CA2310032A1 - Big soft brother - Google Patents
Big soft brother Download PDFInfo
- Publication number
- CA2310032A1 CA2310032A1 CA002310032A CA2310032A CA2310032A1 CA 2310032 A1 CA2310032 A1 CA 2310032A1 CA 002310032 A CA002310032 A CA 002310032A CA 2310032 A CA2310032 A CA 2310032A CA 2310032 A1 CA2310032 A1 CA 2310032A1
- Authority
- CA
- Canada
- Prior art keywords
- registration
- software
- computer
- recipient computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000009434 installation Methods 0.000 claims abstract 10
- 238000000034 method Methods 0.000 claims abstract 6
- 238000012423 maintenance Methods 0.000 abstract 1
- 230000002093 peripheral effect Effects 0.000 abstract 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2117—User registration
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Signal Processing (AREA)
- Multimedia (AREA)
- Computer Networks & Wireless Communication (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
Source code and method to be protected, a software application to be used both during installation of software programs and the running of these software applications, interfacing with the hardware of the recipient computer, in particular to scan and retrieve the MAC number (a unique part identifier associated with modems and Ethernet cards), in order to track illegal use, illegal installation or illegal copying of software (as well as registering legal use of software). Code is compiled into the install or setup executable of software that will copy registration files into recipient computer registries.
In addition, an email utility will be installed onto the recipient computer. During installation and setup of software, the MAC identification number will be stripped from the recipient computer along with other innocuous information such as product serial number, ip provider and email addresses. Both the MAC identification number, the user return email address, the product serial number and the IP provider identifier will be copied into the registration files placed into the recipient computer's registries. In addition, an email will be created including the product registration numbers, the MAC identification number of the recipient computer, the email return address and the IP provider of the computer user, and this email will be addressed back to our server database maintaining the registration and user information. On the very next connect to the Internet or use of email, or by utilizing a unique port, the email registration packet will be sent to our server maintaining the registration and user database. Every single installation of software to a new machine, or a machine with a changed peripheral, utilizing our method will create and send a "registration" email.
An additional piece of code will be included with the utility. During the boot up of the computer, and periodically, this code will search for the presence of the registration file copied onto the recipient computer during installation. It will look for its presences and determine whether it has been tampered with. If it finds both registration file, and on comparison all information (i.e. the registration numbers, the MAC numbers, the user return email address, and the IP provider is identical then there is no further action. If it finds that the registries have been changed, it will rewrite the registry correctly and create another registration packet. Upon the next connection to the Internet, or the use of email, or through a unique port this email will be sent to our server registration maintenance database.
The database at our server site, managing the registration and user information, will use a querying method based on logic. The first email received is a valid registration.
Subsequent installations may or may not be legitimate. Any subsequent "registration or installation" emails which have either incomplete data or different information (i.e.
different MAC identification numbers and different user return email address etc.) along with the same product registration number is the identity of a computer with a pirated copy of software installed.
In addition, because of privacy concern issues from the public we have added the ability for software developers to choose the level of notification to users and the transparency of the registration collection.
In addition, an email utility will be installed onto the recipient computer. During installation and setup of software, the MAC identification number will be stripped from the recipient computer along with other innocuous information such as product serial number, ip provider and email addresses. Both the MAC identification number, the user return email address, the product serial number and the IP provider identifier will be copied into the registration files placed into the recipient computer's registries. In addition, an email will be created including the product registration numbers, the MAC identification number of the recipient computer, the email return address and the IP provider of the computer user, and this email will be addressed back to our server database maintaining the registration and user information. On the very next connect to the Internet or use of email, or by utilizing a unique port, the email registration packet will be sent to our server maintaining the registration and user database. Every single installation of software to a new machine, or a machine with a changed peripheral, utilizing our method will create and send a "registration" email.
An additional piece of code will be included with the utility. During the boot up of the computer, and periodically, this code will search for the presence of the registration file copied onto the recipient computer during installation. It will look for its presences and determine whether it has been tampered with. If it finds both registration file, and on comparison all information (i.e. the registration numbers, the MAC numbers, the user return email address, and the IP provider is identical then there is no further action. If it finds that the registries have been changed, it will rewrite the registry correctly and create another registration packet. Upon the next connection to the Internet, or the use of email, or through a unique port this email will be sent to our server registration maintenance database.
The database at our server site, managing the registration and user information, will use a querying method based on logic. The first email received is a valid registration.
Subsequent installations may or may not be legitimate. Any subsequent "registration or installation" emails which have either incomplete data or different information (i.e.
different MAC identification numbers and different user return email address etc.) along with the same product registration number is the identity of a computer with a pirated copy of software installed.
In addition, because of privacy concern issues from the public we have added the ability for software developers to choose the level of notification to users and the transparency of the registration collection.
