Browse Prior Art Database

Method for Transferring Copyprotected Software Without Destroying Copy-Protection

IP.com Disclosure Number: IPCOM000043986D
Original Publication Date: 1984-Oct-01
Included in the Prior Art Database: 2005-Feb-05
Document File: 1 page(s) / 11K

Publishing Venue

IBM

Related People

Comerford, L: AUTHOR [+2]

Abstract

A software product which is copy-protected by means of a software key is transferred from a first medium, such as a floppy disk, to a second medium, such as a hard disk, which also has a key associated with it. The method includes checking to make sure that the software product matches against the key on the first medium, obtaining the key associated with the second medium, destroying the software key on the first medium, modifying the software product to recognize the second medium key rather than the first medium key, and copying the software product onto the second medium. The method is carried out by means of a utility program. If the software product and the key on the first medium do not match, then the transfer cannot be made.

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 88% of the total text.

Page 1 of 1

Method for Transferring Copyprotected Software Without Destroying Copy- Protection

A software product which is copy-protected by means of a software key is transferred from a first medium, such as a floppy disk, to a second medium, such as a hard disk, which also has a key associated with it. The method includes checking to make sure that the software product matches against the key on the first medium, obtaining the key associated with the second medium, destroying the software key on the first medium, modifying the software product to recognize the second medium key rather than the first medium key, and copying the software product onto the second medium. The method is carried out by means of a utility program. If the software product and the key on the first medium do not match, then the transfer cannot be made. This ensures that the software product is not a pirated copy, and prevents transfer of a pirated copy. If no key is available for the second medium, then the transfer is not made since the software product could not be protected by a key on the second medium. The destruction of the software key on the first medium prevents the user from using a backup copy of the software product to restore a working copy of the software (including a key) to the first medium by using a backup procedure. This prevents the existence of two independent working copies of the software product, one on the second medium and one on the first medium in violation of the copy pro...