Electrical computers and digital processing systems: support – Multiple computer communication using cryptography – Protection at a particular protocol layer
Reexamination Certificate
2002-05-13
2004-11-02
Sheikh, Ayaz (Department: 2131)
Electrical computers and digital processing systems: support
Multiple computer communication using cryptography
Protection at a particular protocol layer
C705S051000, C713S150000
Reexamination Certificate
active
06813717
ABSTRACT:
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to apparatus and methods for repeatedly contacting software end-users and providing information, such as software passwords to enable continued use, marketing, advertising, and/or promotional material.
2. Background Art
Software developers are often victims of illicit copying and unauthorized use of their software in violation of contractual obligations imposed by licensing agreements and subject to civil and criminal penalties under various domestic and foreign laws. Unauthorized entities range from a relatively small percentage of the total users to an overwhelming majority of illegal users. Such unauthorized use not only amounts to theft of the developers' intellectual property, but also reduces the number of programs sold and therefore the associated profitability of the developer. This may ultimately diminish the creative effort expended by the software developers due to the reduced financial incentive. The advent of the Internet has contributed to the proliferation of pirated software, known as “warez”, which is easily located and readily downloaded.
Various strategies have been employed to make unauthorized duplication and use of software more difficult. One such approach is to provide a hardware “key” which is typically installed in the parallel port of the computer to provide a software interlock. If the key is not in place, the software will not execute. This method is relatively expensive for the developer and cumbersome for the authorized user while remaining vulnerable to theft by duplication of the hardware key.
Another approach requires the user to enter a serial number or customer identification number during installation of the software. Missing or invalid registration information prevents installation of the software. This approach is easily defeated by transferring the serial number or customer identification number to one or more unauthorized users.
Yet another approach requires registering the software with the manufacturer or distributor to obtain an operational code or password necessary for installation of the software. Again, once the operational code or password is obtained, it may be perpetually transferred along with pirated copies to numerous unauthorized users.
Various copy protection strategies have been employed to reduce the number of unauthorized copies available. This approach is generally disfavored by users who may have a legitimate need to make backup or archival copies or transfer a copy to a new computer or hard drive.
While prior art strategies have enjoyed various levels of success in reducing unauthorized use of software, they often impose a significant burden on the authorized users or are easily defeated by unauthorized users. As such, software developers need an apparatus and/or method for reducing unauthorized use of software which does not burden the authorized users to dissuade them from purchasing and using the protected software.
SUMMARY OF THE INVENTION
Thus, one object of the present invention is to provide an apparatus and method for improving software security throughout the lifetime of the software.
Another object of the present invention is to provide an apparatus and method for monitoring the number of users of a software product, both authorized and unauthorized.
Yet another object of the present invention is to provide an apparatus and method for the software manufacturer to maintain contact with the user over an extended period of time to provide repeated opportunities for promotional and marketing purposes, for example.
A further object of the present invention is to provide a method and apparatus for reducing unauthorized use of software which facilitate periodic software updates and forwarding of information, when and if desired.
A still further object of the present invention is to identify those entities responsible for unauthorized copying or use of software so that appropriate action may be taken, such as disabling the software, requesting payment from the user, or seeking civil or criminal penalties.
Another object of the present invention is to provide a method and apparatus for reducing unauthorized software use which deactivates unauthorized copies when an unauthorized user attempts to obtain a password.
In carrying out the above objects and other objects, the present invention provides a method for reducing unauthorized software use. The method includes providing a representative to monitor software license compliance. A first authorization code (or first password) is then associated with the software. The first authorization code enables the software on a computer for use by a user for an initial authorized period. The first authorization code is then supplied with the software. The user is required to enter the first authorization code to at least partially enable the software. The user is required to contact the representative for retrieval of at least one additional authorization code (i.e., at least one additional password). The software is operable during a subsequent authorization period beyond the initial authorization period without further communication with the representative following entry of the at least one additional authorization code.
The user is required to selectively choose either manual or electronic registration and provide registration information to the representative prior to retrieval of the at least one additional authorization code. The registration information includes computer specific information. Previously stored registration information related to at least one of the software, the user, and the computer is compared with the registration information provided by the user to the representative prior to retrieval of the at least one additional authorization code to determine if the user is an unauthorized user. The software is at least partially disabled if the user is an unauthorized user. The software is at least partially disabled following the initial authorized period if the at least one additional authorization code is not entered.
The present invention contemplates, but does not require, more frequent password updates for more complex software because it is generally more costly to develop (and therefore more valuable to users) whereas less costly software would require fewer password updates to reduce administrative costs associated with password maintenance.
Password or authorization code updates may be obtained automatically or manually. Automatic updates are accomplished using electronic communication between the manufacturer's computer (or an authorized representative) and the user's computer. Updates may be performed by a direct modem connection, via email, a web browser, or the like. The particular time and nature of updates and the user interface utilized to implement the updates may vary by manufacturer or product. Manual updates are performed by advance or periodic notifications generated by the software to alert the user that password updates are required or will be required in the near future. The user may then contact the manufacturer for the specific password update via telephone, mail, email, or the like. Password advisories normally occur prior to the periodic termination of the operating period which may be measured by program starts, elapsed running time, calendar period, etc. Password updates may be in the form of alphanumeric and/or encrypted passwords or of any other conventional type.
Preferably, the user must provide registration information prior to receiving the original or updated password or authorization code. Registration information may be entered by the user or automatically acquired (and transmitted for automatic updates) by the software. Registration information may include a serial number, registration number, TCP/IP address, user name, telephone number, computer specific information, etc. This information may be encoded and/or encrypted to make it less susceptible to tampering by unauthorized users. The registration information is pref
Brooks & Kushman P.C.
Revak Christopher
Sheikh Ayaz
z4 Technologies, Inc.
LandOfFree
Method for securing software to reduce unauthorized use does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method for securing software to reduce unauthorized use, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method for securing software to reduce unauthorized use will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3352037