发明名称 Method for preventing illegal use of software
摘要 Apparatus, techniques and systems for preventing illegal use of software and other digital files based on operations of a data storage device controller in a computer or computer system. For example, a method for preventing illegal use of software includes: configuring a computer to use a data storage device controller to control use of each digital file stored on one or more data storage devices; before a use of each digital file, operating the data storage device controller to access a storage device on which the digital file is stored to check whether the digital file meets a condition for use; and operating the data storage device controller to block use of the digital file when the condition is not met and to allow execution of the digital file when the condition is met. The digital file can be an application software or other digital documents.
申请公布号 US9235691(B2) 申请公布日期 2016.01.12
申请号 US201213448103 申请日期 2012.04.16
申请人 Sergii Mishura 发明人 Mishura Sergii
分类号 G06F21/00;G06F21/10;G06F21/78;G06Q20/12 主分类号 G06F21/00
代理机构 Fish & Richardson P.C. 代理人 Fish & Richardson P.C.
主权项 1. A computer system for preventing illegal use of software, the system comprising: a data storage device controller comprising a data processing apparatus, anda non-transitory computer data storage encoded with a computer program for preventing illegal use of software, the software comprising computer instructions or data encoded on a data storage device, the data storage device comprising computer components and recording media that retain digital data and being connected to the computer system, wherein the computer program comprises instructions that when executed by the data processing apparatus cause the data storage device controller to perform operations comprising: dedicating, controlling and managing a first dedicated area on the data storage device comprising a first sub-dedicated area for isolated checking whether the software is properly installed and is not illegally modified, anda second sub-dedicated area for final installing of software from recognized software developers, where the recognized software developers are listed on a list of recognized software developers, anda second dedicated area on the data storage device for final installing of software from unrecognized software developers, where the unrecognized developers are not listed on the list of recognized software developers; andchecking whether the software is properly installed by: installing the software to a first sub-dedicated area of the data storage device;checking the data storage device to obtain detailed information about the installed software;obtaining detailed information about the software which is provided by a recognized software developer; andcomparing the detailed information obtained from the data storage device with the detailed information which is provided by the recognized software developer; andif a result of the above comparison is that the obtained two pieces of detailed information are the same, then determining that the software has been properly installed on the data storage device; andreinstalling the software from the first sub-dedicated area of the data storage device to a second sub-dedicated area of the data storage device, if the software is provided by recognized software developers or to a second dedicated area of the data storage device, if the software is provided by unrecognized software developers;otherwise, if the result of the above comparison is that the obtained two pieces of detailed information are different, then determining that the software is not properly installed on the data storage device; anddeleting the installed software from the first sub-dedicated area of the data storage device, and wherein the operations further comprise: checking whether the software has to be paid for use;if the software is free for use then allowing a user to use the software normally;otherwise, if the software has to be paid for use then checking whether a user has already performed a payment process;if the user has not performed the payment process then blocking the launch of the software;otherwise, if the user has already made the payment then determining an available time period of software usage for user logged on to the computer system;if the software has been used for a period of time that is less than the determined available time period then allowing the user to use the software normally;otherwise, if the software has been used for a period of time that is longer than the determined available time period then prompting the user to perform the payment process once more; and terminating an execution of the software, if the user does not perform the payment process once more in response of said prompting.
地址 Kiev UA