USRE41227E1 - System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection - Google Patents

System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection Download PDF

Info

Publication number
USRE41227E1
USRE41227E1 US11/932,507 US93250707A USRE41227E US RE41227 E1 USRE41227 E1 US RE41227E1 US 93250707 A US93250707 A US 93250707A US RE41227 E USRE41227 E US RE41227E
Authority
US
United States
Prior art keywords
identification indicia
computers
information
digitized information
indicia
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US11/932,507
Inventor
Kenneth L. Nash
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=26814163&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=USRE41227(E1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Individual filed Critical Individual
Priority to US11/932,507 priority Critical patent/USRE41227E1/en
Application granted granted Critical
Publication of USRE41227E1 publication Critical patent/USRE41227E1/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Definitions

  • the present invention relates generally to an Internet system and, more particularly, to apparatus and methods for compiling copyright/patent/license infringements and violations.
  • the copyright/patent/license and/or illegal use monitoring system and method of the present invention are provided to supply evidence of such illegal use.
  • the system and method are passive and do not interfere with operation of the software or other digitized information so that there is little motivation to circumvent operation thereof by one who acts illegally.
  • the system operates worldwide on the Internet and therefore will detect copying/alteration of software/digitized music/digitized movies and the like worldwide.
  • the results are tabulated and are preferably made available to subscribers with respect to the software or digitized information they provide.
  • those companies can obtain evidence of active piracy.
  • This information can be combined with other information to more specifically determine location, time, and verify the counterfeiting such as by either notifying the suspected parties or turning evidence obtained over to local officials for investigation.
  • copyright violations are criminal so that prosecution would be carried out by officials of the particular country involved.
  • a method for use with the Internet for detecting pirating of digitized information in which one embodiment comprises providing a respective first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information.
  • a server is provided in communication with the Internet.
  • a respective second identification indicia that is unique for each of a plurality of computers is determined.
  • the method further comprises automatically determining whether one or more of the plurality of computers is in communication to the Internet.
  • the present invention then includes automatically sending the respective first identification indicia and the respective second identification indicia to the server such that one of the plurality of substantially identical packets of digitized information is associated with one of the plurality of computers.
  • the respective first identification indicia and the second respective indicia are then stored for future use.
  • the first identification indicia is associated with more than one of the plurality of computers so as to indicate a possibility that one of the plurality of substantially identical packets of digitized information has been copied.
  • Alteration information is automatically sent related to whether the one of the plurality of substantially identical packets of digitized information has been altered.
  • intranet information is stored concerning the first identification indicia and one or more of the plurality of intranet computers, and this intranet information is transmitted to the server.
  • An intranet for this purpose is considered a network of computers outside of the Internet.
  • a user of the method may connect to the server from a second location and then obtain the stored information regarding the first identification number and the second identification number. Additional information related to one of the plurality of substantially identical packets of digital information may also be stored such as information obtained when registering software, updating software, from the retail or wholesale sales, and the like. This additional stored additional data may then be associated with the first identification indicia and the second identification indicia to obtain a better picture of the situation.
  • a detection system for use with the Internet is provided for compiling information related to improper usage of digitized information that, in one embodiment, comprises server in communication with the Internet along with one or more storage units for the server.
  • the digitized information is associated with a first identification indicia that identifies the digitized information as discussed above.
  • a first computer routine is installed in a plurality of host computers.
  • the computer routine is operable for determining a respective second identification indicia for each of the one or more host computers so as to uniquely, identify each of the plurality of host computers, the computer routine being operable for determining when a connection is made with each of the plurality of host computers with the Internet and for automatically transferring the first identification indicia and the respective second identification indicia through the Internet to the server, the server being programmed for receiving and storing in the one or more storage units the first identification indicia and the second identification indicia for each of the one or more host computers, and the first computer routine not affecting other operation of the plurality of host computers with respect to the digitized information.
  • a second computer routine may be provided for determining if the first identification number is associated with more than one of the plurality of host computers. The second routine may be installed in the server to notify the parties involved or may be owned by a subscriber to analyze data from the server.
  • the first computer routine which, may have more than one module, determines if the digitized information has been altered. If the digitized information has been altered to the first computer routine will then indicate the alteration to the server. While indication of an alteration may be accomplished in several ways, in one embodiment the first computer routine produces a third indicia related to the alteration and transmits the third indicia to the server.
  • the third indicia is preferably stored in the one or more storage units related to the server and is preferably associated with the first identification indicia and the second identification indicia.
  • steps include features such as installing a first computer routine in a plurality of computers. It is generally preferable that the first computer routine does not interfere with use of the packet of digitized information. This is preferably true regardless of whether the illegal use is indicated or not.
  • a first indicia such as an identification number or the like, is associated with the packet of digitized information for identifying the packet of digitized information.
  • a second indicia is related to each of the plurality of computers. Obviously, the first and second indicia could be formed of one string of computer symbols, two strings, or a plurality of strings.
  • Another step involves automatically determining whether one of the plurality of computers is presently in communication with a network of computers, such as might include the Internet or an intranet of computers.
  • a network of computers such as might include the Internet or an intranet of computers.
  • the determination of alteration is preferably sent over the network of computers to the second location.
  • the computer routine that provides the operation discussed above may be provided at least in part in a second program thereby making detection of the computer routine that detects the copying or sends the information related to the copying/alteration of information more difficult.
  • the computer routine could be provided as part of an Internet browser.
  • the computer routine could be a routine in an operating system.
  • the method also applies to intranets that include a plurality of intranet computers.
  • intranet information concerning the first identification indicia and one or more of the plurality of intranet computers is stored for transmission.
  • FIG. 1 is a schematic view of a system for operation in accord with the present invention
  • FIG. 2 is a schematic view showing further detail of the user from the system of FIG. 1 ;
  • FIG. 3 is a flow diagram for the user operation of FIG. 2 in accord with the present invention.
  • FIG. 4 is a schematic view showing further detail of the server system of FIG. 1 .
  • the present system is operable for monitoring copying and/or alteration of the digitized information.
  • the system may monitor an intranet, LAN, or network of local computers for copying onto the computers of the network.
  • the monitored information is automatically transmitted over the Internet to a server designed to receive and store the monitoring information.
  • the work of the system occurs in the background to the computer user and so is not noticeable.
  • the computer routine that effects the monitoring and transmission from each individual computer may be stored on the software or movies, etc. or it may be contained in whole or part on other software such as browsers/operating systems.
  • the computer routine may be in both the software and the browser/system so as to increase the likelihood the routine is performed.
  • the method of the present invention is preferably purely passive with respect to the software or digitized information used and operates in the background and during pauses in operation so there is little or no motivation to detect and remove the monitoring software.
  • a computer routine for operation of system 10 is installed or placed into operation in the computers of a plurality of users as indicated at 12 .
  • Users may use any means such as computers or other systems for connecting to the Internet and transmitting the necessary information such that the invention is intended to cover all such means and the word computer is used to mean any such programmable device suitable for accomplishing these functions.
  • the computer routine may be inserted in numerous ways and may actually be inserted more than once, as discussed subsequently.
  • the computer routine monitors for copying of digitized information, such as that produced by one or more software companies as indicated at 14 .
  • System 10 in accord with the present invention effectively tallies the number of different computers on which appear a particular software program or other digitized information. If the same program, for instance, appears over one hundred times one might have reason to suspect that a significant pirating of software has occurred. Since this system operates on a worldwide basis, it may detect pirating outside the U.S.
  • Each computer routine, discussed subsequently, for each user computer 12 automatically sends the monitored information over the Internet 18 to server 16 .
  • Server 16 includes software for receiving and storing this information. Servers are intended to cover any means for accomplishing these functions and may include distributed and/or multiple systems.
  • the stored information may be retrieved over the Internet 18 or by a direct line 20 .
  • Server 16 is preferably maintained by server operator 22 who will have a direct line 24 to server 16 or be able to maintain server 16 over the Internet 18 .
  • Server operator 22 may receive compensation for operation from software companies, groups formed to protect from copyright violation, and the like.
  • a user computer as indicated at 12 may also be part of a local area network of computers (LAN) or intranet as indicated at 26 which is referred to herein to be a group of computers networked together other than through an Internet connection.
  • LAN local area network of computers
  • intranet as indicated at 26 which is referred to herein to be a group of computers networked together other than through an Internet connection.
  • the computers in the LAN or intranet are queried and a determination is made concerning how many computers contain the specific digitized information of concern, whether it appears to be a copy as might be indicated by the same identification indicia, and/or whether it is altered.
  • Each computer in the LAN or intranet would store this information and the next computer connected to the Internet 18 would transmit this information to server 16 as discussed above.
  • FIG. 2 discloses a few more details of the system of FIG. 1 .
  • User computer 26 has installed therein a computer routine, such as that of FIG. 3 , that is used to collect data related to copying including a system ID. 28 , a program ID 30 , and program alteration indicia 32 .
