+

WO2001038989A1 - Systeme destine a surveiller l'usage de logiciel - Google Patents

Systeme destine a surveiller l'usage de logiciel Download PDF

Info

Publication number
WO2001038989A1
WO2001038989A1 PCT/AU2000/001434 AU0001434W WO0138989A1 WO 2001038989 A1 WO2001038989 A1 WO 2001038989A1 AU 0001434 W AU0001434 W AU 0001434W WO 0138989 A1 WO0138989 A1 WO 0138989A1
Authority
WO
WIPO (PCT)
Prior art keywords
software
data processor
identifier
source data
transmission
Prior art date
Application number
PCT/AU2000/001434
Other languages
English (en)
Inventor
Chris Mcnaughton
Original Assignee
Chris Mcnaughton
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chris Mcnaughton filed Critical Chris Mcnaughton
Priority to AU15058/01A priority Critical patent/AU1505801A/en
Publication of WO2001038989A1 publication Critical patent/WO2001038989A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Definitions

  • the present invention relates to computer software piracy.
  • Software piracy is still a major problem for software manufacturers.
  • One method which is employed to counteract software piracy is the software registration system.
  • software registration system typically software when it is installed on a computer results in a software registration program being activated with fields which must be completed for transmittal over the internet to the software manufacturer.
  • the present invention is aimed at providing a method of monitoring use of computer software so that manufacturers can identify unauthorised use of software.
  • the present invention provides a system for monitoring use of software comprising software having identifier means and a source data processor, a destination data processor and a communication network interconnecting the source data processor and destination data processor, wherein the software identifier means includes transmission software and identifier data and wherein the identifier means is adapted to be activated automatically when the software is installed in the source data processor, whereby the transmission software is adapted to activate the source data processor to automatically transmit the identifier data and source data processor identifier through the communication network to the destination address which is adapted to receive the identifier data and source data processor identifier and store the identifier data and source data processor identifier for monitoring purposes.
  • a storage medium having software stored therein, the software including an identifier means including transmission software and identifier data, wherein the transmission software is adapted to be activated when the software is installed in a source data processor and the source data processor is connected to the communication network, whereby the transmission software is adapted to automatically activate the source data processor to transmit the identifier data over the communication network to a destination data processor for storage thereby.
  • a method of monitoring use of software including the steps of providing software including an identifier means having transmission software and identifier data, a source data processor, a communication network and a destination data processor, installing the software on the source data processor, using the transmission software to automatically activate the source data processor to transmit the identifier data over the communication network to the destination data processor for storage thereby and operating the destination data processor to compare the stored identified data to identify identical identified data and to output from the destination data processor a means of noting that duplication of the identifier data has occurred.
  • the software comprises transmission software and main software which main software is completely distinct from the transmission software and identifier data.
  • the transmission software is adapted to read an identification means of the source data processor.
  • the identification means may comprise a URL.
  • the identifier data comprises a serial number or code number/character of the software.
  • the transmission software may be adapted to form a data package comprising the URL of the source data processor and the software serial number and send this package to an email outbox for its transmission therefrom.
  • the transmission software is preferably adapted to form an encrypted data package including the identifier data and identification means and to transmit the data package to a data transmitter of the source data processor.
  • the transmission software may be adapted to monitor the source data processor until the source data processor is connected to the communication network.
  • the transmission software detects that the source data processor is connected to the communication network
  • the transmission software is adapted to transmit the data package to an output of the source data processor and activate the source data processor to transmit the data package over the communication network.
  • the software may include main software which is adapted for a specific purpose of a purchaser and registration software which includes the identifier means.
  • the registration software may be encrypted.
  • the registration software may be hidden so that it is not flagged when the software is installed.
  • the software may include detection software for detecting when the source data processor is connected to a communication network and for activating transmission software of the registration software to transmit identifier data to a location in the source data processor where it is able to be automatically transmitted to the communication network when other data exclusive of registration software is transmitted to the communication network.
  • the location is an outbox of an email storage area.
  • the detection software may be activated whenever the source data processor is used (activated) . It is preferred that the detection software is periodically activated until the identifier data is transmitted by the source data processor.
  • the system includes feedback means located at the destination data processor for transmitting a receipt signal to the source data processor when the identifier data is received, whereby detection software of the source data processor is adapted to disable transmission of the identifier data.
  • the receipt signal preferably includes a code for deactivating the main software if a receipt signal is received from the destination data processor.
