摘要:
A serial number for a software product is secured with an authenticator value. The authenticator value and the serial number are evaluated entirely by a remote authentication server such that no cryptographic authentication occurs on a local computer on which the software product is being installed. An abbreviated portion of the authenticator value is used for offline authentication.
摘要:
An integrated application setup enables the generation and expression of application customization intent in a generic manner that is indifferent to the way in which the customization intent is implemented. A customization application integrates the process of customizing a target application with the standard setup process for the target application. The customization application allows a user to review customization options for the target application and to specify customization intent through an application configuration user interface (UI). The customization application then generates customization XML that expresses the user's customization intent.
摘要:
In one embodiment, the invention is a 64 bit hardware ID (H/W ID) for tying a software product to a particular computer to prevent software piracy. The 64 bit hardware ID represents ten different components of the user's computer: the CD-ROM device, the disk adapter, the disk device, the display adapter, the first drive serial number, the MAC address, the processor serial number, the processor type, the RAM size in Mb, and the SCSI adapter. Each time the software product is opened, the expanded H/W ID is compared to the hardware on the computer to determine whether a predetermined minimum number of components match. In one embodiment, the expanded H/W ID allows for expansion of the user's computer because so long as the component originally listed in the expanded H/W ID can be found on the computer, then that component matches the expanded H/W ID. Typically, seven out of ten components in the expanded HIW ID must match the computer before the software product will fully operate.
摘要翻译:在一个实施例中,本发明是用于将软件产品绑定到特定计算机以防止软件盗版的64位硬件ID(H / W ID)。 64位硬件ID表示用户计算机的十个不同组件:CD-ROM设备,磁盘适配器,磁盘设备,显示适配器,第一个驱动器序列号,MAC地址,处理器序列号,处理器类型 ,Mb中的RAM大小和SCSI适配器。 每次打开软件产品时,将扩展的H / W ID与计算机上的硬件进行比较,以确定预定最小数量的组件是否匹配。 在一个实施例中,扩展的H / W ID允许用户计算机的扩展,因为只要在计算机上可以找到原始列在扩展H / W ID中的组件,则该组件与扩展的H / W ID匹配。 通常,扩展的HIW ID中的10个组件中的7个必须与软件产品完全运行前的计算机相匹配。
摘要:
Techniques are described for generating a license for software installed on a device. An entitlement certificate is generated including one or more entitlements describing license characteristics of the software. The one or more entitlements are determined in accordance with first information about the software. The first information includes at least one of a purchase token and package information. A binding certificate in accordance with a binding type for the software is generated. A license in accordance with said binding certificate and said entitlement certificate is generated. The binding certificate identifies an entity to which the license is bound.
摘要:
A serial number for a software product is secured with an authenticator value. The authenticator value and the serial number are evaluated entirely by a remote authentication server such that no cryptographic authentication occurs on a local computer on which the software product is being installed. An abbreviated portion of the authenticator value is used for offline authentication.
摘要:
The present invention leverages selections of data locations and comparative analysis of data values stored in these locations to provide a secure means of maintaining data integrity with minimal computational burdens. This provides, in one instance of the present invention, a tamper-resistant process to ensure that software application usage data is protected from malicious attacks. By storing and recalling data in an untraceable fashion, the present invention substantially increases the effort required to spoof the stored data. Additionally, comparative analysis is utilized with the randomized approach to facilitate in maintaining consistency of the stored data both in retrieval of information and when storing new data values. This allows checking of the data prior to overwriting sensitive data, thwarting malicious attacks that spoof new data as a means to alter the stored data.
摘要:
Systems and methods for generating a-compact hardware identification (CHWID) for a given computer system are disclosed. The compact hardware identification (CHWID) may be used to control the use of software on the given computer system depending on the degree of hardware changes to the computer system. The compact hardware identification (CHWID) may be electronically transmitted over limited bandwidth media, such as a telephone.
摘要:
A licensing system provides for various versions of an application within a software product. A license type is identified from a product key that is associated with the software product. The license type may correspond to a hybrid license. When the license type is a hybrid license, an application state is determined for any applications included in the software product. A use experience for the applications is provided according to the application state when the application state is determined. For applications that are provided as upgradeable versions, an upgrade may be obtained by simply obtaining a new product key that is associated with the upgraded versions of the applications.
摘要:
A serial number for a software product is secured with an authenticator value. The authenticator value and the serial number are evaluated entirely by a remote authentication server such that no cryptographic authentication occurs on a local computer on which the software product is being installed. An abbreviated portion of the authenticator value is used for offline authentication.
摘要:
Systems and methods for implementing a hardware ID with time- and weight-based flexibility use a hardware ID (HWID) including identifying information about hardware components. When software is run, a current HWID is generated. When the current HWID is compared to a stored HWID to determine if the two HWIDs match, a time vector and a weight vector are used in the comparison. A running matching score is kept of matches. For each hardware component, the weight vector indicates the weight given to a correct match of the hashed value for the hardware component. For example, if the weight value for the hardware component is three and there is a match, then the running total is increased by three. For each hardware component, the time vector may indicate an expiration period after which a change in the component may be allowed. For example, if the expiration period for the component is one year, and one year has passed since activation, the running total may be increased even though the component's information in the verification HWID does not match the current component information.