  • System ID is an indicia related to a specific system and may be generated by the computer routine or using indicia already available. For instance, most storage devices such as hard drives will have an identification number associated therewith. Alternatively, an identification number can be generated and stored for this purpose. The identification number would tend to remain in the hard drive unless it was reformatted—an action that does not normally occur many times. Other means for identifying a particular system or hard drive can be used as is known by those skilled in the art. It is generally desirable to produce a system ID that is not likely to ordinarily change with minor modifications to the system.
  • Program ID 30 may be contained within the program, software, digitized information or the like which is to be monitored or an identifier could be generated.
  • the general purpose is to establish an identification number that would be transferred to a second computer if the program, software, digitized information or the like were copied. In this way, if numerous different computers each have the digital information with the same associated identification number or indicia, then there is a possibility that copying has occurred.
  • the identification number is established with creation of the program, software, digitized information or the like. In this way, the program ID can be associated with other information such as wholesale and resale locations, customers, license information, update information, rebate information, and the like as discussed subsequently.
  • the system and method of the present invention can be used to find copying/pirating that occurred prior to installation of the system.
  • the operation can check to see if the program with program ID is present on multiple computers.
  • the system and method can be used for past and future copying where the requirements of the system are met.
  • Program alteration information 32 refers to detection of changes in a program. Thus, a check-sum or the like may be run on a program wherein the program ID is already known to determine if the program has been altered. Other means for checking may also be used. Most licenses do not permit alteration of a program so that an indication that alterations have been made could be significant.
  • Intranet or LAN 34 may also preferably be monitored.
  • the computer routine would determine whether it is part of an intranet and, if so, automatically obtain information about intranet 34 and the computers attached thereto.
  • an intranet will have an intranet ID 35 or identification number associated with it.
  • an ID can be generated based on parameters of the system, e.g., the ID numbers of the computers or some portion thereof, already in the system.
  • the intranet will comprise a plurality of computers that give rise to a plurality of computer or system ID numbers 36 . Thus, for each protected program with a program ID, a computer ID is associated therewith.
  • This information is preferably stored in each of the computers so that if any computer in the network connects to the Internet 18 then the information involving all computers in intranet 34 will be sent over the Internet 18 .
  • This amount of information is relatively small so that disk space used will not be noticeable to the user of the computer.
  • Numerous methods may be used for installing the computer routine for effecting operation. The most obvious method could be to include it in the digitized information to be copied. Other methods might be to include it with or as an addition to other software such an operating system or browser.
  • the routine might be included in updates, in many different unrelated shareware or freeware programs. If deemed desirable for the situation, the computer software licensee might preferably be apprised/notified by standard wording in the license agreement for agreement of monitoring for copyright/patent unauthorized activity with respect to terms of the license agreement.
  • the computer routine may already exist in the host computer by installation of other programs and simply be turned on by installation of the digitized information to be protected. Thus, there are numerous possibilities for installation and location of the computer routine used to effect storage and transmission of identification information over Internet 18 . The point being that although the present program operates in the background so as to be inconspicuous, it may also be hidden if desired to present difficulties to software pirates from discovering, locating, and removing the computer routine.
  • FIG. 3 describes a possible flow diagram for a computer routine in accord with the present invention for effecting operation of the method.
  • operation begins as indicated at start 42 .
  • Activation may occur with installation of software, music, movies, of other digitized information that is to be monitored for copying/alteration.
  • the first data collection cycle would preferably occur with installation whereupon information would be collected and stored during installing the program.
  • the computer routine preferably runs in the background. It may be initiated after the computer is idle for a period of time. It may be activated when going online to the Internet or the like.
  • Computer routine may be started at 42 each time the program or information to be protected is activated.
  • Initial data collection steps include determining and saving a software indicia or identification number or the like as indicated at 44 so as to uniquely distinguish the software or digitized information to be monitored. At this time, a check may be made to determine if the digitized information has been altered as indicated at 46 . This may be effected by a checksum or a plurality of checksums over various components of the software. Thus, it might be possible to determine if one or more portions of the software have been altered, if desired. Finally, the method involves determining and saving an indicia or identification number related to the computer in which the routine is operating as indicated at 48 . Thus, these three basic factors of information are determined and saved.
  • the routine determines, as indicated at 50 , whether it is connected to an intranet or LAN, a group of locally interconnected computers. If not, the information already determined has been effectively saved as indicated at 52 . If there is a connection to an intranet, then computer routine 40 collects and stores the same information for each computer in the intranet and places the routine on each computer in the intranet as indicated at 54 . By placing the routine on each computer in the intranet, the information will be sent to the server by any computer that connects to the Internet. The status or collected information has already been saved now as indicated at 56 .
  • the ID status, or collection of information so far obtained is compared at 58 to the last status that was transmitted by routine 40 to the server as indicated at 60 . If the status is identical to that which was previously sent, there is not need to transmit again as this information has already been sent so no action is taken as indicated at 62 and 64 . On the other hand, if the ID status has changed, in other words if any information collected has changed including alteration information, identification indicium, or other collected information, then it is desirable to send the new information over the Internet to the server as indicated at 62 and 66 .
  • Start element 68 will preferably begin with a connection to the Internet.
  • a line may be inserted in any system browsers, Internet service connection programs such as AOL®, CompuServe®, or the like such or other means to start operation of the send cycle. Start element 68 may also instigate start 42 as discussed above, or visa-versa.
  • a check is made whether information has been sent initially as indicated at 72 . If information has never been sent, then the stored information is sent as indicated by the Yes line to item 66 . Otherwise, the No line causes routine to determine whether the stored information has changed since the last transmission as discussed in connection with item 62 .
  • FIG. 4 discloses a schematic that indicates basic features for a server 16 in accord with the present invention.
  • server 16 is connected to Internet 18 and receives and stores information as indicated at 80 such as program identification indicia or number, computer identification indicia or number, intranet network identification indicia or number and program alteration information in the manner discussed hereinbefore.
  • Security 82 of a type known to those skilled in the art is used to prevent unauthorized access and retrieval of database information. It may also be used to authenticate transmission if desired if scrambling or coded technology is used as may be desired.
  • Information is preferably stored in database 84 that may be physically located as desired such as within server 16 or not but which is associated with server 16 in that it contains information received by server 16 .
  • Server 16 may be programmed to further enhance the information received or the information may be enhanced outside of server 16 .
  • the program ID may be associated with numerous amounts of information as necessarily to locate the responsible party for improper/illicit use of the digitized information to be protected.
  • registration and/or license information as indicated at 86 may be combined by matching programming that matches information based on the program identification indicia or number. Other information may also be used such as sales information. More expensive programs are generally sold in transactions that contain user information as indicated at 88 . This information is often available in the form of rebates and so forth. Update information, warranty application, or initial turning on of a program may be obtained as indicated at 90 . Thus, the user might obtain free updates or even initially start the program or digitized information by supplying relevant matching information.
  • Rebate information to obtain rebates for the digitized information are often used to reduce the cost and thereby supply matching information as indicate at 92 .
  • Matching information there are numerous means by which data can be enhanced with matching information that would identify persons responsible are associated with possible illegal pirating or other misuse of digitized information.
  • This information may be used by matching module 88 with database 84 information within server 16 or matching may be done at other locations by subscribers to a service supplying database 84 information or the like.
  • the computer ID may be matched with other programs that were to be protected as indicated at 94 . If user information is associated with those protected programs, then even if those programs are not misused the information may be associated with protected programs that are misused for identification of the persons responsible.
  • computer routine 40 could be modified to receive information from the server as well as send it. For instance, if excessive copying were detected, then server 16 might send a signal to an expanded computer routine 40 that would cause computer routine to search for additional information such as email address, computer phone book information, and other information that might identify the user of the computer on which unauthorized copies appeared to be indicated. Other variations might include determining whether multiple copies of programs exist on the same computer, storage of program id's for many programs, and the like. Variations in methods of collection and variations in types information to be collected and the like may be used in accordance with the goal of the method and system to detect illegal use of digitized information.

Abstract

A system and method for detecting and locating improper or illicit use of digitized information such as illegal pirating, copying, alteration, and the like. The digitized information may include software, digital music, digital movies, multi-media or the like that may be placed on a user's computer and possibly copied to other computers. The system or method preferably operates in the background so as to be unnoticeable to the user and preferably does not interfere with operation of the digitized information even if determined that copying or alteration has occurred. Thus, there is little motivation to remove the routine that effects transmission over the Internet to a server of information such as a program identification indicia, a computer identification indicia, program alteration identification. The computer routine may be installed on the user's computer by many methods and acts to determine and store the information until such time as an Internet connection is made whereupon the information is transmitted to a server for storage. If information received by the server indicates the same program identification on numerous computers then a signal may be provided or produced that would cause further investigation. The system and method may also provide a routine to detect if alterations have been made to the digitized information to be protected.

Description

This application claims the benefit of U.S. Provisional Application No. 60/116367, filed Jan. 19, 1999.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates generally to an Internet system and, more particularly, to apparatus and methods for compiling copyright/patent/license infringements and violations.
2. Description of the Background
Worldwide software piracy losses are estimated at the present time to typically run well above $10.0 billion dollars annually. Numerous laws discourage and prohibit software piracy such as worldwide copyright and patent laws, the Digital Millennium Copyright Act, the World Intellectual Property Organization Copyright Treaty, and the No Electronic Theft Act. Additionally contract laws creating licenses specify the rights and duties of the parties involved. Music and multimedia piracy losses are not included in the above figures. As well, those figure do not include improper use such as unauthorized alteration of programs.
Methods, systems, and procedures are well known for making software or digitized information more difficult to copy. However, such devices often interfere with the ease of operation and reliability of operation. Reliable software is very important for many applications. Moveover, these methods do not compile evidence or give any indication of the software or digitized information that is copied or altered. Thus, when such methods of preventing copying are circumvented, there is no record or indication that is readily determinable that copying has occurred. As well, there is significant motivation to overcome these copy prevention techniques because the software or other digitized information does not operate when the copy prevention system is triggered. In some cases, the copy prevention system sometimes interferes with program operation, e.g., requires an original cd rom in the cd rom drive.
While the law is generally sufficient for enforcement, and may include rather harsh criminal penalties that depend upon the particular country in which a violation occurs, it is often difficult to locate and find evidence of pirating. If the location and parties could be determined, and the evidence accumulated, then the piracy could be pursued by either civil law or by notification of governmental authorities for criminal prosecution procedures.
While perhaps no measure is 100% foolproof, each system and method has its place and use. It would be desirable to be able to find the location, number of computers, type of violation, and the like. Those skilled in the art have long sought and will appreciate the present invention which addresses these and other problems.
SUMMARY OF THE INVENTION
The copyright/patent/license and/or illegal use monitoring system and method of the present invention are provided to supply evidence of such illegal use. The system and method are passive and do not interfere with operation of the software or other digitized information so that there is little motivation to circumvent operation thereof by one who acts illegally. The system operates worldwide on the Internet and therefore will detect copying/alteration of software/digitized music/digitized movies and the like worldwide. The results are tabulated and are preferably made available to subscribers with respect to the software or digitized information they provide. Thus, those companies can obtain evidence of active piracy. This information can be combined with other information to more specifically determine location, time, and verify the counterfeiting such as by either notifying the suspected parties or turning evidence obtained over to local officials for investigation. In many countries, for instance, copyright violations are criminal so that prosecution would be carried out by officials of the particular country involved.
Thus, it is a presently preferred object of the present invention to provide a method for monitoring whether software or other digitized information has been copied.
These and other objects, features, and advantages of the embodiments of the present invention will become apparent from the drawings, the descriptions given herein, and the appended claims. It will be noted that the above and other described objects, features, and advantages are given for illustration and easier understanding of the invention only for the benefit and illumination of the public who reviews this specification. Any stated objects, features, and advantages are not intended to limit the invention in any manner inconsistent with the claims or other portions of the specification and are not intended to provide limiting language outside of the claim language. Therefore, reference to the claims, specification, drawings and any equivalents thereof is hereby made to more completely describe the invention. It is intended that all alternatives, modifications, and equivalents included within the spirit of the invention and as defined in the appended claims be encompassed as a part of the present invention.
A method is disclosed for use with the Internet for detecting pirating of digitized information in which one embodiment comprises providing a respective first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information. A server is provided in communication with the Internet. A respective second identification indicia that is unique for each of a plurality of computers is determined. The method further comprises automatically determining whether one or more of the plurality of computers is in communication to the Internet. The present invention then includes automatically sending the respective first identification indicia and the respective second identification indicia to the server such that one of the plurality of substantially identical packets of digitized information is associated with one of the plurality of computers. The respective first identification indicia and the second respective indicia are then stored for future use. For instance, it might then be determined if the first identification indicia is associated with more than one of the plurality of computers so as to indicate a possibility that one of the plurality of substantially identical packets of digitized information has been copied. Alternatively or in addition thereto, it might automatically determined whether one of the plurality of substantially identical packets of digitized information has been altered. Alteration information is automatically sent related to whether the one of the plurality of substantially identical packets of digitized information has been altered.
For the case where one or more of the plurality computers is connected to an intranet that includes a plurality of intranet computers, intranet information is stored concerning the first identification indicia and one or more of the plurality of intranet computers, and this intranet information is transmitted to the server. An intranet for this purpose is considered a network of computers outside of the Internet. At some time, it may be determined whether the first identification indicia is associated with more than one of the plurality of intranet computers. To avoid needlessly resending information that has already been sent, preferably it is automatically determined whether the first identification indicia and the respective second identification indicia have already been sent to the server. If the first identification indicia and the respective second identification indicia have already been send to the server, then the step of automatically sending the information is delayed until and if information about the first identification indicia and the respective second identification indicia have changed.
A user of the method may connect to the server from a second location and then obtain the stored information regarding the first identification number and the second identification number. Additional information related to one of the plurality of substantially identical packets of digital information may also be stored such as information obtained when registering software, updating software, from the retail or wholesale sales, and the like. This additional stored additional data may then be associated with the first identification indicia and the second identification indicia to obtain a better picture of the situation.
A detection system for use with the Internet is provided for compiling information related to improper usage of digitized information that, in one embodiment, comprises server in communication with the Internet along with one or more storage units for the server. The digitized information is associated with a first identification indicia that identifies the digitized information as discussed above. A first computer routine is installed in a plurality of host computers. The computer routine is operable for determining a respective second identification indicia for each of the one or more host computers so as to uniquely, identify each of the plurality of host computers, the computer routine being operable for determining when a connection is made with each of the plurality of host computers with the Internet and for automatically transferring the first identification indicia and the respective second identification indicia through the Internet to the server, the server being programmed for receiving and storing in the one or more storage units the first identification indicia and the second identification indicia for each of the one or more host computers, and the first computer routine not affecting other operation of the plurality of host computers with respect to the digitized information. A second computer routine may be provided for determining if the first identification number is associated with more than one of the plurality of host computers. The second routine may be installed in the server to notify the parties involved or may be owned by a subscriber to analyze data from the server.
As another feature of the present invention, the first computer routine which, may have more than one module, determines if the digitized information has been altered. If the digitized information has been altered to the first computer routine will then indicate the alteration to the server. While indication of an alteration may be accomplished in several ways, in one embodiment the first computer routine produces a third indicia related to the alteration and transmits the third indicia to the server. The third indicia is preferably stored in the one or more storage units related to the server and is preferably associated with the first identification indicia and the second identification indicia.
Another description/embodiment of the method of the might be characterized as a method for detecting an illegal use of a packet of digitized information. In this case steps include features such as installing a first computer routine in a plurality of computers. It is generally preferable that the first computer routine does not interfere with use of the packet of digitized information. This is preferably true regardless of whether the illegal use is indicated or not. As discussed before a first indicia, such as an identification number or the like, is associated with the packet of digitized information for identifying the packet of digitized information. A second indicia is related to each of the plurality of computers. Obviously, the first and second indicia could be formed of one string of computer symbols, two strings, or a plurality of strings. However the effect is to determine the first and second indicia that are associated as described for determining whether the uniquely identified software is found on more than one computer. Another step involves automatically determining whether one of the plurality of computers is presently in communication with a network of computers, such as might include the Internet or an intranet of computers. When the one of the plurality of computers is presently in communication with the network of computers, which could be the Internet or an intranet or both, then automatically sending the first indicia and the respective second indicia over the network of computers to a second location.
At some time, it will be desirable to determine whether the first indicia is associated with more than one of the plurality of computers. It may also be desirable to determine whether the packet of digitized information has been altered. Once an alteration is detected, when the one of the plurality of computers is presently in communication with the network of computers then the determination of alteration is preferably sent over the network of computers to the second location.
The computer routine that provides the operation discussed above may be provided at least in part in a second program thereby making detection of the computer routine that detects the copying or sends the information related to the copying/alteration of information more difficult. For instance, the computer routine could be provided as part of an Internet browser. Likewise the computer routine could be a routine in an operating system.
The method, as discussed above, also applies to intranets that include a plurality of intranet computers. In this case, intranet information concerning the first identification indicia and one or more of the plurality of intranet computers is stored for transmission.
It is clear that it is improper/illegal to copy in a manner that contradicts copyright and patent laws, or to alter the program against the license that may include a shrink wrap license. Although it may not be necessary, it may be desirable to include within a shrink wrap or other license an agreed upon explicit right, rather than an implied right, to monitor on an extremely limited basis, as discussed herein, wherein monitoring pertains only to copying and/or altering.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 is a schematic view of a system for operation in accord with the present invention;
FIG. 2 is a schematic view showing further detail of the user from the system of FIG. 1;
FIG. 3 is a flow diagram for the user operation of FIG. 2 in accord with the present invention; and
FIG. 4 is a schematic view showing further detail of the server system of FIG. 1.
While the present invention will be described in connection with presently preferred embodiments, it will be understood that it is not intended that the invention is limited to those particular embodiments but the descriptions given herein merely are to provide sufficient information such that one skilled in the art may practice one or more presently preferred embodiments of the invention, in accord with the patent statutes. Thus, the descriptions of the invention provided herein are not intended to limit the invention in any way. On the contrary, it is intended that all alternatives, modifications, and equivalents included within the spirit of the invention and as defined in the appended claims be encompassed as a part of the present invention.
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
Referring now to the drawings, and more particularly to FIG. 1, there is disclosed an overview for system 10 in accord with the present invention for monitoring illegal usage of software or other types of digitized information including music, multimedia, movies and the like. The present system is operable for monitoring copying and/or alteration of the digitized information. The system may monitor an intranet, LAN, or network of local computers for copying onto the computers of the network. Preferably the monitored information is automatically transmitted over the Internet to a server designed to receive and store the monitoring information. The work of the system occurs in the background to the computer user and so is not noticeable. The computer routine that effects the monitoring and transmission from each individual computer may be stored on the software or movies, etc. or it may be contained in whole or part on other software such as browsers/operating systems. This aids in difficulty of detection due to the difficulty of locating the routine. On the other hand, the computer routine may be in both the software and the browser/system so as to increase the likelihood the routine is performed. At any rate, the method of the present invention is preferably purely passive with respect to the software or digitized information used and operates in the background and during pauses in operation so there is little or no motivation to detect and remove the monitoring software.
In system 10, a computer routine for operation of system 10, such as might be similar to that disclosed in the flow chart of FIG. 3, is installed or placed into operation in the computers of a plurality of users as indicated at 12. Users may use any means such as computers or other systems for connecting to the Internet and transmitting the necessary information such that the invention is intended to cover all such means and the word computer is used to mean any such programmable device suitable for accomplishing these functions. The computer routine may be inserted in numerous ways and may actually be inserted more than once, as discussed subsequently. The computer routine monitors for copying of digitized information, such as that produced by one or more software companies as indicated at 14. System 10 in accord with the present invention effectively tallies the number of different computers on which appear a particular software program or other digitized information. If the same program, for instance, appears over one hundred times one might have reason to suspect that a significant pirating of software has occurred. Since this system operates on a worldwide basis, it may detect pirating outside the U.S. Each computer routine, discussed subsequently, for each user computer 12 automatically sends the monitored information over the Internet 18 to server 16. Server 16 includes software for receiving and storing this information. Servers are intended to cover any means for accomplishing these functions and may include distributed and/or multiple systems. The stored information may be retrieved over the Internet 18 or by a direct line 20. The information may be retrieved at time intervals or upon notification from server 16 due, for instance, from an indication that a significant amount of copying appears to have occurred. Server 16 is preferably maintained by server operator 22 who will have a direct line 24 to server 16 or be able to maintain server 16 over the Internet 18. Server operator 22 may receive compensation for operation from software companies, groups formed to protect from copyright violation, and the like.
In some cases, a user computer as indicated at 12 may also be part of a local area network of computers (LAN) or intranet as indicated at 26 which is referred to herein to be a group of computers networked together other than through an Internet connection. In one embodiment of the present invention, the computers in the LAN or intranet are queried and a determination is made concerning how many computers contain the specific digitized information of concern, whether it appears to be a copy as might be indicated by the same identification indicia, and/or whether it is altered. Each computer in the LAN or intranet would store this information and the next computer connected to the Internet 18 would transmit this information to server 16 as discussed above. There may be numerous LAN's or intranets to which the various individual user computers 12 are connected to.
FIG. 2 discloses a few more details of the system of FIG. 1. User computer 26 has installed therein a computer routine, such as that of FIG. 3, that is used to collect data related to copying including a system ID. 28, a program ID 30, and program alteration indicia 32. System ID is an indicia related to a specific system and may be generated by the computer routine or using indicia already available. For instance, most storage devices such as hard drives will have an identification number associated therewith. Alternatively, an identification number can be generated and stored for this purpose. The identification number would tend to remain in the hard drive unless it was reformatted—an action that does not normally occur many times. Other means for identifying a particular system or hard drive can be used as is known by those skilled in the art. It is generally desirable to produce a system ID that is not likely to ordinarily change with minor modifications to the system.
Program ID 30 may be contained within the program, software, digitized information or the like which is to be monitored or an identifier could be generated. The general purpose is to establish an identification number that would be transferred to a second computer if the program, software, digitized information or the like were copied. In this way, if numerous different computers each have the digital information with the same associated identification number or indicia, then there is a possibility that copying has occurred. Preferably the identification number is established with creation of the program, software, digitized information or the like. In this way, the program ID can be associated with other information such as wholesale and resale locations, customers, license information, update information, rebate information, and the like as discussed subsequently. If programs that are previously stored have a unique identifier, then the system and method of the present invention can be used to find copying/pirating that occurred prior to installation of the system. The operation can check to see if the program with program ID is present on multiple computers. Thus, the system and method can be used for past and future copying where the requirements of the system are met.
Program alteration information 32 refers to detection of changes in a program. Thus, a check-sum or the like may be run on a program wherein the program ID is already known to determine if the program has been altered. Other means for checking may also be used. Most licenses do not permit alteration of a program so that an indication that alterations have been made could be significant.
Intranet or LAN 34 may also preferably be monitored. The computer routine would determine whether it is part of an intranet and, if so, automatically obtain information about intranet 34 and the computers attached thereto. Generally an intranet will have an intranet ID 35 or identification number associated with it. Alternatively an ID can be generated based on parameters of the system, e.g., the ID numbers of the computers or some portion thereof, already in the system. The intranet will comprise a plurality of computers that give rise to a plurality of computer or system ID numbers 36. Thus, for each protected program with a program ID, a computer ID is associated therewith. This information is preferably stored in each of the computers so that if any computer in the network connects to the Internet 18 then the information involving all computers in intranet 34 will be sent over the Internet 18. This amount of information is relatively small so that disk space used will not be noticeable to the user of the computer.
Numerous methods may be used for installing the computer routine for effecting operation. The most obvious method could be to include it in the digitized information to be copied. Other methods might be to include it with or as an addition to other software such an operating system or browser. The routine might be included in updates, in many different unrelated shareware or freeware programs. If deemed desirable for the situation, the computer software licensee might preferably be apprised/notified by standard wording in the license agreement for agreement of monitoring for copyright/patent unauthorized activity with respect to terms of the license agreement. The computer routine may already exist in the host computer by installation of other programs and simply be turned on by installation of the digitized information to be protected. Thus, there are numerous possibilities for installation and location of the computer routine used to effect storage and transmission of identification information over Internet 18. The point being that although the present program operates in the background so as to be inconspicuous, it may also be hidden if desired to present difficulties to software pirates from discovering, locating, and removing the computer routine.
FIG. 3 describes a possible flow diagram for a computer routine in accord with the present invention for effecting operation of the method. After computer routine 40 is activated, operation begins as indicated at start 42. Activation may occur with installation of software, music, movies, of other digitized information that is to be monitored for copying/alteration. Thus, the first data collection cycle would preferably occur with installation whereupon information would be collected and stored during installing the program. However, this is not required and other triggers might be used. As stated, the computer routine preferably runs in the background. It may be initiated after the computer is idle for a period of time. It may be activated when going online to the Internet or the like. Computer routine may be started at 42 each time the program or information to be protected is activated.
Initial data collection steps include determining and saving a software indicia or identification number or the like as indicated at 44 so as to uniquely distinguish the software or digitized information to be monitored. At this time, a check may be made to determine if the digitized information has been altered as indicated at 46. This may be effected by a checksum or a plurality of checksums over various components of the software. Thus, it might be possible to determine if one or more portions of the software have been altered, if desired. Finally, the method involves determining and saving an indicia or identification number related to the computer in which the routine is operating as indicated at 48. Thus, these three basic factors of information are determined and saved.
The routine then determines, as indicated at 50, whether it is connected to an intranet or LAN, a group of locally interconnected computers. If not, the information already determined has been effectively saved as indicated at 52. If there is a connection to an intranet, then computer routine 40 collects and stores the same information for each computer in the intranet and places the routine on each computer in the intranet as indicated at 54. By placing the routine on each computer in the intranet, the information will be sent to the server by any computer that connects to the Internet. The status or collected information has already been saved now as indicated at 56.
The ID status, or collection of information so far obtained is compared at 58 to the last status that was transmitted by routine 40 to the server as indicated at 60. If the status is identical to that which was previously sent, there is not need to transmit again as this information has already been sent so no action is taken as indicated at 62 and 64. On the other hand, if the ID status has changed, in other words if any information collected has changed including alteration information, identification indicium, or other collected information, then it is desirable to send the new information over the Internet to the server as indicated at 62 and 66.
Start element 68 will preferably begin with a connection to the Internet. For instance, a line may be inserted in any system browsers, Internet service connection programs such as AOL®, CompuServe®, or the like such or other means to start operation of the send cycle. Start element 68 may also instigate start 42 as discussed above, or visa-versa. Once it is determined that connection is made to the Internet as at 70, then a check is made whether information has been sent initially as indicated at 72. If information has never been sent, then the stored information is sent as indicated by the Yes line to item 66. Otherwise, the No line causes routine to determine whether the stored information has changed since the last transmission as discussed in connection with item 62. The above description of the flow chart is provided as a rough guide for illustration purposes and various checks and the like may be desirable for actual implementation. It will be seen that the two start routines, although interrelated, are actions that can be taken at separate times by separate triggers and therefore may be stored at different places.
FIG. 4 discloses a schematic that indicates basic features for a server 16 in accord with the present invention. As discussed previously, server 16 is connected to Internet 18 and receives and stores information as indicated at 80 such as program identification indicia or number, computer identification indicia or number, intranet network identification indicia or number and program alteration information in the manner discussed hereinbefore. Security 82 of a type known to those skilled in the art is used to prevent unauthorized access and retrieval of database information. It may also be used to authenticate transmission if desired if scrambling or coded technology is used as may be desired. Information is preferably stored in database 84 that may be physically located as desired such as within server 16 or not but which is associated with server 16 in that it contains information received by server 16.
Server 16 may be programmed to further enhance the information received or the information may be enhanced outside of server 16. For instance, the program ID may be associated with numerous amounts of information as necessarily to locate the responsible party for improper/illicit use of the digitized information to be protected. For instance, registration and/or license information as indicated at 86 may be combined by matching programming that matches information based on the program identification indicia or number. Other information may also be used such as sales information. More expensive programs are generally sold in transactions that contain user information as indicated at 88. This information is often available in the form of rebates and so forth. Update information, warranty application, or initial turning on of a program may be obtained as indicated at 90. Thus, the user might obtain free updates or even initially start the program or digitized information by supplying relevant matching information. Rebate information to obtain rebates for the digitized information are often used to reduce the cost and thereby supply matching information as indicate at 92. Thus, there are numerous means by which data can be enhanced with matching information that would identify persons responsible are associated with possible illegal pirating or other misuse of digitized information.
This information may be used by matching module 88 with database 84 information within server 16 or matching may be done at other locations by subscribers to a service supplying database 84 information or the like. As another means for providing matching information, the computer ID may be matched with other programs that were to be protected as indicated at 94. If user information is associated with those protected programs, then even if those programs are not misused the information may be associated with protected programs that are misused for identification of the persons responsible.
The above disclosure describes a simple straight forward embodiment of the invention but is not intended and does not prevent patent coverage of the concept with respect to further enhancements of the invention. For instance, computer routine 40 could be modified to receive information from the server as well as send it. For instance, if excessive copying were detected, then server 16 might send a signal to an expanded computer routine 40 that would cause computer routine to search for additional information such as email address, computer phone book information, and other information that might identify the user of the computer on which unauthorized copies appeared to be indicated. Other variations might include determining whether multiple copies of programs exist on the same computer, storage of program id's for many programs, and the like. Variations in methods of collection and variations in types information to be collected and the like may be used in accordance with the goal of the method and system to detect illegal use of digitized information.
The foregoing disclosure and description of the invention is illustrative and explanatory thereof, and it will appreciated by those skilled in the art, that various changes in the operation, location, and architecture as well as in the details of the illustrated embodiments or combinations of features of the elements/steps may be made without departing from the spirit of the invention.

