Method for preventing illegal use of software
First Claim
1. A computer system for preventing illegal use of software, the system comprising:
- a data storage device controller comprisinga data processing apparatus, anda non-transitory computer data storage encoded with a computer program for preventing illegal use of software, the software comprising computer instructions or data encoded on a data storage device, the data storage device comprising computer components and recording media that retain digital data and being connected to the computer system,wherein the computer program comprises instructions that when executed by the data processing apparatus cause the data storage device controller to perform operations comprising;
dedicating, controlling and managinga first dedicated area on the data storage device comprisinga first sub-dedicated area for isolated checking whether the software is properly installed and is not illegally modified, anda second sub-dedicated area for final installing of software from recognized software developers, where the recognized software developers are listed on a list of recognized software developers, anda second dedicated area on the data storage device for final installing of software from unrecognized software developers, where the unrecognized developers are not listed on the list of recognized software developers; and
checking whether the software is properly installed by;
installing the software to a first sub-dedicated area of the data storage device;
checking the data storage device to obtain detailed information about the installed software;
obtaining detailed information about the software which is provided by a recognized software developer; and
comparing the detailed information obtained from the data storage device with the detailed information which is provided by the recognized software developer; and
if a result of the above comparison is that the obtained two pieces of detailed information are the same, thendetermining that the software has been properly installed on the data storage device; and
reinstalling the software from the first sub-dedicated area of the data storage device to a second sub-dedicated area of the data storage device, if the software is provided by recognized software developers or to a second dedicated area of the data storage device, if the software is provided by unrecognized software developers;
otherwise, if the result of the above comparison is that the obtained two pieces of detailed information are different, thendetermining that the software is not properly installed on the data storage device; and
deleting the installed software from the first sub-dedicated area of the data storage device, andwherein the operations further comprise;
checking whether the software has to be paid for use;
if the software is free for use then allowing a user to use the software normally;
otherwise, if the software has to be paid for use thenchecking whether a user has already performed a payment process;
if the user has not performed the payment process then blocking the launch of the software;
otherwise, if the user has already made the payment thendetermining an available time period of software usage for user logged on to the computer system;
if the software has been used for a period of time that is less than the determined available time period then allowing the user to use the software normally;
otherwise, if the software has been used for a period of time that is longer than the determined available time period then
prompting the user to perform the payment process once more; and
terminating an execution of the software, if the user does not perform the payment process once more in response of said prompting.
0 Assignments
0 Petitions
Accused Products
Abstract
Apparatus, techniques and systems for preventing illegal use of software and other digital files based on operations of a data storage device controller in a computer or computer system. For example, a method for preventing illegal use of software includes: configuring a computer to use a data storage device controller to control use of each digital file stored on one or more data storage devices; before a use of each digital file, operating the data storage device controller to access a storage device on which the digital file is stored to check whether the digital file meets a condition for use; and operating the data storage device controller to block use of the digital file when the condition is not met and to allow execution of the digital file when the condition is met. The digital file can be an application software or other digital documents.
-
Citations
24 Claims
-
1. A computer system for preventing illegal use of software, the system comprising:
-
a data storage device controller comprising a data processing apparatus, and a non-transitory computer data storage encoded with a computer program for preventing illegal use of software, the software comprising computer instructions or data encoded on a data storage device, the data storage device comprising computer components and recording media that retain digital data and being connected to the computer system, wherein the computer program comprises instructions that when executed by the data processing apparatus cause the data storage device controller to perform operations comprising; dedicating, controlling and managing a first dedicated area on the data storage device comprising a first sub-dedicated area for isolated checking whether the software is properly installed and is not illegally modified, and a second sub-dedicated area for final installing of software from recognized software developers, where the recognized software developers are listed on a list of recognized software developers, and a second dedicated area on the data storage device for final installing of software from unrecognized software developers, where the unrecognized developers are not listed on the list of recognized software developers; and checking whether the software is properly installed by; installing the software to a first sub-dedicated area of the data storage device; checking the data storage device to obtain detailed information about the installed software; obtaining detailed information about the software which is provided by a recognized software developer; and comparing the detailed information obtained from the data storage device with the detailed information which is provided by the recognized software developer; and if a result of the above comparison is that the obtained two pieces of detailed information are the same, then determining that the software has been properly installed on the data storage device; and reinstalling the software from the first sub-dedicated area of the data storage device to a second sub-dedicated area of the data storage device, if the software is provided by recognized software developers or to a second dedicated area of the data storage device, if the software is provided by unrecognized software developers; otherwise, if the result of the above comparison is that the obtained two pieces of detailed information are different, then determining that the software is not properly installed on the data storage device; and deleting the installed software from the first sub-dedicated area of the data storage device, and wherein the operations further comprise; checking whether the software has to be paid for use; if the software is free for use then allowing a user to use the software normally; otherwise, if the software has to be paid for use then checking whether a user has already performed a payment process; if the user has not performed the payment process then blocking the launch of the software; otherwise, if the user has already made the payment then determining an available time period of software usage for user logged on to the computer system; if the software has been used for a period of time that is less than the determined available time period then allowing the user to use the software normally; otherwise, if the software has been used for a period of time that is longer than the determined available time period then
prompting the user to perform the payment process once more; and
terminating an execution of the software, if the user does not perform the payment process once more in response of said prompting. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification