Method of distributing piracy protected computer software

a technology of computer software and smart cards, applied in the direction of program/content distribution protection, digital data authentication, television systems, etc., can solve the problems of large loss of profits for companies developing and selling computer software, undesirable software piracy, and failure of “backup” copies

Inactive Publication Date: 2011-10-18
ACTIVCARD IRELAND
View PDF35 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0038]wherein the software application execution is at least partially prevented until the data indicative of the authorised use of the software application is received.

Problems solved by technology

Software piracy is causing huge losses in profits for companies developing and selling computer software.
This results in undesirable software piracy.
When a storage medium, such as a floppy disk, that is copy protected becomes damaged, the software provider must replace the storage medium.
Some software providers have included a backup copy of the software application along with the original copy to lessen inconvenience when the original copy is damaged, but sometimes even these “backup” copies fail.
Instead these software providers rely on the honesty of the purchaser, the fact that the documentation is difficult to duplicate, and / or a license agreement that the purchaser is expected to honour.
The license agreement makes it illicit to distribute the software.
Many software providers view convenience as essential for software users and therefore are wary of software piracy protection methods that inconvenience users in any way.
This has many of the aforementioned drawbacks and also is unworkable with CD ROM technology.
Therefore, adding information to a CD ROM during installation is not possible.
In this case, the aforementioned methods of preventing undesired proliferation of pirated software can not be applied; users require some form of backup and this backup is easily distributed to other users.
Also, interception of software by unauthorised third parties is a significant risk to software providers.
Computer security is fast becoming an important issue.
Unfortunately for use in copy protection, security codes are unworkable since the software is easily transferred with the security code.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of distributing piracy protected computer software
  • Method of distributing piracy protected computer software
  • Method of distributing piracy protected computer software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055]With the advent of personal computers, software piracy—copying software in which copyright exists—proliferated. With the implementation of graphical user interfaces, copying software has become a matter of dragging files from an original diskette to a blank diskette. In fact, software piracy is so prolific that it is estimated that more than one half of software in use today is pirated. Obviously, it is in the best interests of software providers to reduce software piracy.

[0056]In the specification and claims that follow all items peripheral to computer functionality such as disk drives including hard disk drives, smart card readers, scanners, keyboards, printers, imaging devices, etc. are referred to as peripheral devices.

[0057]The invention provides a unique method for distribution of piracy-protected software. The method relies on a peripheral device such as a smart card to unlock software in order to permit execution thereof. The smart card is a credit card sized electroni...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method and a system for disabling execution of a software application stored within a computer absent data indicative of an authorized use of the software application are disclosed. At start up or during execution of a software application a user is prompted for user authorization information. Using a processor within a smart card the received user authorization information is compared with user authorization information stored in memory of the smart card to produce a comparison result. If the comparison result is indicative of an authorized user of the software application, then data indicative of the authorized use of the software application is provided from the smart card to the computer. Upon receipt of the data indicative of the authorized use of the software application execution of the software application is continued. When the data is not data indicative of the authorized use of the software application further execution of the software application is disabled. For example, biometric information in the form of a fingerprint may be used for user authorization.

Description

FIELD OF THE INVENTION[0001]This invention relates generally to a method for disabling execution of a software application stored within a computer absent data indicative of an authorised use of the software application and more particularly relates to a method for disabling execution of a software application using a smart card.BACKGROUND OF THE INVENTION[0002]Software piracy is causing huge losses in profits for companies developing and selling computer software. The sale and distribution of software designed for general use is based on the assumption that a software provider only wishes to sell a right to use the software to one person or to a select group of people. The seller specifically does not wish the purchaser to distribute the software to other users or to resell the software. Various methods are employed to prevent the purchaser from distributing the software. The most common method of software distribution is via a storage medium. The user is often unrestricted from ei...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L9/32G06F7/04G06F21/22G06F21/00
CPCG06F21/10G06F21/123G06F21/32
Inventor BORZA, STEPHEN J.
Owner ACTIVCARD IRELAND
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products