Title of the Invention
A SYSTEM FOR MONITORING USE OF SOFTWARE Field of the Invention
The present invention relates to computer software piracy.
Background of the Invention
Software piracy is still a major problem for software manufacturers. One method which is employed to counteract software piracy is the software registration system. Typically software when it is installed on a computer results in a software registration program being activated with fields which must be completed for transmittal over the internet to the software manufacturer.
The problem with the above system is that failure to complete the registration fields does not prevent use of the software. Thus although there are benefits in registering the software, such as receiving updates and warranties, it is still possible for multiple users to use the same software without the manufacturer being aware of this other use and thus obtaining the applicable licence fee. Summary of the Invention
The present invention is aimed at providing a method of monitoring use of computer software so that manufacturers can identify unauthorised use of software.
Accordingly the present invention provides a system for monitoring use of software comprising software having identifier means and a source data processor, a destination data processor and a communication network interconnecting the source data processor and destination data processor, wherein the software identifier means includes transmission software and identifier data and wherein the identifier means is adapted to be activated automatically when the software is installed in the source data processor, whereby the transmission software is adapted to activate the source data processor to automatically transmit the identifier data and source data
processor identifier through the communication network to the destination address which is adapted to receive the identifier data and source data processor identifier and store the identifier data and source data processor identifier for monitoring purposes.
According to another aspect of the present invention there is provided a storage medium having software stored therein, the software including an identifier means including transmission software and identifier data, wherein the transmission software is adapted to be activated when the software is installed in a source data processor and the source data processor is connected to the communication network, whereby the transmission software is adapted to automatically activate the source data processor to transmit the identifier data over the communication network to a destination data processor for storage thereby.
According to a further aspect of the present invention there is provided a method of monitoring use of software, the method including the steps of providing software including an identifier means having transmission software and identifier data, a source data processor, a communication network and a destination data processor, installing the software on the source data processor, using the transmission software to automatically activate the source data processor to transmit the identifier data over the communication network to the destination data processor for storage thereby and operating the destination data processor to compare the stored identified data to identify identical identified data and to output from the destination data processor a means of noting that duplication of the identifier data has occurred.
Preferably the software comprises transmission software and main software which main software is completely distinct from the transmission software and identifier data.
Preferably the transmission software is adapted
to read an identification means of the source data processor.
The identification means may comprise a URL.
Preferably the identifier data comprises a serial number or code number/character of the software.
The transmission software may be adapted to form a data package comprising the URL of the source data processor and the software serial number and send this package to an email outbox for its transmission therefrom. The transmission software is preferably adapted to form an encrypted data package including the identifier data and identification means and to transmit the data package to a data transmitter of the source data processor.
The transmission software may be adapted to monitor the source data processor until the source data processor is connected to the communication network.
Preferably when the transmission software detects that the source data processor is connected to the communication network, the transmission software is adapted to transmit the data package to an output of the source data processor and activate the source data processor to transmit the data package over the communication network.
The software may include main software which is adapted for a specific purpose of a purchaser and registration software which includes the identifier means.
The registration software may be encrypted. The registration software may be hidden so that it is not flagged when the software is installed.
The software may include detection software for detecting when the source data processor is connected to a communication network and for activating transmission software of the registration software to transmit identifier data to a location in the source data processor where it is able to be automatically transmitted to the communication network when other data exclusive of registration software is transmitted to the communication network.
Preferably the location is an outbox of an email storage area.
The detection software may be activated whenever the source data processor is used (activated) . It is preferred that the detection software is periodically activated until the identifier data is transmitted by the source data processor.
It is preferred that the system includes feedback means located at the destination data processor for transmitting a receipt signal to the source data processor when the identifier data is received, whereby detection software of the source data processor is adapted to disable transmission of the identifier data.
The receipt signal preferably includes a code for deactivating the main software if a receipt signal is received from the destination data processor.
The software preferably includes deactivating software for deactivating the main software when the receipt signal is received through the communication network.
Preferably the registration software includes a counter which is incremented whenever the main software is installed on a data processor having a different URL from that stored by the detection software during a first installation of the software.
It is preferred that the identifier data is transmitted over the communication network with the latest counter number. Brief Description of the Drawing A preferred embodiment of the present invention will now be described by way of example only with reference to the accompanying drawings in which:
Figure 1 shows a block diagram of a flow chart for implementing a system for monitoring use of software in accordance with a preferred embodiment of the invention; and
Figure 2 shows a block diagram of a communication
structure for implementing the system according to the preferred embodiment of the invention. Detailed Description of the Drawing
According to the preferred embodiment of the present invention software is sold on a hard disc and the software includes the main program, which is the program the purchaser wanted to buy and monitoring software which is hidden from the purchaser.
The monitoring software is effectively separate from the main program although it is activated as soon as the main program is installed on a computer.
The monitoring software includes a set program which records the serial number of the computer in which the main program is installed. If the computer is connected to the internet via an ISP a sub program of the monitoring software searches through transmission software of the computer and records the computer URL.
If the computer is not connected to a communication network such as the internet, a sub program of the monitoring software routinely checks the computer and looks to see if the computer has been configured so that it can communicate over the internet or a similar communication network. The continual monitoring may take the form of checking the computer every time it is turned on.
As shown in the figure the process of monitoring use of the main program begins with installation of the purchased software as shown in block (11) . The monitoring software then records the serial number of the computer and if the computer is connected to an ISP it then records the URL as shown in block (12).
The monitoring software then prepares an encrypted email including both the serial number of the computer and the URL of the computer as shown in block (13) .
The monitoring software then monitors the
computer to see if it is connected to an ISP (14). If the computer is not connected to an ISP the monitoring software then waits until the computer is connected to an ISP (15). If the computer is connected to an ISP the email is sent to a central data base and is stored therein (16). The main data base typically would be a data base set up by the manufacturer of the main program and the data base stores the decrypted email which contains the serial number of the computer as well as its URL. If the data base already has a record of the URL and serial number of the computer (17) then this indicates that the software has been installed on another computer and has thus been duplicated as shown in block (18).
The central data base is then adapted to issue a notification email 19 to the computer from which the encrypted email was received. If no reply is received from the computer then the central data base can issue a notification to the manufacturer indicating that legal action may be required (20) . A report would then be sent to the copyright owner 21 and then whatever legal recourse is required can be enacted.
If no legal action is required because the computer responds in a manner requested in block 19 then the monitoring procedure is completed (22) . The above system could be modified by having the monitoring software including a deactivation software which is able to be deactivated upon receipt of a deactivation signal from the central data base. Such a signal would be transmitted from the central data base if duplication is recorded at the central data base.
As shown in Figure 2 new software incorporating monitoring software in accordance with the present invention is identified by item 30. This software may be recorded on a CD ROM and includes the user App 31 and monitoring software 32. In this example the monitoring software 32 uses a COM object and OLE automation.
The user App can be in any supported language .
It is preferred that the COM object produces a standard HTTP request directly from the program and this allows a server App 33 to be a standard active server page ASP. The monitoring software ASP collects the application and processor ID information and passes it on to a monitoring validation module for authentication. The response is then encoded and sent back to the monitoring software COM object.
It is noted that the monitoring validation module 34 contains business logic which determines how validation requests are dealt with. Unique IDs from requests are stored in a data base. Responses are created for the end users and (also if required) violation/usage information is created for developers . This module contains all the logic associated with the validation process, but is a passive module. It is preferably the responsibility of other modules to query this module and communicate any responses .
The above system thus provides a simple way of monitoring use of new software without the purchaser being aware of this use or having to complete registration requirements in the conventional fashion.