
automatically determining whether said first identification indicia and said respective second identification indicia have already been sent to said server.
-
6. The method of claim 5, further comprising:
when said first identification indicia and said respective second identification indicia have already been send to said server, then delaying said step of automatically sending until said first identification indicia or said respective second identification indicia have changed.
-
7. The method of claim 1, further comprising:
-
connecting to said server from a monitoring computer, and obtaining said stored information regarding said first identification indicia and said second identification indicia with said monitoring computer.
-
-
8. The method of claim 1, further comprising:
-
storing additional information related to one of said plurality of substantially identical packets of digital information to comprise stored additional data; and
relating said stored additional data with said first identification indicia and said second identification indicia.
-
-
14. The method of claim 1, further comprising:
providing that each of said plurality of packets of digitized information comprise at least one of an Internet browser or an operating system.
-
15. The method of claim 14, herein:
said each of said packets of digitized information comprises an Internet browser.
-
16. The method of claim 14, wherein:
said each of said packets of digitized information comprises an operating system.
-
9. A detection system for use with the Internet for compiling information related to pirating of digitized information, comprising:
-
one or more servers in communication with said Internet, one or more storage units associated with said one or more servers;
said digitized information being associated with a first identification indicia that identifies said digitized information;
a first computer routine installed in a plurality of host computers utilizing said digitized information, said first computer routine being operable for determining a second identification indicia for each of said one or more host computers so as to uniquely identify each of said plurality of host computers, said first computer routine being operable for automatically transferring said first identification indicia and said second identification indicia through said Internet to said one or more servers, said one or more servers being programmed for receiving and storing in said one or more storage units said first identification indicia and said second identification indicia for each of said one or more host computers, said first computer routine being installed along with at least one of an operating system or an Internet browser of said plurality of host computers; and
a second computer routine utilized by said one or more servers for determining if said first identification indicia is associated with more than one of said plurality of host computers.- View Dependent Claims (10, 11)
said first computer routine determining if said digitized information has been altered so as to produce an alteration of said digitized information, if said digitized information has been altered said first computer routine indicating said alteration to said server.
-
-
11. The detection system of claim 9, wherein said first computer routine produces a third indicia related to said alteration and transmits said third indicia to said server such that said third indicia is stored in said one or more storage units and is associated with said first identification indicia and said second identification indicia.
-
12. A method for detecting illegal use of a plurality of substantially identical packets of digitized information, comprising:
-
installing a first computer routine in each of a plurality of computers, each of said plurality of computers utilizing one of said substantially identical packets of digitized information, said first computer routine not interfering with use of said packet of digitized information;
associating a first indicia with said packet of digitized information for identifying said packet of digitized information;
utilizing said first computer routine for determining a second indicia related to each of said plurality of computers;
when one of said plurality of computers is presently in communication with a network of computers then sending said first indicia and said second indicia over said network of computers to one or more servers;
storing said first indicia and said second indicia in said one or more servers; and
utilizing a second computer routine in said one or more servers for determining whether said first indicia is associated with more than one of said plurality of computers. - View Dependent Claims (13, 17, 18)
determining whether said packet of digitized information has been altered and when said one of said plurality of computers is presently in communication with said network of computers then automatically sending said determination of whether said digitized information has been altered over said network of computers to said second location.
-
-
17. The method of claim 12, further comprising:
-
determining whether one of said plurality of computers is connected to an intranet that includes a plurality of intranet computers, storing intranet information concerning said first identification indicia and one or more of said plurality of intranet computers, and transmitting said intranet information.
-
-
18. The method of claim 12, further comprising:
automatically determining whether one of said plurality of computers is presently in communication with a network of computers.
Specification