[go: up one dir, main page]

CA2231978A1 - Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software - Google Patents

Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software Download PDF

Info

Publication number
CA2231978A1
CA2231978A1 CA002231978A CA2231978A CA2231978A1 CA 2231978 A1 CA2231978 A1 CA 2231978A1 CA 002231978 A CA002231978 A CA 002231978A CA 2231978 A CA2231978 A CA 2231978A CA 2231978 A1 CA2231978 A1 CA 2231978A1
Authority
CA
Canada
Prior art keywords
registration
software
email
recipient computer
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002231978A
Other languages
French (fr)
Inventor
Andre J. Brisson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA002231978A priority Critical patent/CA2231978A1/en
Publication of CA2231978A1 publication Critical patent/CA2231978A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

Source code and method to be protected, a software application to be used both during installation of software programs and the running of these software applications, interfacing with the hardware of the recipient computer, in particular to scan and retrieve the hard disk drive part number, in order to track illegal use, illegal installation or illegal copying of software (as well as registering legal use of software). Code is compiled into the install executable of software which will copy two registration files onto recipient computer: one registration file in the active directory of the software being installed, and one registration file in an arbitrary directory of the recipient computer. In addition, an email utility will be installed onto the recipient computer. During installation, the Hard Disk Drive identification number will be stripped from the recipient computer. During installation the user return email address (if available) will be stripped from the recipient computer. Both the Hard Disk Drive identification number and the user return email address will be copied into the registration files placed on recipient computer. In addition, an email will be created including the product registration numbers, the Hard Disk Drive identification number of the recipient computer, and the email return address of the computer user, and this email will be addressed back to our server database maintaining the registration and user information. On the very next connect to the Internet or use of email, the email will be sent to our server maintaining the registration and user database. Every single installation of software utilizing our method will create and send a "registration" email.
A similar piece of code, compiled as a library (like a dll) will be included with the programming of the software utilizing our method. When the program is activated, this code (dll or other form of library) will search for the two registration files copied onto the recipient computer during installation.
If it finds both registration files, and on comparison all information (i.e. the registration numbers, the hard disk drive numbers, and the user return email address) is identical then there is no further action. If it finds only one registration file, or if the information contained in the two registration files copied onto the recipient computer are not identical, then the hard drive identification number stripped from the recipient computer hardware, the user return email address, and the information from the single registration file, or the two conflicting registration files, will be copied into an email addressed to our server database maintaining registration and use information and placed in an "out basket". Upon the next connection to the Internet, or use of email, this email will be sent to our server registration maintainance database.
The database at our server site, managing the registration and use information, will use a querying method based on logic. The first email received is a valid registration. Any subsequent "registration or use" emails which have either incomplete data (i.e. only one registration file) or nonidentical information (ie different hard disk drive identification number and different user return email address) along with the product registration number is the identity of a computer with a pirated copy of software installed.

Claims

The embodiments of the invention in which an exclusive property or priviledge is claimed are defined as follows:
I claim:
1. A method of installing software and a method of using software which allows the tracking and identification of illegal installation, illegal use, or illegal copying of software onto unauthorized and unlicensed computers, comprising the method steps of:
a) installing two registration files onto recipient computer, on in the active software directory and one in an arbitrary directory.
b) stripping or identification of the recipient hard disk drive part number from computer hardware.
c) stripping or identification of the recipient computer user's return email address.
d) installation of a utility creating email addressed to our server registration and use management database.
e) creating an email on every single installion of software, addressed to our server, containing the registration and computer identification data mentioned in a, b, and c.
f) capacity to send the email created in step a on the next connection made to the Internet or activation of email.
g) copying a similar piece of code in a library (like dll) in the directory containing the software installed.
h) upon activation of program, looking on recipient computer for two registration files with identical information. (If there is only one registration file, or two registration files with conflicting data, then repeat steps b, c, e, and f.)
CA002231978A 1998-05-20 1998-05-20 Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software Abandoned CA2231978A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002231978A CA2231978A1 (en) 1998-05-20 1998-05-20 Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA002231978A CA2231978A1 (en) 1998-05-20 1998-05-20 Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software

Publications (1)