Claims (34)

1. A method for use with the Internet for detecting pirating of digitized information, comprising:
providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers;
providing at least one notification related to monitoring of said digitized information for unauthorized activity;
obtaining user agreement to allow said monitoring;
subsequently automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and
determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied; and
automatically determining whether said first identification indicia and said respective second identification indicia have already been sent to said server.
2. The method of claim 1, further comprising:
automatically determining whether one of said plurality of substantially identical packets of digitized information has been altered, and
automatically sending information related to whether said one of said plurality of substantially identical packets of digitized information has been altered.
3. The method of claim 1, further comprising:
determining whether one of said plurality of computers in connected to an intranet that includes a plurality of intranet computers,
storing intranet information concerning said first identification indicia and one or more of said plurality of intranet computers, and
transmitting said intranet information to said server.
4. The method of claim 3, further comprising:
determining whether said first identification indicia is associated with more than one of said plurality of intranet computers.
5. The method of claim 1, further comprising:
automatically determining whether said first identification indicia and said respective second identification indicia have already been sent to said server.
6. The method of claim 5 1, further comprising:
when said first identification indicia and said respective second identification indicia have already been send to said server, then delaying said step of automatically sending until said first identification indicia or said respective second identification indicia have changed.
7. The method of claim 1, further comprising:
connecting to said server from a monitoring computer, and
obtaining said stored information regarding said first identification indicia and said second identification indicia with said monitoring computer.
8. The method of claim 1, further comprising:
storing additional information related to one of said plurality of substantially identical packets of digital information to comprise stored additional data; and
relating said stored additional data with said first identification indicia and said second identification indicia.
9. A detection system for use with the Internet for compiling information related to pirating of digitized information, comprising:
one or more servers in communication with said Internet, one or more storage units associated with said one or more servers;
said digitized information being associated with a first identification indicia that identifies said digitized information;
a first computer routine installed in a plurality of host computers utilizing said digitized information, said first computer routine being operable for determining a second identification indicia for each of said one or more host computers so as to uniquely identify each of said plurality of host computers, said first computer routine being operable for automatically transferring said first identification indicia and said second identification indicia through said Internet to said one or more servers, said one or more servers being programmed for receiving and storing in said one or more storage units said first identification indicia and said second identification indicia for each of said one or more host computers, said first computer routine being installed along with at least one of an operating system or an Internet browser of said plurality of host computers; and a second computer routine utilized by said one or more servers for determining if said first identification indicia is associated with more than one of said plurality of host computers.
10. The detection system of claim 9, further comprising:
said first computer routine determining if said digitized information has been altered so as to produce an alteration of said digitized information, if said digitized information has been altered said first computer routine indicating said alteration to said server.
11. The detection system of claim 9, wherein said first computer routine produces a third indicia related to said alteration and transmits said third indicia to said server such that said third indicia is stored in said one or more storage units and is associated with said first identification indicia and said second identification indicia.
12. A method for detecting illegal use of a plurality of substantially identical packets of digitized information, comprising:
installing a first computer routine in each of a plurality of computers, each of said plurality of computers utilizing one of said substantially identical packets of digitized information, said first computer routine not interfering with use of said packet of digitized information;
associating a first indicia with said packet of digitized information for identifying said packet of digitized information;
utilizing said first computer routine for determining a second indicia related to each of said plurality of computers;
when one of said plurality of computers is presently in communication with a network of computers then sending said first indicia and said second indicia over said network of computers to one or more servers;
storing said first indicia and said second indicia in said one or more servers; and
utilizing a second computer routine in said one or more servers for determining whether said first indicia is associated with more than one of said plurality of computers.
13. The method of claim 12, further comprising:
determining whether said packet of digitized information has been altered and when said one of said plurality of computers is presently in communication with said network of computers then automatically sending said determination of whether said digitized information has been altered over said network of computers to said second location.
14. The method of claim 1, further comprising:
providing that each of said plurality of packets of digitized information comprise at least one of an Internet browser or an operating system.
15. The method of claim 14, herein:
said each of said packets of digitized information comprises an Internet browser.
16. The method of claim 14, wherein:
said each of said packets of digitized information comprises an operating system.
17. The method of claim 12, further comprising:
determining whether one of said plurality of computers is connected to an intranet that includes a plurality of intranet computers,
storing intranet information concerning said first identification indicia and one or more of said plurality of intranet computers, and
transmitting said intranet information.
18. The method of claim 12, further comprising:
automatically determining whether one of said plurality of computers is presently in communication with a network of computers.
19. A method for use with the Internet for detecting pirating of digitized information, comprising:
providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers and comprises information from a hard drive;
providing at least one notification related to monitoring of said digitized information for unauthorized activity;
obtaining user agreement to allow said monitoring;
subsequently automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied; and
providing that each of said plurality of packets of digitized information comprise an operating system.
20. The method of claim 19, further comprising running a checksum over at least one portion of said digitized information.
21. The method of claim 1, further comprising running a checksum over at least one portion of said digitized information.
22. A method for use with the Internet for detecting pirating of digitized information, comprising:
providing a first identification indicia that is unique for each of a plurality of substantially identical packets of digitized information;
associating said first identification indicia with sales information;
determining a second identification indicia for each of a plurality of computers utilizing one of said plurality of substantially identical packets of digitized information, said second identification indicia is unique for each of said plurality of computers;
providing at least one notification related to monitoring of said digitized information for unauthorized activity;
obtaining user agreement to allow said monitoring;
subsequently automatically determining whether one or more of said plurality of computers is operable for communicating with said Internet;
sending said first identification indicia and said second identification indicia from each of said plurality of computers to one or more servers in communication with said Internet such that each of said plurality of substantially identical packets of digitized information is associated with each of said plurality of computers;
storing said first identification indicia and said second identification indicia in said one or more servers; and determining if said first identification indicia is associated with more than one of said plurality of computers so as to indicate a possibility that one of said plurality of substantially identical packets of digitized information has been copied; and
providing that each of said plurality of packets of digitized information comprise at least one of an operating system or an Internet browser.
23. The method of claim 1 further comprising associating said first identification indicia with sales information.
24. The method of claim 19 further comprising associating said first identification indicia with sales information.
25. The method of claim 1 further comprising utilizing information from a hard drive to produce said second identification indicia.
26. The method of claim 25 wherein said information from said hard drive is changeable by reformatting said hard drive.
27. The method of claim 19 wherein said information from said hard drive is changeable by reformatting said hard drive.
28. The method of claim 22 further comprising utilizing information from a hard drive to produce said second identification indicia.
29. The method of claim 28 wherein said information from said hard drive is changeable by reformatting said hard drive.
30. The method of claim 1 further comprising compiling a list of uses of said first identification indicia with said second identification indicia wherein said list comprises multiple uses of said second identification indicia with said first identification indicia.
31. The method of claim 19 further comprising compiling a list of uses of said first identification indicia with said second identification indicia wherein said list comprises multiple uses of said second identification indicia with said first identification indicia.
32. The method of claim 22 further comprising compiling a list of uses of said first identification indicia with said second identification indicia wherein said list comprises multiple uses of said second identification indicia with said first identification indicia.
33. The method of claim 22, further comprising running a checksum over at least one portion of said digitized information.
34. The method of claim 22 comprising determining whether one of said plurality of substantially identical packets of digitized information has been altered with respect to an original version.
US11/932,507 1999-01-19 2007-10-31 System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection Expired - Lifetime USRE41227E1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/932,507 USRE41227E1 (en) 1999-01-19 2007-10-31 System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US11636799P 1999-01-19 1999-01-19
US09/260,957 US6449645B1 (en) 1999-01-19 1999-03-02 System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
US11/932,507 USRE41227E1 (en) 1999-01-19 2007-10-31 System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US09/260,957 Reissue US6449645B1 (en) 1999-01-19 1999-03-02 System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection

