Method to protect software against unauthorized use

An unlicensed, software-based technology, applied in digital data processing components, internal/peripheral computer component protection, instruments, etc., can solve problems, connect hardware conflicts, limit high-value software applications, etc.

Inactive Publication Date: 2005-02-16
NOKIA TECH OY
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While the use of hardware keys is an effective way to reduce software piracy, other hardware keys can cause problems with their connection to the computer executing the software
Standardized I / O ports are available and technically valid, but often conflict with other connected hardware
Also making hardware keys is expensive and combining with software is quite problematic
Effective hardware keys are therefore economically limited to high-value software applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method to protect software against unauthorized use
  • Method to protect software against unauthorized use
  • Method to protect software against unauthorized use

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] figure 1 A flowchart is given. The flowchart shows an embodiment of the method according to the invention. The given embodiment applies the aforementioned public key encryption method combining the signed public key and the certificate respectively.

[0044] The following will describe typical exemplary solutions to teach the advantages of software protection methods that prevent unauthorized use. Use the online store of the manufacturer or distributor through the Internet or use the traditional store to purchase hardware equipment and corresponding software. If the purchase is made through Internet contact information, then submit the e-mail address or e-mail address to the seller. Put the hardware equipment and the corresponding software together and send it to the buyer. For example, each hardware identification number can be obtained through the serial number of the hardware product. Link the unique hardware identification number and serial number through the database...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention describes a method to protect software against unauthorized use which is bound to at least one certain hardware device. This hardware device comprise unique hardware identification sequences like unique hardware numbers / addresses, serial numbers or other embedded hardware characterization sequences. A special license key has to be passed to the software for enabling activation. The license key contains among other things encrypted hardware identification sequences which are compared with the read out sequences of the accessible hardware devices. The use of the software features is permitted if the sequences match.

Description

Technical field [0001] The present invention generally relates to a method for preventing unauthorized use of software programs, and more particularly to a method for preventing unauthorized use of software programs related to hardware devices. Background technique [0002] Unauthorized use of software is a common problem for software developers and distributors. The use of personal computers at home and in the office has become common in the past ten years. Software and hardware products provide high-level functions and their use has increased. In particular, the use of personal computers at home is still on the rise and will expand further. The more complex the software function and the greater the effort to develop the software, the more important it is to prevent unauthorized use of the software. Although unauthorized copying of computer software is against the law, the widespread availability of pirated software and limited enforcement capabilities have further expanded the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00G06F21/00
CPCG06F21/125G06F2221/0711G06F21/73G06F2221/2115G06F2221/0742G06F21/1063G06F21/1014
Inventor Y·霍洛佩恩
Owner NOKIA TECH OY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products