Publication Number Publication Date
CA2231978A1 true CA2231978A1 (en) 1999-11-20

Family

ID=29409439

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002231978A Abandoned CA2231978A1 (en) 1998-05-20 1998-05-20 Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software

Country Status (1)

Country Link
CA (1) CA2231978A1 (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001038989A1 (en) * 1999-11-26 2001-05-31 Chris Mcnaughton A system for monitoring use of software
GB2406664A (en) * 2003-10-03 2005-04-06 Sendo Int Ltd Registering an application program of a mobile information device
US7548878B2 (en) 2000-06-23 2009-06-16 Assetmetrix, Inc. Software and hardware component audit and inventory management system
RU2375739C2 (en) * 2004-04-30 2009-12-10 Майкрософт Корпорейшн Method and system for limiting software update
US7752139B2 (en) 2005-12-27 2010-07-06 Michael Noel Hu Method and system for managing software licenses and reducing unauthorized use of software
CN101645116B (en) * 2008-08-06 2011-11-02 武汉大学 Method for tracking multimedia data pirate
CN102708332A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Method for protecting computer software copyrights by hardware identification codes
CN109901850A (en) * 2019-02-21 2019-06-18 宇龙计算机通信科技(深圳)有限公司 Software installation method, device, terminal and computer readable storage medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2001038989A1 (en) * 1999-11-26 2001-05-31 Chris Mcnaughton A system for monitoring use of software
US7548878B2 (en) 2000-06-23 2009-06-16 Assetmetrix, Inc. Software and hardware component audit and inventory management system
GB2406664A (en) * 2003-10-03 2005-04-06 Sendo Int Ltd Registering an application program of a mobile information device
GB2406664B (en) * 2003-10-03 2006-12-13 Sendo Int Ltd Registering an application program of an information device
RU2375739C2 (en) * 2004-04-30 2009-12-10 Майкрософт Корпорейшн Method and system for limiting software update
US7752139B2 (en) 2005-12-27 2010-07-06 Michael Noel Hu Method and system for managing software licenses and reducing unauthorized use of software
CN101645116B (en) * 2008-08-06 2011-11-02 武汉大学 Method for tracking multimedia data pirate
CN102708332A (en) * 2012-01-12 2012-10-03 苏州百正信息科技有限公司 Method for protecting computer software copyrights by hardware identification codes
CN109901850A (en) * 2019-02-21 2019-06-18 宇龙计算机通信科技(深圳)有限公司 Software installation method, device, terminal and computer readable storage medium

Similar Documents

Publication Publication Date Title
US6073123A (en) Method and apparatus for detecting unauthorized copies of software
US7991995B2 (en) Method and apparatus for protecting information and privacy
US20040260933A1 (en) Method of preventing tampering of program by using unique number, method of upgrading obfuscated program, and apparatus thereof
AU2008203454B2 (en) Systems & Methods for Preventing Unauthorized Use of Digital Content
US7565323B2 (en) Hardware ID to prevent software piracy
US6681212B1 (en) Internet-based automated system and a method for software copyright protection and sales
US6968384B1 (en) License management system and method for commuter licensing
US20020029347A1 (en) System and method for preventing unauthorized access to electronic data
US20050198061A1 (en) Process and product for selectively processing data accesses
CN101414263B (en) Software installation method and anti-pirate module
US20080208754A1 (en) Method for detecting duplicated instances of a software license
US7065506B1 (en) Method and apparatus to inhibit illicit copying from a record carrier to a computer-readable data storage device
CA2231978A1 (en) Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software
ATE467210T1 (en) COPY PREVENTION SYSTEM FOR OPTICAL DISKS
US8311978B2 (en) Computer enabled methods to inhibit file and volume name copying and to circumvent same
EP2341458B1 (en) Method and device for detecting if a computer file has been copied
CA2310032A1 (en) Big soft brother
JP3161526B2 (en) Application software copy guard method and system in client-server environment
XCP Extended Copy Protection
HK1144844A (en) Computer enabled method and apparatus to inhibit content and other copying
KR20010074203A (en) Debarment method of illegality copy by e-mail address for Software & License.

Legal Events

Date Code Title Description
FZDE Discontinued