System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
First Claim
1. A method for use with the Internet for detecting pirating of digitized information, comprising:
- providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers;
providing at least one notification related to monitoring of said digitized information for unauthorized activity;
obtaining user agreement to allow said monitoring;
subsequently automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and
determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied; and
automatically determining whether said first identification indicia and said respective second identification indicia have already been sent to said server.
0 Assignments
0 Petitions
Accused Products
Abstract
A system and method for detecting and locating improper or illicit use of digitized information such as illegal pirating, copying, alteration, and the like. The digitized information may include software, digital music, digital movies, multi-media or the like that may be placed on a user'"'"'s computer and possibly copied to other computers. The system or method preferably operates in the background so as to be unnoticeable to the user and preferably does not interfere with operation of the digitized information even if determined that copying or alteration has occurred. Thus, there is little motivation to remove the routine that effects transmission over the Internet to a server of information such as a program identification indicia, a computer identification indicia, program alteration identification. The computer routine may be installed on the user'"'"'s computer by many methods and acts to determine and store the information until such time as an Internet connection is made whereupon the information is transmitted to a server for storage. If information received by the server indicates the same program identification on numerous computers then a signal may be provided or produced that would cause further investigation. The system and method may also provide a routine to detect if alterations have been made to the digitized information to be protected.
36 Citations
34 Claims
-
1. A method for use with the Internet for detecting pirating of digitized information, comprising:
-
providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers;
providing at least one notification related to monitoring of said digitized information for unauthorized activity;
obtaining user agreement to allow said monitoring; subsequently automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and
determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied; and
automatically determining whether said first identification indicia and said respective second identification indicia have already been sent to said server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 14, 15, 16, 21, 23, 25, 26, 30)
-
-
9. A detection system for use with the Internet for compiling information related to pirating of digitized information, comprising:
-
one or more servers in communication with said Internet, one or more storage units associated with said one or more servers;
said digitized information being associated with a first identification indicia that identifies said digitized information;
a first computer routine installed in a plurality of host computers utilizing said digitized information, said first computer routine being operable for determining a second identification indicia for each of said one or more host computers so as to uniquely identify each of said plurality of host computers, said first computer routine being operable for automatically transferring said first identification indicia and said second identification indicia through said Internet to said one or more servers, said one or more servers being programmed for receiving and storing in said one or more storage units said first identification indicia and said second identification indicia for each of said one or more host computers, said first computer routine being installed along with at least one of an operating system or an Internet browser of said plurality of host computers; and
a second computer routine utilized by said one or more servers for determining if said first identification indicia is associated with more than one of said plurality of host computers. - View Dependent Claims (10, 11)
-
-
12. A method for detecting illegal use of a plurality of substantially identical packets of digitized information, comprising:
-
installing a first computer routine in each of a plurality of computers, each of said plurality of computers utilizing one of said substantially identical packets of digitized information, said first computer routine not interfering with use of said packet of digitized information;
associating a first indicia with said packet of digitized information for identifying said packet of digitized information;
utilizing said first computer routine for determining a second indicia related to each of said plurality of computers;
when one of said plurality of computers is presently in communication with a network of computers then sending said first indicia and said second indicia over said network of computers to one or more servers;
storing said first indicia and said second indicia in said one or more servers; and
utilizing a second computer routine in said one or more servers for determining whether said first indicia is associated with more than one of said plurality of computers. - View Dependent Claims (13, 17, 18)
-
-
19. A method for use with the Internet for detecting pirating of digitized information, comprising:
-
providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers and comprises information from a hard drive;
providing at least one notification related to monitoring of said digitized information for unauthorized activity;
obtaining user agreement to allow said monitoring;
subsequently automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and
determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied; and
providing that each of said plurality of packets of digitized information comprise an operating system. - View Dependent Claims (20, 24, 27, 31)
-
-
22. A method for use with the Internet for detecting pirating of digitized information, comprising:
-
providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
associating said first identification indicia with sales information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers;
providing at least one notification related to monitoring of said digitized information for unauthorized activity;
obtaining user agreement to allow said monitoring;
subsequently automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and
determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied; and
providing that each of said plurality of packets of digitized information comprise at least one of an operating system or an Internet browser. - View Dependent Claims (28, 29, 32, 33, 34)
-
Specification