Systems and methods for using machine attributes to deter software piracy in an enterprise environment
First Claim
Patent Images
1. A computer-implemented method of deterring software piracy in a volume license environment, comprising:
- collecting at least one machine attribute from each of at least three computing devices of the volume license environment and hashing the collected machine attributes to form a first data;
receiving a volume license key embedded within a volume license file, the volume license key including the first data;
authenticating the volume license file using a second data derived from the collected machine attributes of the volume license environment; and
activating a software package associated with the volume license key on at least one of the at least three computing devices in the volume license environment in response to authenticating the volume license file;
wherein the volume license key and volume license file are associated with the software package for installation on a plurality of computing devices including the at least three computing device.
2 Assignments
0 Petitions
Accused Products
Abstract
A method, system and computer-readable medium for deterring software piracy in a volume license environment. A volume license key embedded within a volume license file is received. The volume license key has first data derived from at least one machine attribute of the environment. The volume license file is authenticated using second data derived from at least one machine attribute of the environment. A software package associated with the volume license key is then activated on at least one computing device in the environment.
-
Citations
11 Claims
-
1. A computer-implemented method of deterring software piracy in a volume license environment, comprising:
-
collecting at least one machine attribute from each of at least three computing devices of the volume license environment and hashing the collected machine attributes to form a first data; receiving a volume license key embedded within a volume license file, the volume license key including the first data; authenticating the volume license file using a second data derived from the collected machine attributes of the volume license environment; and activating a software package associated with the volume license key on at least one of the at least three computing devices in the volume license environment in response to authenticating the volume license file; wherein the volume license key and volume license file are associated with the software package for installation on a plurality of computing devices including the at least three computing device. - View Dependent Claims (2, 3, 4)
-
-
5. A system for deterring software piracy in a computing environment including a plurality of computing devices, the system comprising:
-
at least three computing devices; a computer processor, the processor; receiving a software package associated with a volume license key that is embedded within a volume license file, the volume license key including a first data, the first data having a hashed value derived from at least one machine attribute collected from each of the at least three computing devices of the computing environment; executing an authentication routine for deriving a second data from the collected machine attribute attributes of the computing environment and comparing the second data to the first data; and executing an activation routine for activating the software package on at least one of the at least three computing devices according to the volume license key and in response to authenticating the volume license file; wherein the volume license key and volume license file are associated with the software package for installation on the plurality of computing devices including the at least three computing device. - View Dependent Claims (6, 7)
-
-
8. A computer-readable storage medium having computer-executable instructions stored thereon, the instructions when executed by a processor causing the processor to implement a method of deterring software piracy in a volume license environment, the method comprising:
-
collecting at least one machine attribute from each of at least three computing devices of the volume license environment and hashing the collected machine attributes to form a first data; receiving a volume license key embedded within a volume license file, the volume license key including the first data; authenticating the volume license file using a second data derived from the collected machine attributes of the volume license environment; and activating a software package associated with the volume license key on at least one of the at least three computing devices in the volume license environment in response to authenticating the volume license file; wherein the volume license key and volume license file are associated with the software package for installation on a plurality of computing devices including the at least three computing device. - View Dependent Claims (9, 10, 11)
-
Specification