  • the software preferably includes deactivating software for deactivating the main software when the receipt signal is received through the communication network.
  • the registration software includes a counter which is incremented whenever the main software is installed on a data processor having a different URL from that stored by the detection software during a first installation of the software.
  • Figure 1 shows a block diagram of a flow chart for implementing a system for monitoring use of software in accordance with a preferred embodiment of the invention.
  • FIG. 2 shows a block diagram of a communication structure for implementing the system according to the preferred embodiment of the invention. Detailed Description of the Drawing
  • software is sold on a hard disc and the software includes the main program, which is the program the purchaser wanted to buy and monitoring software which is hidden from the purchaser.
  • the monitoring software is effectively separate from the main program although it is activated as soon as the main program is installed on a computer.
  • the monitoring software includes a set program which records the serial number of the computer in which the main program is installed. If the computer is connected to the internet via an ISP a sub program of the monitoring software searches through transmission software of the computer and records the computer URL.
  • a sub program of the monitoring software routinely checks the computer and looks to see if the computer has been configured so that it can communicate over the internet or a similar communication network.
  • the continual monitoring may take the form of checking the computer every time it is turned on.
  • the process of monitoring use of the main program begins with installation of the purchased software as shown in block (11) .
  • the monitoring software then records the serial number of the computer and if the computer is connected to an ISP it then records the URL as shown in block (12).
  • the monitoring software then prepares an encrypted email including both the serial number of the computer and the URL of the computer as shown in block (13) .
  • the monitoring software then monitors the computer to see if it is connected to an ISP (14). If the computer is not connected to an ISP the monitoring software then waits until the computer is connected to an ISP (15). If the computer is connected to an ISP the email is sent to a central data base and is stored therein (16).
  • the main data base typically would be a data base set up by the manufacturer of the main program and the data base stores the decrypted email which contains the serial number of the computer as well as its URL. If the data base already has a record of the URL and serial number of the computer (17) then this indicates that the software has been installed on another computer and has thus been duplicated as shown in block (18).
  • the central data base is then adapted to issue a notification email 19 to the computer from which the encrypted email was received. If no reply is received from the computer then the central data base can issue a notification to the manufacturer indicating that legal action may be required (20) . A report would then be sent to the copyright owner 21 and then whatever legal recourse is required can be enacted.
  • the monitoring procedure is completed (22) .
  • the above system could be modified by having the monitoring software including a deactivation software which is able to be deactivated upon receipt of a deactivation signal from the central data base. Such a signal would be transmitted from the central data base if duplication is recorded at the central data base.
  • FIG. 30 new software incorporating monitoring software in accordance with the present invention is identified by item 30.
  • This software may be recorded on a CD ROM and includes the user App 31 and monitoring software 32.
  • the monitoring software 32 uses a COM object and OLE automation.
  • the user App can be in any supported language . It is preferred that the COM object produces a standard HTTP request directly from the program and this allows a server App 33 to be a standard active server page ASP.
  • the monitoring software ASP collects the application and processor ID information and passes it on to a monitoring validation module for authentication. The response is then encoded and sent back to the monitoring software COM object.
  • the monitoring validation module 34 contains business logic which determines how validation requests are dealt with. Unique IDs from requests are stored in a data base. Responses are created for the end users and (also if required) violation/usage information is created for developers .
  • This module contains all the logic associated with the validation process, but is a passive module. It is preferably the responsibility of other modules to query this module and communicate any responses .
  • the above system thus provides a simple way of monitoring use of new software without the purchaser being aware of this use or having to complete registration requirements in the conventional fashion.

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

La présente invention concerne un système, destiné à surveiller l'usage de logiciel, comprenant un logiciel contenant des moyens d'identifications et un processeur de données source, un processeur de données destination et un réseau de communications reliant le processeur de données source et le processeur de données destination. Dans ce système, les moyens d'identification de logiciel comprennent un logiciel d'émission et des données d'identification, les moyens d'identification étant conçus de manière à être activés automatiquement lorsque le logiciel est installé dans le processeur de données source, et le logiciel d'émission étant conçu de manière à activer le processeur de données source de façon à ce qu'il émette automatiquement les données d'identification et l'identificateur du processeur de données source, via le réseau de communications, en direction de l'adresse de destination conçue pour recevoir les données d'identification ainsi que l'identificateur du processeur de données source, et stocker toutes ces données aux fins de surveillance.
PCT/AU2000/001434 1999-11-26 2000-11-24 Systeme destine a surveiller l'usage de logiciel WO2001038989A1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU15058/01A AU1505801A (en) 1999-11-26 2000-11-24 A system for monitoring use of software

