Post-production preparation of an unprotected installation image for downloading as a protected software product
First Claim
1. A method for altering an unprotected software installation image to install a protected version of an unprotected executable file included in the installation image, instead of installing the unprotected executable file, the method involving assembling a master installation image at a server, the master installation image for download from a server to a target computer, wherein the master installation image is assembled by:
- receiving, by the server, a first executable file comprising the unprotected software installation image configured for installing the unprotected executable file in the target computer;
receiving, a second executable file comprising the protected version of the unprotected executable file that is identical in function to the unprotected executable file except for incorporating additional code configured to protect the unprotected executable file from unauthorized use;
receiving a third executable file configured with instructions for replacing the unprotected executable file with the protected version of the unprotected executable file in a computer-readable medium, in response to completion of installation of the unprotected executable file in the computer-readable medium; and
integrating, at the server, the unprotected installation image, the protected version of the unprotected executable file, and the third executable file to produce the master installation image configured for installing the protected version of the unprotected executable file instead of the unprotected executable file.
2 Assignments
0 Petitions
Accused Products
Abstract
An installation image for installing an unprotected software product is used to install a protected version of the same product. A protected version of the executable file is embedded in a new installation image with the original installation image, in which the unprotected version of the executable file is damaged so as to be unusable and unreadable. The new installation image causes the original installation image to operate, installing the damaged installation file and other data files. The new installation image then replaces the damaged installation file with the protected installation file.
114 Citations
9 Claims
-
1. A method for altering an unprotected software installation image to install a protected version of an unprotected executable file included in the installation image, instead of installing the unprotected executable file, the method involving assembling a master installation image at a server, the master installation image for download from a server to a target computer, wherein the master installation image is assembled by:
-
receiving, by the server, a first executable file comprising the unprotected software installation image configured for installing the unprotected executable file in the target computer; receiving, a second executable file comprising the protected version of the unprotected executable file that is identical in function to the unprotected executable file except for incorporating additional code configured to protect the unprotected executable file from unauthorized use; receiving a third executable file configured with instructions for replacing the unprotected executable file with the protected version of the unprotected executable file in a computer-readable medium, in response to completion of installation of the unprotected executable file in the computer-readable medium; and integrating, at the server, the unprotected installation image, the protected version of the unprotected executable file, and the third executable file to produce the master installation image configured for installing the protected version of the unprotected executable file instead of the unprotected executable file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
Specification