WO2001038989A1 - Systeme destine a surveiller l'usage de logiciel - Google Patents
Systeme destine a surveiller l'usage de logiciel Download PDFInfo
- Publication number
- WO2001038989A1 WO2001038989A1 PCT/AU2000/001434 AU0001434W WO0138989A1 WO 2001038989 A1 WO2001038989 A1 WO 2001038989A1 AU 0001434 W AU0001434 W AU 0001434W WO 0138989 A1 WO0138989 A1 WO 0138989A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- software
- data processor
- identifier
- source data
- transmission
- Prior art date
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 18
- 230000005540 biological transmission Effects 0.000 claims abstract description 46
- 238000000034 method Methods 0.000 claims description 9
- 230000009849 deactivation Effects 0.000 claims description 3
- 230000003213 activating effect Effects 0.000 claims description 2
- 238000010200 validation analysis Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
Definitions
- the present invention relates to computer software piracy.
- Software piracy is still a major problem for software manufacturers.
- One method which is employed to counteract software piracy is the software registration system.
- software registration system typically software when it is installed on a computer results in a software registration program being activated with fields which must be completed for transmittal over the internet to the software manufacturer.
- the present invention is aimed at providing a method of monitoring use of computer software so that manufacturers can identify unauthorised use of software.
- the present invention provides a system for monitoring use of software comprising software having identifier means and a source data processor, a destination data processor and a communication network interconnecting the source data processor and destination data processor, wherein the software identifier means includes transmission software and identifier data and wherein the identifier means is adapted to be activated automatically when the software is installed in the source data processor, whereby the transmission software is adapted to activate the source data processor to automatically transmit the identifier data and source data processor identifier through the communication network to the destination address which is adapted to receive the identifier data and source data processor identifier and store the identifier data and source data processor identifier for monitoring purposes.
- a storage medium having software stored therein, the software including an identifier means including transmission software and identifier data, wherein the transmission software is adapted to be activated when the software is installed in a source data processor and the source data processor is connected to the communication network, whereby the transmission software is adapted to automatically activate the source data processor to transmit the identifier data over the communication network to a destination data processor for storage thereby.
- a method of monitoring use of software including the steps of providing software including an identifier means having transmission software and identifier data, a source data processor, a communication network and a destination data processor, installing the software on the source data processor, using the transmission software to automatically activate the source data processor to transmit the identifier data over the communication network to the destination data processor for storage thereby and operating the destination data processor to compare the stored identified data to identify identical identified data and to output from the destination data processor a means of noting that duplication of the identifier data has occurred.
- the software comprises transmission software and main software which main software is completely distinct from the transmission software and identifier data.
- the transmission software is adapted to read an identification means of the source data processor.
- the identification means may comprise a URL.
- the identifier data comprises a serial number or code number/character of the software.
- the transmission software may be adapted to form a data package comprising the URL of the source data processor and the software serial number and send this package to an email outbox for its transmission therefrom.
- the transmission software is preferably adapted to form an encrypted data package including the identifier data and identification means and to transmit the data package to a data transmitter of the source data processor.
- the transmission software may be adapted to monitor the source data processor until the source data processor is connected to the communication network.
- the transmission software detects that the source data processor is connected to the communication network
- the transmission software is adapted to transmit the data package to an output of the source data processor and activate the source data processor to transmit the data package over the communication network.
- the software may include main software which is adapted for a specific purpose of a purchaser and registration software which includes the identifier means.
- the registration software may be encrypted.
- the registration software may be hidden so that it is not flagged when the software is installed.
- the software may include detection software for detecting when the source data processor is connected to a communication network and for activating transmission software of the registration software to transmit identifier data to a location in the source data processor where it is able to be automatically transmitted to the communication network when other data exclusive of registration software is transmitted to the communication network.
- the location is an outbox of an email storage area.
- the detection software may be activated whenever the source data processor is used (activated) . It is preferred that the detection software is periodically activated until the identifier data is transmitted by the source data processor.
- the system includes feedback means located at the destination data processor for transmitting a receipt signal to the source data processor when the identifier data is received, whereby detection software of the source data processor is adapted to disable transmission of the identifier data.
- the receipt signal preferably includes a code for deactivating the main software if a receipt signal is received from the destination data processor.
