Software signature tracking
First Claim
1. A method for preventing unauthorized use of software, comprising:
- recording, using a computer, an indication of at least one selected file of a software application in a memory location accessible to a security component of the software application, in which software application the security component is configured to cause a hash signature of the at least one selected file to be generated in response to a use event for the software application;
hashing the at least one selected file to generate a first file signature;
transmitting the first file signature to a secure network-accessible computer memory for storage and subsequent comparison to at least one subsequent file signature generated via operation of the security component on a client device;
comparing the first file signature to a second file signature generated by the security component in response to a signal arising from use of the software application on the client device;
storing metadata identifying the client device, the software application, and a date that the second file signature is generated, in a database of file signature data;
storing results from comparing the second file signature to the first file signature, in association with an identifier for the client device; and
disabling the software application on the client device, in response to determining that the first file signature does not match the second file signature.
4 Assignments
0 Petitions
Accused Products
Abstract
A method for preventing unauthorized use of software may be achieved by executing computer-readable code with instructions for recording an indication of at least one selected file of a software application in a memory location accessible to a security component of the software application, in which software application the security component is configured to cause a hash signature of the at least one selected file to be generated in response to a signal arising from use of the software application, hashing the at least one selected file to generate a first file signature, transmitting the first file signature to a secure network-accessible computer memory for storage and subsequent comparison to at least one subsequent file signature generated via operation of the security component on a client device, comparing the first file signature to a second file signature generated by the security component in response to a signal arising from use of the software application on the client device, and disabling the software application on the client device, in response to determining that the first file signature does not match the second file signature.
122 Citations
14 Claims
-
1. A method for preventing unauthorized use of software, comprising:
-
recording, using a computer, an indication of at least one selected file of a software application in a memory location accessible to a security component of the software application, in which software application the security component is configured to cause a hash signature of the at least one selected file to be generated in response to a use event for the software application; hashing the at least one selected file to generate a first file signature; transmitting the first file signature to a secure network-accessible computer memory for storage and subsequent comparison to at least one subsequent file signature generated via operation of the security component on a client device; comparing the first file signature to a second file signature generated by the security component in response to a signal arising from use of the software application on the client device; storing metadata identifying the client device, the software application, and a date that the second file signature is generated, in a database of file signature data; storing results from comparing the second file signature to the first file signature, in association with an identifier for the client device; and disabling the software application on the client device, in response to determining that the first file signature does not match the second file signature. - View Dependent Claims (2, 3, 4, 5, 6, 7, 14)
-
-
8. A method for preventing unauthorized use of software, comprising:
-
generating a file signature of a designated executable file installed on a client device, using a hashing algorithm, in response to use of an application of which the designated executable file is a component; causing the file signature to be compared to an earlier file signature determined for the designated executable file to obtain comparison results indicating whether the file signature matches the earlier file signature by transmitting the file signature to a remote device with metadata (i) describing the application, (ii) including a date that the file signature is generated, and (iii) indicating an identifier for the client device for comparison to the earlier file signature, and receiving the comparison results in response; and disabling use of the application on the client device in response to the comparison results. - View Dependent Claims (9)
-
-
10. A non-transitory computer-readable medium encoded with instructions, that when executed by a processor, cause a computer to:
-
generate a file signature of a designated executable file installed on a client device, using a hashing algorithm, in response to use of an application of which the designated executable file is a component; transmit the file signature to a remote device with metadata (i) describing the application, (ii) indicating a date that the second file signature is generated, and (iii) indicating an identifier for the client device; initiate a comparison between the file signature and an earlier file signature determined for the designated executable file to obtain comparison results indicating whether the file signature matches the earlier file signature; and disable use of the application in response to the comparison results. - View Dependent Claims (11, 12)
-
-
13. A system for preventing unauthorized use of software, comprising:
-
a computer having a processor; memory coupled to the computer and encoded with instructions, that when executed by the processor, cause the computer to; generate a file signature of a designated executable file installed on the computer, using a hashing algorithm, in response to use of an application of which the designated executable file is a component; generate an identifier for the computer from a combination of non-user-configurable device identifiers encoded by different manufacturers; transmit the file signature to a remote device with metadata indicating the identifier for the computer, the application, and a date that the file signature is generated; initiate a comparison between the file signature and an earlier file signature determined for the designated executable file to obtain comparison results indicating whether the file signature matches the earlier file signature; and disable use of the application in response to the comparison results.
-
Specification