Publications (1)

Publication Number Publication Date
USRE41227E1 true USRE41227E1 (en) 2010-04-13

Family

ID=26814163

Family Applications (2)

Application Number Title Priority Date Filing Date
US09/260,957 Ceased US6449645B1 (en) 1999-01-19 1999-03-02 System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
US11/932,507 Expired - Lifetime USRE41227E1 (en) 1999-01-19 2007-10-31 System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection

Family Applications Before (1)

Application Number Title Priority Date Filing Date
US09/260,957 Ceased US6449645B1 (en) 1999-01-19 1999-03-02 System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection

Country Status (1)

Country Link
US (2) US6449645B1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120311190A1 (en) * 2000-03-02 2012-12-06 Sony Corporation Communication network system, gateway, data communication method and program providing medium

Families Citing this family (76)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7503072B2 (en) * 1998-04-29 2009-03-10 Microsoft Corporation Hardware ID to prevent software piracy
US6970849B1 (en) 1999-12-17 2005-11-29 Microsoft Corporation Inter-server communication using request with encrypted parameter
US6996720B1 (en) * 1999-12-17 2006-02-07 Microsoft Corporation System and method for accessing protected content in a rights-management architecture
US7272572B1 (en) 2000-03-20 2007-09-18 Innovaport Llc Method and system for facilitating the transfer of intellectual property
US7024696B1 (en) 2000-06-14 2006-04-04 Reuben Bahar Method and system for prevention of piracy of a given software application via a communications network
US7017189B1 (en) * 2000-06-27 2006-03-21 Microsoft Corporation System and method for activating a rendering device in a multi-level rights-management architecture
US7171692B1 (en) 2000-06-27 2007-01-30 Microsoft Corporation Asynchronous communication within a server arrangement
US7051200B1 (en) 2000-06-27 2006-05-23 Microsoft Corporation System and method for interfacing a software process to secure repositories
US6891953B1 (en) * 2000-06-27 2005-05-10 Microsoft Corporation Method and system for binding enhanced software features to a persona
US7539875B1 (en) 2000-06-27 2009-05-26 Microsoft Corporation Secure repository with layers of tamper resistance and system and method for providing same
US6981262B1 (en) 2000-06-27 2005-12-27 Microsoft Corporation System and method for client interaction in a multi-level rights-management architecture
US7158953B1 (en) 2000-06-27 2007-01-02 Microsoft Corporation Method and system for limiting the use of user-specific software features
US7225159B2 (en) * 2000-06-30 2007-05-29 Microsoft Corporation Method for authenticating and securing integrated bookstore entries
US20020046045A1 (en) * 2000-06-30 2002-04-18 Attila Narin Architecture for an electronic shopping service integratable with a software application
JP2002297452A (en) * 2001-03-30 2002-10-11 Matsushita Electric Ind Co Ltd Record regenerating device, controlling method, and unfairness preventing system
US7188342B2 (en) * 2001-04-20 2007-03-06 Microsoft Corporation Server controlled branding of client software deployed over computer networks
US7146642B1 (en) * 2001-06-29 2006-12-05 Mcafee, Inc. System, method and computer program product for detecting modifications to risk assessment scanning caused by an intermediate device
US20030208382A1 (en) * 2001-07-05 2003-11-06 Westfall Mark D Electronic medical record system and method
US7016085B2 (en) * 2001-08-31 2006-03-21 Hewlett-Packard Development Company, L.P. Remote proofing service adaptively isolated from the internet
KR20060007372A (en) * 2003-03-06 2006-01-24 렌슬러 폴리테크닉 인스티튜트 Rapid generation of nanoparticles from bulk solids at room temperature
TW200511053A (en) * 2003-09-03 2005-03-16 United Microelectronics Corp System, method and chip for hardware detection of illegal software user, computer system having hardware detection chip thereof and a software registration center
JP4583808B2 (en) * 2004-05-17 2010-11-17 パナソニック株式会社 Program execution control device and program execution control method
US7272728B2 (en) * 2004-06-14 2007-09-18 Iovation, Inc. Network security and fraud detection system and method
US8087092B2 (en) * 2005-09-02 2011-12-27 Uniloc Usa, Inc. Method and apparatus for detection of tampering attacks
JP4890931B2 (en) * 2006-05-01 2012-03-07 キヤノン株式会社 Content management method, apparatus, and system
US8284929B2 (en) 2006-09-14 2012-10-09 Uniloc Luxembourg S.A. System of dependant keys across multiple pieces of related scrambled information
US8751815B2 (en) * 2006-10-25 2014-06-10 Iovation Inc. Creating and verifying globally unique device-specific identifiers
US7725622B2 (en) * 2006-11-29 2010-05-25 Townsend Analytics, Ltd. Data distribution system and method
US20080127230A1 (en) * 2006-11-29 2008-05-29 Townsend Analytics, Ltd. Method and system for transmitting data
US7908662B2 (en) * 2007-06-21 2011-03-15 Uniloc U.S.A., Inc. System and method for auditing software usage
US8160962B2 (en) * 2007-09-20 2012-04-17 Uniloc Luxembourg S.A. Installing protected software product using unprotected installation image
EP2223256A1 (en) 2007-11-17 2010-09-01 Uniloc Usa, Inc. System and method for adjustable licensing of digital products
WO2009076232A1 (en) * 2007-12-05 2009-06-18 Uniloc Corporation System and method for device bound public key infrastructure
EP2260430A2 (en) * 2008-02-22 2010-12-15 Uniloc Usa, Inc. License auditing for distributed applications
US8812701B2 (en) 2008-05-21 2014-08-19 Uniloc Luxembourg, S.A. Device and method for secured communication
EP2313858A4 (en) * 2008-06-25 2012-01-18 Uniloc Usa Inc System and method for monitoring efficacy of online advertising
EP2396742A2 (en) * 2009-02-10 2011-12-21 Uniloc Usa, Inc. Web content access using a client device identifier
US20100257214A1 (en) * 2009-03-18 2010-10-07 Luc Bessette Medical records system with dynamic avatar generator and avatar viewer
US8103553B2 (en) * 2009-06-06 2012-01-24 Bullock Roddy Mckee Method for making money on internet news sites and blogs
US20100312702A1 (en) * 2009-06-06 2010-12-09 Bullock Roddy M System and method for making money by facilitating easy online payment
US20100332337A1 (en) * 2009-06-25 2010-12-30 Bullock Roddy Mckee Universal one-click online payment method and system
US9047450B2 (en) 2009-06-19 2015-06-02 Deviceauthority, Inc. Identification of embedded system devices
US9633183B2 (en) 2009-06-19 2017-04-25 Uniloc Luxembourg S.A. Modular software protection
US20100325424A1 (en) * 2009-06-19 2010-12-23 Etchegoyen Craig S System and Method for Secured Communications
US9047458B2 (en) 2009-06-19 2015-06-02 Deviceauthority, Inc. Network access protection
US20100325431A1 (en) * 2009-06-19 2010-12-23 Joseph Martin Mordetsky Feature-Specific Keys for Executable Code
US20100325446A1 (en) * 2009-06-19 2010-12-23 Joseph Martin Mordetsky Securing Executable Code Integrity Using Auto-Derivative Key
US8423473B2 (en) 2009-06-19 2013-04-16 Uniloc Luxembourg S. A. Systems and methods for game activation
US8495359B2 (en) * 2009-06-22 2013-07-23 NetAuthority System and method for securing an electronic communication
