CA2310032A1 - Big soft brother - Google Patents

Big soft brother Download PDF

Info

Publication number
CA2310032A1
CA2310032A1 CA002310032A CA2310032A CA2310032A1 CA 2310032 A1 CA2310032 A1 CA 2310032A1 CA 002310032 A CA002310032 A CA 002310032A CA 2310032 A CA2310032 A CA 2310032A CA 2310032 A1 CA2310032 A1 CA 2310032A1
Authority
CA
Canada
Prior art keywords
registration
email
software
computer
recipient computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
CA002310032A
Other languages
French (fr)
Inventor
Andre J. Brisson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CA002310032A priority Critical patent/CA2310032A1/en
Publication of CA2310032A1 publication Critical patent/CA2310032A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2117User registration

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Source code and method to be protected, a software application to be used both during installation of software programs and the running of these software applications, interfacing with the hardware of the recipient computer, in particular to scan and retrieve the MAC number (a unique part identifier associated with modems and Ethernet cards), in order to track illegal use, illegal installation or illegal copying of software (as well as registering legal use of software). Code is compiled into the install or setup executable of software that will copy registration files into recipient computer registries.
In addition, an email utility will be installed onto the recipient computer. During installation and setup of software, the MAC identification number will be stripped from the recipient computer along with other innocuous information such as product serial number, ip provider and email addresses. Both the MAC identification number, the user return email address, the product serial number and the IP provider identifier will be copied into the registration files placed into the recipient computer's registries. In addition, an email will be created including the product registration numbers, the MAC identification number of the recipient computer, the email return address and the IP provider of the computer user, and this email will be addressed back to our server database maintaining the registration and user information. On the very next connect to the Internet or use of email, or by utilizing a unique port, the email registration packet will be sent to our server maintaining the registration and user database. Every single installation of software to a new machine, or a machine with a changed peripheral, utilizing our method will create and send a "registration" email.
An additional piece of code will be included with the utility. During the boot up of the computer, and periodically, this code will search for the presence of the registration file copied onto the recipient computer during installation. It will look for its presences and determine whether it has been tampered with. If it finds both registration file, and on comparison all information (i.e. the registration numbers, the MAC numbers, the user return email address, and the IP provider is identical then there is no further action. If it finds that the registries have been changed, it will rewrite the registry correctly and create another registration packet. Upon the next connection to the Internet, or the use of email, or through a unique port this email will be sent to our server registration maintenance database.
The database at our server site, managing the registration and user information, will use a querying method based on logic. The first email received is a valid registration.
Subsequent installations may or may not be legitimate. Any subsequent "registration or installation" emails which have either incomplete data or different information (i.e.
different MAC identification numbers and different user return email address etc.) along with the same product registration number is the identity of a computer with a pirated copy of software installed.
In addition, because of privacy concern issues from the public we have added the ability for software developers to choose the level of notification to users and the transparency of the registration collection.

Claims

The embodiments of the invention in which an exclusive property or privilege is claimed are defined as follows:

I claim:
1. A method of installing software and a method of using software which allows the tracking and identification of illegal installation, illegal use, or illegal copying of software onto unauthorized and unlicensed computers, comprising the method steps of:
a) Installing registration files into recipient computer's registries.
b) Stripping or identification of the MAC numbers from computer hardware.
c) Stripping or identification of the recipient computer user's return email address, as well as the product serial number and the IP provider.
d) Installation of a utility creating an electronic registration packet addressed to our server registration and user management database.
e) Creating an electronic registration packet on every single installation of software, addressed to our server, containing the registration and computer identification data mentioned in a, b, and c.
f) Capacity to send the electronic registration packet created in step a on the next connection made to the Internet, use of email, or through a unique port.
g) The automatic rewriting of the correct registration information in the registries in the event of tampering.
CA002310032A 2000-06-09 2000-06-09 Big soft brother Abandoned CA2310032A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CA002310032A CA2310032A1 (en) 2000-06-09 2000-06-09 Big soft brother

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CA002310032A CA2310032A1 (en) 2000-06-09 2000-06-09 Big soft brother

Publications (1)

Publication Number Publication Date
CA2310032A1 true CA2310032A1 (en) 2001-12-09

Family

ID=4166303

Family Applications (1)

Application Number Title Priority Date Filing Date
CA002310032A Abandoned CA2310032A1 (en) 2000-06-09 2000-06-09 Big soft brother

Country Status (1)

Country Link
CA (1) CA2310032A1 (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1455257A1 (en) * 2003-03-03 2004-09-08 Microsoft Corporation System for binding secrets to a computer system having tolerance for hardware changes
CN103176805A (en) * 2011-12-21 2013-06-26 富泰华工业(深圳)有限公司 Executable program installation method and executable program installation system
CN105744043A (en) * 2014-12-08 2016-07-06 东莞宇龙通信科技有限公司 Identification application activation condition method and device
CN107103231A (en) * 2017-03-29 2017-08-29 北京小米移动软件有限公司 To application install the method and device of management

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1455257A1 (en) * 2003-03-03 2004-09-08 Microsoft Corporation System for binding secrets to a computer system having tolerance for hardware changes
US7296294B2 (en) 2003-03-03 2007-11-13 Microsoft Corporation System for binding secrets to a computer system having tolerance for hardware changes
US7647640B2 (en) * 2003-03-03 2010-01-12 Microsoft Corporation System for binding secrets to a computer system having tolerance for hardware changes
CN103176805A (en) * 2011-12-21 2013-06-26 富泰华工业(深圳)有限公司 Executable program installation method and executable program installation system
CN103176805B (en) * 2011-12-21 2017-09-19 富泰华工业(深圳)有限公司 The method and system that executable program is installed
CN105744043A (en) * 2014-12-08 2016-07-06 东莞宇龙通信科技有限公司 Identification application activation condition method and device
CN107103231A (en) * 2017-03-29 2017-08-29 北京小米移动软件有限公司 To application install the method and device of management

Similar Documents

Publication Publication Date Title
US6073123A (en) Method and apparatus for detecting unauthorized copies of software
US20040260933A1 (en) Method of preventing tampering of program by using unique number, method of upgrading obfuscated program, and apparatus thereof
Lever et al. Domain-z: 28 registrations later measuring the exploitation of residual trust in domains
US20210365528A1 (en) Controlling access to digital assets
US7991995B2 (en) Method and apparatus for protecting information and privacy
AU767286B2 (en) Methods and apparatus for protecting information
USRE41227E1 (en) System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
EP1962216A2 (en) Method for detecting duplicated instances of a software license
US6799277B2 (en) System and method for monitoring software
CN102663294B (en) Automatic analysis of software license usage in a computer network
US8103592B2 (en) First computer process and second computer process proxy-executing code on behalf of first process
US20060174346A1 (en) Instrumentation for alarming a software product
US10678893B2 (en) Methods and related apparatus for managing access to digital assets
CA2421494A1 (en) System and method for preventing unauthorized access to electronic data
US20070244826A1 (en) Method of managing and auditing intellectual property
CA2310032A1 (en) Big soft brother
CA2231978A1 (en) Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software
CA2325293A1 (en) Big soft brother, and its additional features
US7788496B2 (en) First computer process and second computer process proxy-executing code on behalf thereof
KR100777659B1 (en) Device of detecting invalid use of keyword advertisement
CN1338691A (en) Anti-piracy technique for network software
KR20020009548A (en) How to Prevent unauthorized use of software by random digits
JP2002259233A (en) System and program for providing contents
KR20030084123A (en) Method for certifing software through network

Legal Events

Date Code Title Description
FZDE Dead