CA2231978A1 - Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software - Google Patents
Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software Download PDFInfo
- Publication number
- CA2231978A1 CA2231978A1 CA002231978A CA2231978A CA2231978A1 CA 2231978 A1 CA2231978 A1 CA 2231978A1 CA 002231978 A CA002231978 A CA 002231978A CA 2231978 A CA2231978 A CA 2231978A CA 2231978 A1 CA2231978 A1 CA 2231978A1
- Authority
- CA
- Canada
- Prior art keywords
- registration
- software
- recipient computer
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000009434 installation Methods 0.000 title claims abstract 9
- 238000000034 method Methods 0.000 claims abstract 7
- 230000004913 activation Effects 0.000 claims 2
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Source code and method to be protected, a software application to be used both during installation of software programs and the running of these software applications, interfacing with the hardware of the recipient computer, in particular to scan and retrieve the hard disk drive part number, in order to track illegal use, illegal installation or illegal copying of software (as well as registering legal use of software). Code is compiled into the install executable of software which will copy two registration files onto recipient computer: one registration file in the active directory of the software being installed, and one registration file in an arbitrary directory of the recipient computer. In addition, an email utility will be installed onto the recipient computer. During installation, the Hard Disk Drive identification number will be stripped from the recipient computer. During installation the user return email address (if available) will be stripped from the recipient computer. Both the Hard Disk Drive identification number and the user return email address will be copied into the registration files placed on recipient computer. In addition, an email will be created including the product registration numbers, the Hard Disk Drive identification number of the recipient computer, and the email return address of the computer user, and this email will be addressed back to our server database maintaining the registration and user information. On the very next connect to the Internet or use of email, the email will be sent to our server maintaining the registration and user database. Every single installation of software utilizing our method will create and send a "registration" email.
A similar piece of code, compiled as a library (like a dll) will be included with the programming of the software utilizing our method. When the program is activated, this code (dll or other form of library) will search for the two registration files copied onto the recipient computer during installation.
If it finds both registration files, and on comparison all information (i.e. the registration numbers, the hard disk drive numbers, and the user return email address) is identical then there is no further action. If it finds only one registration file, or if the information contained in the two registration files copied onto the recipient computer are not identical, then the hard drive identification number stripped from the recipient computer hardware, the user return email address, and the information from the single registration file, or the two conflicting registration files, will be copied into an email addressed to our server database maintaining registration and use information and placed in an "out basket". Upon the next connection to the Internet, or use of email, this email will be sent to our server registration maintainance database.
The database at our server site, managing the registration and use information, will use a querying method based on logic. The first email received is a valid registration. Any subsequent "registration or use" emails which have either incomplete data (i.e. only one registration file) or nonidentical information (ie different hard disk drive identification number and different user return email address) along with the product registration number is the identity of a computer with a pirated copy of software installed.
A similar piece of code, compiled as a library (like a dll) will be included with the programming of the software utilizing our method. When the program is activated, this code (dll or other form of library) will search for the two registration files copied onto the recipient computer during installation.
If it finds both registration files, and on comparison all information (i.e. the registration numbers, the hard disk drive numbers, and the user return email address) is identical then there is no further action. If it finds only one registration file, or if the information contained in the two registration files copied onto the recipient computer are not identical, then the hard drive identification number stripped from the recipient computer hardware, the user return email address, and the information from the single registration file, or the two conflicting registration files, will be copied into an email addressed to our server database maintaining registration and use information and placed in an "out basket". Upon the next connection to the Internet, or use of email, this email will be sent to our server registration maintainance database.
The database at our server site, managing the registration and use information, will use a querying method based on logic. The first email received is a valid registration. Any subsequent "registration or use" emails which have either incomplete data (i.e. only one registration file) or nonidentical information (ie different hard disk drive identification number and different user return email address) along with the product registration number is the identity of a computer with a pirated copy of software installed.
Claims
I claim:
1. A method of installing software and a method of using software which allows the tracking and identification of illegal installation, illegal use, or illegal copying of software onto unauthorized and unlicensed computers, comprising the method steps of:
a) installing two registration files onto recipient computer, on in the active software directory and one in an arbitrary directory.
b) stripping or identification of the recipient hard disk drive part number from computer hardware.
c) stripping or identification of the recipient computer user's return email address.
d) installation of a utility creating email addressed to our server registration and use management database.
e) creating an email on every single installion of software, addressed to our server, containing the registration and computer identification data mentioned in a, b, and c.
f) capacity to send the email created in step a on the next connection made to the Internet or activation of email.
g) copying a similar piece of code in a library (like dll) in the directory containing the software installed.
h) upon activation of program, looking on recipient computer for two registration files with identical information. (If there is only one registration file, or two registration files with conflicting data, then repeat steps b, c, e, and f.)
a) installing two registration files onto recipient computer, on in the active software directory and one in an arbitrary directory.
b) stripping or identification of the recipient hard disk drive part number from computer hardware.
c) stripping or identification of the recipient computer user's return email address.
d) installation of a utility creating email addressed to our server registration and use management database.