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPQ4345A AUPQ434599A0 (en) 1999-11-26 1999-11-26 Computer software
AUPQ4345 1999-11-26

Publications (1)

Publication Number Publication Date
WO2001038989A1 true WO2001038989A1 (fr) 2001-05-31

Family

ID=3818487

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2000/001434 WO2001038989A1 (fr) 1999-11-26 2000-11-24 Systeme destine a surveiller l'usage de logiciel

Country Status (2)

Country Link
AU (2) AUPQ434599A0 (fr)
WO (1) WO2001038989A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2406664A (en) * 2003-10-03 2005-04-06 Sendo Int Ltd Registering an application program of a mobile information device
EP1796362A4 (fr) * 2004-09-28 2009-12-30 Huawei Tech Co Ltd Terminal mobile a fonction de surveillance et procede d'execution de la fonction de surveillance par le terminal mobile

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5790664A (en) * 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
CA2231978A1 (fr) * 1998-05-20 1999-11-20 Andre J. Brisson Bigsoft brother - logiciel pour depister et identifier le piratage illegal de logiciel, d'installation de logiciel, de copies de logiciel et de vol de logiciel

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5790664A (en) * 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
CA2231978A1 (fr) * 1998-05-20 1999-11-20 Andre J. Brisson Bigsoft brother - logiciel pour depister et identifier le piratage illegal de logiciel, d'installation de logiciel, de copies de logiciel et de vol de logiciel

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2406664A (en) * 2003-10-03 2005-04-06 Sendo Int Ltd Registering an application program of a mobile information device
GB2406664B (en) * 2003-10-03 2006-12-13 Sendo Int Ltd Registering an application program of an information device
EP1796362A4 (fr) * 2004-09-28 2009-12-30 Huawei Tech Co Ltd Terminal mobile a fonction de surveillance et procede d'execution de la fonction de surveillance par le terminal mobile

Also Published As

Publication number Publication date
AUPQ434599A0 (en) 1999-12-23
AU1505801A (en) 2001-06-04

Similar Documents

Publication Publication Date Title
US7611053B2 (en) Ticket issuing system, storage medium and electronic ticket issuing and managing method
US8474051B2 (en) Information processing system, information processor, image forming apparatus, and information processing method
CN101287608B (zh) 打印装置、信息处理装置及其控制方法
JP4564532B2 (ja) 外部の機械読取り可能タグの情報にアクセスするための方法及び装置
US6658586B1 (en) Method and system for device status tracking
US20210090008A1 (en) Methods and Apparatus for Monitoring and Control of Electronic Devices
US8316423B2 (en) Image forming apparatus, key management server, activation system, and deactivation system
US20050044546A1 (en) Method of allowing printing from a network attached device
US20090210435A1 (en) Configuration item management tool
WO2001025884A1 (fr) Procede et systeme de poursuite de dispositifs
WO2001025927A1 (fr) Procede et systeme de surveillance de localisateurs de ressources uniformes
JP4304300B2 (ja) ユーザ装置、サーバ、アップグレードサービスシステム、その方法およびプログラム
US20080271162A1 (en) Software execution management apparatus, method, and computer-readable medium thereof
CN112800397A (zh) 一种数据资产保护方法、系统、电子设备及存储介质
US7818741B1 (en) Method and system to monitor installation of a software program
JP2009075644A (ja) 製品ライフサイクル情報管理システム及び方法
US7716137B2 (en) System and method for automatically tracking and enabling the operation of a product
EP2013771B1 (fr) Procédé pour la gestion de domaine au moyen d'un gestionnaire multi-domaine et d'un système lié au domaine
CN105323400A (zh) 功能提供装置、功能提供系统和功能提供方法
KR20190009921A (ko) 정품인증 단말, 플랫폼 및 정품인증 방법
US8566431B2 (en) Identification device and method for device identification
WO2001038989A1 (fr) Systeme destine a surveiller l'usage de logiciel
CN1575474A (zh) 消费者及其设备的撤消
JP7100607B2 (ja) 異常検知システム、及び異常検知方法
JP4607023B2 (ja) ログ収集システム及びログ収集方法

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载