Claims
I claim:
1. A method of installing software and a method of using software which allows the tracking and identification of illegal installation, illegal use, or illegal copying of software onto unauthorized and unlicensed computers, comprising the method steps of:
a) Installing registration files into recipient computer's registries.
b) Stripping or identification of the MAC numbers from computer hardware.
c) Stripping or identification of the recipient computer user's return email address, as well as the product serial number and the IP provider.
d) Installation of a utility creating an electronic registration packet addressed to our server registration and user management database.
e) Creating an electronic registration packet on every single installation of software, addressed to our server, containing the registration and computer identification data mentioned in a, b, and c.
f) Capacity to send the electronic registration packet created in step a on the next connection made to the Internet, use of email, or through a unique port.
g) The automatic rewriting of the correct registration information in the registries in the event of tampering.
a) Installing registration files into recipient computer's registries.
b) Stripping or identification of the MAC numbers from computer hardware.
c) Stripping or identification of the recipient computer user's return email address, as well as the product serial number and the IP provider.
d) Installation of a utility creating an electronic registration packet addressed to our server registration and user management database.
e) Creating an electronic registration packet on every single installation of software, addressed to our server, containing the registration and computer identification data mentioned in a, b, and c.
f) Capacity to send the electronic registration packet created in step a on the next connection made to the Internet, use of email, or through a unique port.
g) The automatic rewriting of the correct registration information in the registries in the event of tampering.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002310032A CA2310032A1 (en) | 2000-06-09 | 2000-06-09 | Big soft brother |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CA002310032A CA2310032A1 (en) | 2000-06-09 | 2000-06-09 | Big soft brother |
Publications (1)
Publication Number | Publication Date |
---|---|
CA2310032A1 true CA2310032A1 (en) | 2001-12-09 |
Family
ID=4166303
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CA002310032A Abandoned CA2310032A1 (en) | 2000-06-09 | 2000-06-09 | Big soft brother |
Country Status (1)
Country | Link |
---|---|
CA (1) | CA2310032A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1455257A1 (en) * | 2003-03-03 | 2004-09-08 | Microsoft Corporation | System for binding secrets to a computer system having tolerance for hardware changes |
CN103176805A (en) * | 2011-12-21 | 2013-06-26 | 富泰华工业(深圳)有限公司 | Executable program installation method and executable program installation system |
CN105744043A (en) * | 2014-12-08 | 2016-07-06 | 东莞宇龙通信科技有限公司 | Identification application activation condition method and device |
CN107103231A (en) * | 2017-03-29 | 2017-08-29 | 北京小米移动软件有限公司 | To application install the method and device of management |
-
2000
- 2000-06-09 CA CA002310032A patent/CA2310032A1/en not_active Abandoned
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1455257A1 (en) * | 2003-03-03 | 2004-09-08 | Microsoft Corporation | System for binding secrets to a computer system having tolerance for hardware changes |
US7296294B2 (en) | 2003-03-03 | 2007-11-13 | Microsoft Corporation | System for binding secrets to a computer system having tolerance for hardware changes |
US7647640B2 (en) * | 2003-03-03 | 2010-01-12 | Microsoft Corporation | System for binding secrets to a computer system having tolerance for hardware changes |
CN103176805A (en) * | 2011-12-21 | 2013-06-26 | 富泰华工业(深圳)有限公司 | Executable program installation method and executable program installation system |
CN103176805B (en) * | 2011-12-21 | 2017-09-19 | 富泰华工业(深圳)有限公司 | The method and system that executable program is installed |
CN105744043A (en) * | 2014-12-08 | 2016-07-06 | 东莞宇龙通信科技有限公司 | Identification application activation condition method and device |
CN107103231A (en) * | 2017-03-29 | 2017-08-29 | 北京小米移动软件有限公司 | To application install the method and device of management |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6073123A (en) | Method and apparatus for detecting unauthorized copies of software | |
US20040260933A1 (en) | Method of preventing tampering of program by using unique number, method of upgrading obfuscated program, and apparatus thereof | |
Lever et al. | Domain-z: 28 registrations later measuring the exploitation of residual trust in domains | |
US20210365528A1 (en) | Controlling access to digital assets | |
US7991995B2 (en) | Method and apparatus for protecting information and privacy | |
AU767286B2 (en) | Methods and apparatus for protecting information | |
USRE41227E1 (en) | System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection | |
EP1962216A2 (en) | Method for detecting duplicated instances of a software license | |
US6799277B2 (en) | System and method for monitoring software | |
CN102663294B (en) | Automatic analysis of software license usage in a computer network | |
US8103592B2 (en) | First computer process and second computer process proxy-executing code on behalf of first process | |
US20060174346A1 (en) | Instrumentation for alarming a software product | |
US10678893B2 (en) | Methods and related apparatus for managing access to digital assets | |
CA2421494A1 (en) | System and method for preventing unauthorized access to electronic data | |
US20070244826A1 (en) | Method of managing and auditing intellectual property | |
CA2310032A1 (en) | Big soft brother | |
CA2231978A1 (en) | Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software | |
CA2325293A1 (en) | Big soft brother, and its additional features | |
US7788496B2 (en) | First computer process and second computer process proxy-executing code on behalf thereof | |
KR100777659B1 (en) | Device of detecting invalid use of keyword advertisement | |
CN1338691A (en) | Anti-piracy technique for network software | |
KR20020009548A (en) | How to Prevent unauthorized use of software by random digits | |
JP2002259233A (en) | System and program for providing contents | |
KR20030084123A (en) | Method for certifing software through network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FZDE | Dead |