e) creating an email on every single installion of software, addressed to our server, containing the registration and computer identification data mentioned in a, b, and c.
f) capacity to send the email created in step a on the next connection made to the Internet or activation of email.
g) copying a similar piece of code in a library (like dll) in the directory containing the software installed.
h) upon activation of program, looking on recipient computer for two registration files with identical information. (If there is only one registration file, or two registration files with conflicting data, then repeat steps b, c, e, and f.)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002231978A CA2231978A1 (en) | 1998-05-20 | 1998-05-20 | Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002231978A CA2231978A1 (en) | 1998-05-20 | 1998-05-20 | Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2231978A1 true CA2231978A1 (en) | 1999-11-20 |
Family
ID=29409439
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002231978A Abandoned CA2231978A1 (en) | 1998-05-20 | 1998-05-20 | Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2231978A1 (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001038989A1 (en) * | 1999-11-26 | 2001-05-31 | Chris Mcnaughton | A system for monitoring use of software |
GB2406664A (en) * | 2003-10-03 | 2005-04-06 | Sendo Int Ltd | Registering an application program of a mobile information device |
US7548878B2 (en) | 2000-06-23 | 2009-06-16 | Assetmetrix, Inc. | Software and hardware component audit and inventory management system |
RU2375739C2 (en) * | 2004-04-30 | 2009-12-10 | Майкрософт Корпорейшн | Method and system for limiting software update |
US7752139B2 (en) | 2005-12-27 | 2010-07-06 | Michael Noel Hu | Method and system for managing software licenses and reducing unauthorized use of software |
CN101645116B (en) * | 2008-08-06 | 2011-11-02 | 武汉大学 | Method for tracking multimedia data pirate |
CN102708332A (en) * | 2012-01-12 | 2012-10-03 | 苏州百正信息科技有限公司 | Method for protecting computer software copyrights by hardware identification codes |
CN109901850A (en) * | 2019-02-21 | 2019-06-18 | 宇龙计算机通信科技(深圳)有限公司 | Software installation method, device, terminal and computer readable storage medium |
-
1998
- 1998-05-20 CA CA002231978A patent/CA2231978A1/en not_active Abandoned
Cited By (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2001038989A1 (en) * | 1999-11-26 | 2001-05-31 | Chris Mcnaughton | A system for monitoring use of software |
US7548878B2 (en) | 2000-06-23 | 2009-06-16 | Assetmetrix, Inc. | Software and hardware component audit and inventory management system |
GB2406664A (en) * | 2003-10-03 | 2005-04-06 | Sendo Int Ltd | Registering an application program of a mobile information device |
GB2406664B (en) * | 2003-10-03 | 2006-12-13 | Sendo Int Ltd | Registering an application program of an information device |
RU2375739C2 (en) * | 2004-04-30 | 2009-12-10 | Майкрософт Корпорейшн | Method and system for limiting software update |
US7752139B2 (en) | 2005-12-27 | 2010-07-06 | Michael Noel Hu | Method and system for managing software licenses and reducing unauthorized use of software |
CN101645116B (en) * | 2008-08-06 | 2011-11-02 | 武汉大学 | Method for tracking multimedia data pirate |
CN102708332A (en) * | 2012-01-12 | 2012-10-03 | 苏州百正信息科技有限公司 | Method for protecting computer software copyrights by hardware identification codes |
CN109901850A (en) * | 2019-02-21 | 2019-06-18 | 宇龙计算机通信科技(深圳)有限公司 | Software installation method, device, terminal and computer readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6073123A (en) | Method and apparatus for detecting unauthorized copies of software | |
US7991995B2 (en) | Method and apparatus for protecting information and privacy | |
US20040260933A1 (en) | Method of preventing tampering of program by using unique number, method of upgrading obfuscated program, and apparatus thereof | |
AU2008203454B2 (en) | Systems & Methods for Preventing Unauthorized Use of Digital Content | |
US7565323B2 (en) | Hardware ID to prevent software piracy | |
US6681212B1 (en) | Internet-based automated system and a method for software copyright protection and sales | |
US6968384B1 (en) | License management system and method for commuter licensing | |
US20020029347A1 (en) | System and method for preventing unauthorized access to electronic data | |
US20050198061A1 (en) | Process and product for selectively processing data accesses | |
CN101414263B (en) | Software installation method and anti-pirate module | |
US20080208754A1 (en) | Method for detecting duplicated instances of a software license | |
US7065506B1 (en) | Method and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device | |
CA2231978A1 (en) | Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software | |
ATE467210T1 (en) | COPY PREVENTION SYSTEM FOR OPTICAL DISKS | |
US8311978B2 (en) | Computer enabled methods to inhibit file and volume name copying and to circumvent same | |
EP2341458B1 (en) | Method and device for detecting if a computer file has been copied | |
CA2310032A1 (en) | Big soft brother | |
JP3161526B2 (en) | Application software copy guard method and system in client-server environment | |
XCP | Extended Copy Protection | |
HK1144844A (en) | Computer enabled method and apparatus to inhibit content and other copying | |
KR20010074203A (en) | Debarment method of illegality copy by e-mail address for Software & License. |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Discontinued |