- the software preferably includes deactivating software for deactivating the main software when the receipt signal is received through the communication network.
- the registration software includes a counter which is incremented whenever the main software is installed on a data processor having a different URL from that stored by the detection software during a first installation of the software.
- Figure 1 shows a block diagram of a flow chart for implementing a system for monitoring use of software in accordance with a preferred embodiment of the invention.
- FIG. 2 shows a block diagram of a communication structure for implementing the system according to the preferred embodiment of the invention. Detailed Description of the Drawing
- software is sold on a hard disc and the software includes the main program, which is the program the purchaser wanted to buy and monitoring software which is hidden from the purchaser.
- the monitoring software is effectively separate from the main program although it is activated as soon as the main program is installed on a computer.
- the monitoring software includes a set program which records the serial number of the computer in which the main program is installed. If the computer is connected to the internet via an ISP a sub program of the monitoring software searches through transmission software of the computer and records the computer URL.
- a sub program of the monitoring software routinely checks the computer and looks to see if the computer has been configured so that it can communicate over the internet or a similar communication network.
- the continual monitoring may take the form of checking the computer every time it is turned on.
- the process of monitoring use of the main program begins with installation of the purchased software as shown in block (11) .
- the monitoring software then records the serial number of the computer and if the computer is connected to an ISP it then records the URL as shown in block (12).
- the monitoring software then prepares an encrypted email including both the serial number of the computer and the URL of the computer as shown in block (13) .
- the monitoring software then monitors the computer to see if it is connected to an ISP (14). If the computer is not connected to an ISP the monitoring software then waits until the computer is connected to an ISP (15). If the computer is connected to an ISP the email is sent to a central data base and is stored therein (16).
- the main data base typically would be a data base set up by the manufacturer of the main program and the data base stores the decrypted email which contains the serial number of the computer as well as its URL. If the data base already has a record of the URL and serial number of the computer (17) then this indicates that the software has been installed on another computer and has thus been duplicated as shown in block (18).
- the central data base is then adapted to issue a notification email 19 to the computer from which the encrypted email was received. If no reply is received from the computer then the central data base can issue a notification to the manufacturer indicating that legal action may be required (20) . A report would then be sent to the copyright owner 21 and then whatever legal recourse is required can be enacted.
- the monitoring procedure is completed (22) .
- the above system could be modified by having the monitoring software including a deactivation software which is able to be deactivated upon receipt of a deactivation signal from the central data base. Such a signal would be transmitted from the central data base if duplication is recorded at the central data base.
- FIG. 30 new software incorporating monitoring software in accordance with the present invention is identified by item 30.
- This software may be recorded on a CD ROM and includes the user App 31 and monitoring software 32.
- the monitoring software 32 uses a COM object and OLE automation.
- the user App can be in any supported language . It is preferred that the COM object produces a standard HTTP request directly from the program and this allows a server App 33 to be a standard active server page ASP.
- the monitoring software ASP collects the application and processor ID information and passes it on to a monitoring validation module for authentication. The response is then encoded and sent back to the monitoring software COM object.
- the monitoring validation module 34 contains business logic which determines how validation requests are dealt with. Unique IDs from requests are stored in a data base. Responses are created for the end users and (also if required) violation/usage information is created for developers .
- This module contains all the logic associated with the validation process, but is a passive module. It is preferably the responsibility of other modules to query this module and communicate any responses .
- the above system thus provides a simple way of monitoring use of new software without the purchaser being aware of this use or having to complete registration requirements in the conventional fashion.