US20100324981A1 (en) * 2009-06-22 2010-12-23 Etchegoyen Craig S System and Method for Media Distribution on Social Networks
US20100325051A1 (en) * 2009-06-22 2010-12-23 Craig Stephen Etchegoyen System and Method for Piracy Reduction in Software Activation
US20100325735A1 (en) * 2009-06-22 2010-12-23 Etchegoyen Craig S System and Method for Software Activation
US20100325025A1 (en) * 2009-06-22 2010-12-23 Etchegoyen Craig S System and Method for Sharing Media
US20100325200A1 (en) * 2009-06-22 2010-12-23 Craig Stephen Etchegoyen System and Method for Software Activation Through Digital Media Fingerprinting
US20100325149A1 (en) * 2009-06-22 2010-12-23 Craig Stephen Etchegoyen System and Method for Auditing Software Usage
US20100325040A1 (en) * 2009-06-23 2010-12-23 Craig Stephen Etchegoyen Device Authority for Authenticating a User of an Online Service
US8736462B2 (en) 2009-06-23 2014-05-27 Uniloc Luxembourg, S.A. System and method for traffic information delivery
US20100321208A1 (en) * 2009-06-23 2010-12-23 Craig Stephen Etchegoyen System and Method for Emergency Communications
US20100324989A1 (en) * 2009-06-23 2010-12-23 Craig Stephen Etchegoyen System and Method for Monitoring Efficacy of Online Advertising
US8903653B2 (en) 2009-06-23 2014-12-02 Uniloc Luxembourg S.A. System and method for locating network nodes
US8452960B2 (en) * 2009-06-23 2013-05-28 Netauthority, Inc. System and method for content delivery
US20100332319A1 (en) * 2009-06-24 2010-12-30 Craig Stephen Etchegoyen Methods and Systems for Dynamic Serving of Advertisements in a Game or Virtual Reality Environment
US9075958B2 (en) * 2009-06-24 2015-07-07 Uniloc Luxembourg S.A. Use of fingerprint with an on-line or networked auction
US20100332331A1 (en) * 2009-06-24 2010-12-30 Craig Stephen Etchegoyen Systems and Methods for Providing an Interface for Purchasing Ad Slots in an Executable Program
US8239852B2 (en) * 2009-06-24 2012-08-07 Uniloc Luxembourg S.A. Remote update of computers based on physical device recognition
US10068282B2 (en) 2009-06-24 2018-09-04 Uniloc 2017 Llc System and method for preventing multiple online purchases
US9129097B2 (en) * 2009-06-24 2015-09-08 Uniloc Luxembourg S.A. Systems and methods for auditing software usage using a covert key
US8213907B2 (en) * 2009-07-08 2012-07-03 Uniloc Luxembourg S. A. System and method for secured mobile communication
US9141489B2 (en) * 2009-07-09 2015-09-22 Uniloc Luxembourg S.A. Failover procedure for server system
US8726407B2 (en) 2009-10-16 2014-05-13 Deviceauthority, Inc. Authentication of computing and communications hardware
US20110093503A1 (en) * 2009-10-19 2011-04-21 Etchegoyen Craig S Computer Hardware Identity Tracking Using Characteristic Parameter-Derived Data
US8316421B2 (en) * 2009-10-19 2012-11-20 Uniloc Luxembourg S.A. System and method for device authentication with built-in tolerance
US8769296B2 (en) * 2009-10-19 2014-07-01 Uniloc Luxembourg, S.A. Software signature tracking
US9082128B2 (en) * 2009-10-19 2015-07-14 Uniloc Luxembourg S.A. System and method for tracking and scoring user activities
US8676684B2 (en) 2010-04-12 2014-03-18 Iovation Inc. System and method for evaluating risk in fraud prevention
AU2011100168B4 (en) 2011-02-09 2011-06-30 Device Authority Ltd Device-bound certificate authentication

Citations (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4688169A (en) 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
US4796220A (en) * 1986-12-15 1989-01-03 Pride Software Development Corp. Method of controlling the copying of software
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
US5182770A (en) * 1991-04-19 1993-01-26 Geza Medveczky System and apparatus for protecting computer software
US5199066A (en) 1989-04-18 1993-03-30 Special Effects Software, Inc. Method and apparatus for protecting software
US5287408A (en) * 1992-08-31 1994-02-15 Autodesk, Inc. Apparatus and method for serializing and validating copies of computer software
US5341429A (en) * 1992-12-04 1994-08-23 Testdrive Corporation Transformation of ephemeral material
US5357573A (en) 1991-08-12 1994-10-18 Intelligent Solution Services Gmbh Memory card
US5379343A (en) 1993-02-26 1995-01-03 Motorola, Inc. Detection of unauthorized use of software applications in communication units
US5416840A (en) * 1993-07-06 1995-05-16 Phoenix Technologies, Ltd. Software catalog encoding method and system
EP0679980A1 (en) 1994-04-25 1995-11-02 International Business Machines Corporation Method and apparatus enabling software trial with computer-dependent identification
US5490216A (en) 1992-09-21 1996-02-06 Uniloc Private Limited System for software registration
US5491804A (en) 1987-03-13 1996-02-13 International Business Machines Corp. Method and apparatus for automatic initialization of pluggable option cards
US5502831A (en) 1993-02-26 1996-03-26 Motorola, Inc. Method for detecting unauthorized modification of a communication or broadcast unit
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
EP0707270A2 (en) 1994-10-12 1996-04-17 International Business Machines Corporation Method and apparatus for validating system operation
US5564038A (en) * 1994-05-20 1996-10-08 International Business Machines Corporation Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period
US5579479A (en) 1994-10-03 1996-11-26 Plum Hall Inc. Computer software licensing authentication method and apparatus
US5651064A (en) * 1995-03-08 1997-07-22 544483 Alberta Ltd. System for preventing piracy of recorded media
US5652793A (en) * 1995-05-08 1997-07-29 Nvidia Corporation Method and apparatus for authenticating the use of software
US5666411A (en) 1994-01-13 1997-09-09 Mccarty; Johnnie C. System for computer software protection
US5671412A (en) * 1995-07-28 1997-09-23 Globetrotter Software, Incorporated License management system for software applications
US5754864A (en) * 1992-04-10 1998-05-19 Charles E. Hill & Associates, Inc. Software piracy detection system
EP0844549A1 (en) 1996-11-22 1998-05-27 Endress + Hauser Wetzer GmbH + Co. KG Method to protect software
US5790664A (en) * 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
US5796633A (en) * 1996-07-12 1998-08-18 Electronic Data Systems Corporation Method and system for performance monitoring in computer networks
US5835911A (en) 1994-02-08 1998-11-10 Fujitsu Limited Software distribution and maintenance system and method
US5842124A (en) 1996-11-16 1998-11-24 Qualcomm Incorporated System and method for user-programmable service programming of cellular telephones
US6041411A (en) * 1997-03-28 2000-03-21 Wyatt; Stuart Alan Method for defining and verifying user access rights to a computer information
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US6243468B1 (en) * 1998-04-29 2001-06-05 Microsoft Corporation Software anti-piracy system that adapts to hardware upgrades
US6244758B1 (en) * 1994-11-15 2001-06-12 Absolute Software Corp. Apparatus and method for monitoring electronic devices via a global network
US20010044782A1 (en) * 1998-04-29 2001-11-22 Microsoft Corporation Hardware ID to prevent software piracy
US20070016790A1 (en) * 1998-11-19 2007-01-18 Brundage Trent J Identification document and related methods

