Method and system for prevention of piracy of a given software application via a communications network
DC CAFCFirst Claim
1. A method of preventing piracy of a given software application comprising the steps of:
- assigning a unique identification code to each authentic copy of such software application;
installing the software application in a data storage element on a user'"'"'s computer;
configuring the software application to require service data to activate at least part of its functionality;
requiring the user to communicate user data over a communications network to a remote service provider, the user data being derived, at least in part, from the unique identification code;
examining received user data to derive the unique identification code associated with the copy of the software application installed by said usercounting the number of times an attempt has been made to obtain said service data in order to activate at least part of the functionality of said software application assigned to such unique identification code; and
selectively transmitting service data to the user'"'"'s computer when said remote service provider determines that the number of times an attempt has been made to obtain said service data in order to activate at least part of the functionality of said software application assigned to such unique identification code is fewer than a predetermined threshold, said user'"'"'s computer being connected to said communications network and designated to storably receive said service data.
3 Assignments
Litigations
2 Petitions
Accused Products
Abstract
A method and system for prevention of piracy of a given software application via a communications network, such as the Internet. A given software application, installed on a user system, will not function until it is activated by a remote service provider. This will require the user to provide the remote service provider with user data, such as the user'"'"'s personal identity information and the unique software identification code relating to the specific software. User data will then be compared to archived data in order to determine if the user is a pirator of the software. If not a pirator, the remote service provider may transmit undisclosed service data, such as a software activation code, to the user system. Once activated, the software will become fully operational and allow the user complete access to its functions. In this manner, piracy of a given software application can be prevented.
-
Citations
40 Claims
-
1. A method of preventing piracy of a given software application comprising the steps of:
-
assigning a unique identification code to each authentic copy of such software application; installing the software application in a data storage element on a user'"'"'s computer; configuring the software application to require service data to activate at least part of its functionality; requiring the user to communicate user data over a communications network to a remote service provider, the user data being derived, at least in part, from the unique identification code; examining received user data to derive the unique identification code associated with the copy of the software application installed by said user counting the number of times an attempt has been made to obtain said service data in order to activate at least part of the functionality of said software application assigned to such unique identification code; and selectively transmitting service data to the user'"'"'s computer when said remote service provider determines that the number of times an attempt has been made to obtain said service data in order to activate at least part of the functionality of said software application assigned to such unique identification code is fewer than a predetermined threshold, said user'"'"'s computer being connected to said communications network and designated to storably receive said service data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for preventing piracy of a given software application, said software application having a unique identification code associated therewith, and said software application requiring service data to activate at least part of the functionality of said software application, said system comprising:
-
a user computer system on which a user desires to operate the software application, said user system being connected to a communications network to transmit user data and to receive said service data, said user data being derived at least in part from said unique identification code; a remote service computer system connected to said communications network to receive user data transmitted over the communications network from the user computer system said remote service computer system transmitting said service data to said user computer system when the number of times an attempt has been made to obtain said service data in order to activate at least part of the functionality of said software application assigned to such unique identification code is fewer than a predetermined threshold. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23)
-
-
24. A method of preventing piracy of a given software application comprising the steps of:
-
assigning a unique identification code to each authentic copy of such software application; installing the software application in a data storage element on a user'"'"'s computer; configuring the software application to require service data to activate at least part of its functionality; requiring the user to communicate user data over a communications network to a remote service provider, the user data being derived, at least in part, from the unique identification code; examining received user data to derive the unique identification code associated with said software application; determining the number of times an attempt has been made to obtain said service data in order to activate at least part of the functionality of said software application assigned to such unique identification code; selectively transmitting service data to the user'"'"'s computer when the number of times an attempt has been made to obtain said service data is fewer than a predetermined threshold; and receiving the transmitted service data within the user'"'"'s computer, wherein said service data is used to activate at least part of the functionality of the software application. - View Dependent Claims (25, 26, 27, 28, 29)
-
-
30. A method of preventing piracy of a given software application comprising the steps of:
-
a. assigning a unique identification code to each authentic copy of such software application; b. installing the software application in a data storage element on a user'"'"'s computer; c. configuring the software application to require service data, said service data being a necessary component to enable at least part of the software'"'"'s functionality; d. requiring the user to communicate user data to a remote service provided, the user data being derived, at least in part, from the unique identification code; e. examining received user data to derive the unique identification code associated with said software application; f. determining the number of times an attempt has been made to obtain said service data in order to activate at least part of the functionality of said software application assigned to such unique identification code; g. selectively transmitting service data to the user'"'"'s computer when the number of times an attempt has been made to obtain said service data in order to activate the software application assigned to such unique identification code is fewer than a predetermined threshold; and h. receiving the transmitted service data within the user'"'"'s computer, wherein said service data is used to activate at least part of the functionality of the software. - View Dependent Claims (31, 32, 33, 34, 35)
-
-
36. A method of preventing piracy of a given software application comprising the steps of:
-
a. assigning a unique identification code to each authentic copy of such software application; b. installing the software application in a data storage element on a user'"'"'s computer; c. configuring the software application to require service data, said service data being a necessary component to enable at least part of the software'"'"'s functionality; d. requiring the user to communicate user data to a service provider, the user data being derived, at least in part, from the unique identification code; e. examining received user data to derive the unique identification code associated with said software application; f. ascertaining the number of times an attempt has been made to obtain said service data in order to activate at least part of the functionality of said software application assigned to such unique identification code; and g. determining whether the number of times an attempt has been made to obtain said service data is fewer than a predetermined threshold. - View Dependent Claims (37, 38, 39, 40)
-
Specification