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Information Transfer Between Computers (AREA)
Abstract
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU15058/01A AU1505801A (en) | 1999-11-26 | 2000-11-24 | A system for monitoring use of software |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AUPQ4345A AUPQ434599A0 (en) | 1999-11-26 | 1999-11-26 | Computer software |
AUPQ4345 | 1999-11-26 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2001038989A1 true WO2001038989A1 (fr) | 2001-05-31 |
Family
ID=3818487
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/AU2000/001434 WO2001038989A1 (fr) | 1999-11-26 | 2000-11-24 | Systeme destine a surveiller l'usage de logiciel |
Country Status (2)
Country | Link |
---|---|
AU (2) | AUPQ434599A0 (fr) |
WO (1) | WO2001038989A1 (fr) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2406664A (en) * | 2003-10-03 | 2005-04-06 | Sendo Int Ltd | Registering an application program of a mobile information device |
EP1796362A4 (fr) * | 2004-09-28 | 2009-12-30 | Huawei Tech Co Ltd | Terminal mobile a fonction de surveillance et procede d'execution de la fonction de surveillance par le terminal mobile |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5790664A (en) * | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
CA2231978A1 (fr) * | 1998-05-20 | 1999-11-20 | Andre J. Brisson | Bigsoft brother - logiciel pour depister et identifier le piratage illegal de logiciel, d'installation de logiciel, de copies de logiciel et de vol de logiciel |
-
1999
- 1999-11-26 AU AUPQ4345A patent/AUPQ434599A0/en not_active Abandoned
-
2000
- 2000-11-24 WO PCT/AU2000/001434 patent/WO2001038989A1/fr active Application Filing
- 2000-11-24 AU AU15058/01A patent/AU1505801A/en not_active Abandoned
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5790664A (en) * | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
CA2231978A1 (fr) * | 1998-05-20 | 1999-11-20 | Andre J. Brisson | Bigsoft brother - logiciel pour depister et identifier le piratage illegal de logiciel, d'installation de logiciel, de copies de logiciel et de vol de logiciel |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB2406664A (en) * | 2003-10-03 | 2005-04-06 | Sendo Int Ltd | Registering an application program of a mobile information device |
GB2406664B (en) * | 2003-10-03 | 2006-12-13 | Sendo Int Ltd | Registering an application program of an information device |
EP1796362A4 (fr) * | 2004-09-28 | 2009-12-30 | Huawei Tech Co Ltd | Terminal mobile a fonction de surveillance et procede d'execution de la fonction de surveillance par le terminal mobile |
Also Published As
Publication number | Publication date |
---|---|
AUPQ434599A0 (en) | 1999-12-23 |
AU1505801A (en) | 2001-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7611053B2 (en) | Ticket issuing system, storage medium and electronic ticket issuing and managing method | |
US8474051B2 (en) | Information processing system, information processor, image forming apparatus, and information processing method | |
CN101287608B (zh) | 打印装置、信息处理装置及其控制方法 | |
JP4564532B2 (ja) | 外部の機械読取り可能タグの情報にアクセスするための方法及び装置 | |
US6658586B1 (en) | Method and system for device status tracking | |
US20210090008A1 (en) | Methods and Apparatus for Monitoring and Control of Electronic Devices | |
US8316423B2 (en) | Image forming apparatus, key management server, activation system, and deactivation system | |
US20050044546A1 (en) | Method of allowing printing from a network attached device | |
US20090210435A1 (en) | Configuration item management tool | |
WO2001025884A1 (fr) | Procede et systeme de poursuite de dispositifs | |
WO2001025927A1 (fr) | Procede et systeme de surveillance de localisateurs de ressources uniformes | |
JP4304300B2 (ja) | ユーザ装置、サーバ、アップグレードサービスシステム、その方法およびプログラム | |
US20080271162A1 (en) | Software execution management apparatus, method, and computer-readable medium thereof | |
CN112800397A (zh) | 一种数据资产保护方法、系统、电子设备及存储介质 | |
US7818741B1 (en) | Method and system to monitor installation of a software program | |
JP2009075644A (ja) | 製品ライフサイクル情報管理システム及び方法 | |
US7716137B2 (en) | System and method for automatically tracking and enabling the operation of a product | |
EP2013771B1 (fr) | Procédé pour la gestion de domaine au moyen d'un gestionnaire multi-domaine et d'un système lié au domaine | |
CN105323400A (zh) | 功能提供装置、功能提供系统和功能提供方法 | |
KR20190009921A (ko) | 정품인증 단말, 플랫폼 및 정품인증 방법 | |
US8566431B2 (en) | Identification device and method for device identification | |
WO2001038989A1 (fr) | Systeme destine a surveiller l'usage de logiciel | |
CN1575474A (zh) | 消费者及其设备的撤消 | |
JP7100607B2 (ja) | 異常検知システム、及び異常検知方法 | |
JP4607023B2 (ja) | ログ収集システム及びログ収集方法 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase |