Activation code system and method for preventing software piracy
First Claim
1. A method for preventing piracy of software installable in a data storage element on a user'"'"'s computer, the method comprising:
- (a) receiving, using a remote service system, a unique identification code comprising an elongated alphanumeric code sequence that uniquely identifies an authentic copy of the software;
(b) updating, using the remote service system, a number of activation attempts for the authentic copy of the software based on the unique identification code, and independent of an identity of a user and an identity of the user'"'"'s computer;
(c) transmitting, using the remote service system, an activation code to the user'"'"'s computer that activates at least part of the functionality of the authentic copy of the software, when the number of activation attempts is less than a predetermined threshold;
(d) blacklisting, using the remote service system, the unique identification code when the number of activation attempts is not less than the predetermined threshold; and
(e) transmitting a notification, using the remote service system, to a registered user corresponding to the unique identification code when the unique identification code is blacklisted.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for preventing piracy of a given software application limits the number of times that such software application is activated. A given software application must be activated in order to become fully functional. The user must provide a unique software identification code, relating to the specific software which the user is attempting to activate, to a remote provider. The remote provider determines the number of times that such specific software has already been activated, and provides an activation code to the user unless the number of activations exceeds a predetermined threshold. Once activated, the software becomes fully operational, and the user is allowed complete access to its functions.
-
Citations
6 Claims
-
1. A method for preventing piracy of software installable in a data storage element on a user'"'"'s computer, the method comprising:
-
(a) receiving, using a remote service system, a unique identification code comprising an elongated alphanumeric code sequence that uniquely identifies an authentic copy of the software; (b) updating, using the remote service system, a number of activation attempts for the authentic copy of the software based on the unique identification code, and independent of an identity of a user and an identity of the user'"'"'s computer; (c) transmitting, using the remote service system, an activation code to the user'"'"'s computer that activates at least part of the functionality of the authentic copy of the software, when the number of activation attempts is less than a predetermined threshold; (d) blacklisting, using the remote service system, the unique identification code when the number of activation attempts is not less than the predetermined threshold; and (e) transmitting a notification, using the remote service system, to a registered user corresponding to the unique identification code when the unique identification code is blacklisted. - View Dependent Claims (2, 3, 4)
-
-
5. A method for preventing piracy of software installable in a data storage element on a user'"'"'s computer, the method comprising:
-
(a) receiving, using a remote service system, user data including (i) personal identification information of the user and (ii) a unique identification code that uniquely identifies a registered copy of the software; (b) determining, through comparison of the user data to data archived in the remote service system, whether the user data indicates a valid request to activate software registered to the user; (c) determining that the unique identification code is not blacklisted; and
if so,(d) transmitting, using the remote service system, service data to the user'"'"'s computer that activates at least part of the functionality of the registered copy of the software, the service data comprising (i) a program file missing from the software, the missing program file being necessary for the software to function, and (ii) instructions for installing the missing program file to activate the software. - View Dependent Claims (6)
-
Specification