Patent Citations (37)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4658093A (en) * 1983-07-11 1987-04-14 Hellman Martin E Software distribution system
US4688169A (en) 1985-05-30 1987-08-18 Joshi Bhagirath S Computer software security system
US4796220A (en) * 1986-12-15 1989-01-03 Pride Software Development Corp. Method of controlling the copying of software
US5491804A (en) 1987-03-13 1996-02-13 International Business Machines Corp. Method and apparatus for automatic initialization of pluggable option cards
US5113518A (en) * 1988-06-03 1992-05-12 Durst Jr Robert T Method and system for preventing unauthorized use of software
US5199066A (en) 1989-04-18 1993-03-30 Special Effects Software, Inc. Method and apparatus for protecting software
US5182770A (en) * 1991-04-19 1993-01-26 Geza Medveczky System and apparatus for protecting computer software
US5357573A (en) 1991-08-12 1994-10-18 Intelligent Solution Services Gmbh Memory card
US5761649A (en) 1992-04-10 1998-06-02 Charles E. Hill & Associates, Inc. Method for updating a remote computer
US5754864A (en) * 1992-04-10 1998-05-19 Charles E. Hill & Associates, Inc. Software piracy detection system
US5287408A (en) * 1992-08-31 1994-02-15 Autodesk, Inc. Apparatus and method for serializing and validating copies of computer software
US5490216A (en) 1992-09-21 1996-02-06 Uniloc Private Limited System for software registration
US5341429A (en) * 1992-12-04 1994-08-23 Testdrive Corporation Transformation of ephemeral material
US5509070A (en) * 1992-12-15 1996-04-16 Softlock Services Inc. Method for encouraging purchase of executable and non-executable software
US5502831A (en) 1993-02-26 1996-03-26 Motorola, Inc. Method for detecting unauthorized modification of a communication or broadcast unit
US5379343A (en) 1993-02-26 1995-01-03 Motorola, Inc. Detection of unauthorized use of software applications in communication units
US5416840A (en) * 1993-07-06 1995-05-16 Phoenix Technologies, Ltd. Software catalog encoding method and system
US5666411A (en) 1994-01-13 1997-09-09 Mccarty; Johnnie C. System for computer software protection
US5835911A (en) 1994-02-08 1998-11-10 Fujitsu Limited Software distribution and maintenance system and method
EP0679980A1 (en) 1994-04-25 1995-11-02 International Business Machines Corporation Method and apparatus enabling software trial with computer-dependent identification
US5757907A (en) 1994-04-25 1998-05-26 International Business Machines Corporation Method and apparatus for enabling trial period use of software products: method and apparatus for generating a machine-dependent identification
US5564038A (en) * 1994-05-20 1996-10-08 International Business Machines Corporation Method and apparatus for providing a trial period for a software license product using a date stamp and designated test period
US5579479A (en) 1994-10-03 1996-11-26 Plum Hall Inc. Computer software licensing authentication method and apparatus
EP0707270A2 (en) 1994-10-12 1996-04-17 International Business Machines Corporation Method and apparatus for validating system operation
US6244758B1 (en) * 1994-11-15 2001-06-12 Absolute Software Corp. Apparatus and method for monitoring electronic devices via a global network
US5651064A (en) * 1995-03-08 1997-07-22 544483 Alberta Ltd. System for preventing piracy of recorded media
US5652793A (en) * 1995-05-08 1997-07-29 Nvidia Corporation Method and apparatus for authenticating the use of software
US5671412A (en) * 1995-07-28 1997-09-23 Globetrotter Software, Incorporated License management system for software applications
US5790664A (en) * 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
US5796633A (en) * 1996-07-12 1998-08-18 Electronic Data Systems Corporation Method and system for performance monitoring in computer networks
US5842124A (en) 1996-11-16 1998-11-24 Qualcomm Incorporated System and method for user-programmable service programming of cellular telephones
EP0844549A1 (en) 1996-11-22 1998-05-27 Endress + Hauser Wetzer GmbH + Co. KG Method to protect software
US6041411A (en) * 1997-03-28 2000-03-21 Wyatt; Stuart Alan Method for defining and verifying user access rights to a computer information
US6243468B1 (en) * 1998-04-29 2001-06-05 Microsoft Corporation Software anti-piracy system that adapts to hardware upgrades
US20010044782A1 (en) * 1998-04-29 2001-11-22 Microsoft Corporation Hardware ID to prevent software piracy
US6044471A (en) * 1998-06-04 2000-03-28 Z4 Technologies, Inc. Method and apparatus for securing software to reduce unauthorized use
US20070016790A1 (en) * 1998-11-19 2007-01-18 Brundage Trent J Identification document and related methods

Non-Patent Citations (8)

* Cited by examiner, † Cited by third party
Title
Appellant's Petition for Rehearing, pertaining to Kenneth L. Nashv. Microsoft Corporation, Nos. 05-1385, 05-1394, In the United States Court of Appeals for the Federal Circuit.
Brief of Appellant, Non-Confidential, pertaining to Kenneth L. Nashv. Microsoft Corporation, Nos. 05-1385, 05-1394, In the United States Court of Appeals for the Federal Circuit.
Decision on Motions regarding Patent Interference No. 105,356; Kenneth L. Nash -Junior Party; Aidan T. Hughes and David Pearce-Senior Parties; Filed Oct. 27, 2006.
Decision on Motions regarding Patent Interference No. 105,356; Kenneth L. Nash —Junior Party; Aidan T. Hughes and David Pearce—Senior Parties; Filed Oct. 27, 2006.
Joint Appendix, Non-Confidential, pertaining to Kenneth L. Nashv. Microsoft Corporation, Nos. 05-1385, 05-1394, In the United States Court of Appeals for the Federal Circuit.
Non-Confidential Corrected Brief of Defendant-Cross Appellant Microsoft Corporation, pertaining to Kenneth L. Nashv. Microsoft Corporation, Nos. 05-1385, 05-1394, In the United States Court of Appeals for the Federal Circuit.
Non-Confidential Corrected Brief of Defendant—Cross Appellant Microsoft Corporation, pertaining to Kenneth L. Nashv. Microsoft Corporation, Nos. 05-1385, 05-1394, In the United States Court of Appeals for the Federal Circuit.
Reply Brief of Appellant, Non-Confidential, pertaining to Kenneth L. Nashv. Microsoft Corporation, Nos. 05-1385, 05-1394, In the United States Court of Appeals for the Federal Circuit.

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120311190A1 (en) * 2000-03-02 2012-12-06 Sony Corporation Communication network system, gateway, data communication method and program providing medium
US8612630B2 (en) * 2000-03-02 2013-12-17 Sony Corporation Communication network system, gateway, data communication method and program providing medium
US9270661B2 (en) 2000-03-02 2016-02-23 Sony Corporation Communication network system, gateway, data communication method and program providing medium

Also Published As

Publication number Publication date
US6449645B1 (en) 2002-09-10

Similar Documents

Publication Publication Date Title
USRE41227E1 (en) System for monitoring the association of digitized information having identification indicia with more than one of uniquely identified computers in a network for illegal use detection
US6697948B1 (en) Methods and apparatus for protecting information
US7406593B2 (en) Method and apparatus for protecting information and privacy
US6684254B1 (en) Hyperlink filter for “pirated” and “disputed” copyright material on the internet in a method, system and program
US20060174346A1 (en) Instrumentation for alarming a software product
EP1591865B1 (en) Method and system for limiting software updates
US7503072B2 (en) Hardware ID to prevent software piracy
US6889209B1 (en) Method and apparatus for protecting information and privacy
EP1962216A2 (en) Method for detecting duplicated instances of a software license
US8769296B2 (en) Software signature tracking
JP2001312570A (en) Copyright protection device, copyright protection system, copyright protection verification device, medium and information collectivity
Suchanek et al. Watermarking for ontologies
EP1962217B1 (en) Self-defensive protected software with suspended latent license enforcement
CN1558303A (en) Digital watermarking infrastructure
JP2003016216A (en) System for detecting fraudulent diversion of contents, and computer program
KR101029333B1 (en) System and method for automatic watermarking
KR20010074203A (en) Debarment method of illegality copy by e-mail address for Software & License.
WO2003027864A1 (en) Systems and methods for preventing unauthorized copying of software downloaded from a remote server

Legal Events

Date Code Title Description
FPAY Fee payment

Year of fee payment: 12