22:
180:, such as a time limit or enabling of product features, from the vendor's system and optionally also locks the license to the user's system. Once activated the license continues working on the user's machine with no further communication required with the vendor's systems. Some activation systems also support activation on user systems without Internet connections; a common approach is to exchange
188:
serial number was validated. A unique "key" was returned which allowed the program to continue for a trial period. If two D'Bridge systems communicated using the same key, the software deliberately crashed. The software has long since had the entire activation system removed and is now freeware by Nick J. Andre, Ltd.
263:. Despite independently developing its own technology, in April 2009 a jury found Microsoft to have willfully infringed Uniloc's patent. However, in September 2009, US District Judge William Smith "vacated" the jury's verdict and ruled in favour of Microsoft. This ruling was subsequently overturned in 2011.
271:
Software that has been installed but not activated does not perform its full functions, and/or imposes limits on file size or session time. Some software allows full functionality for a limited "trial" time before requiring activation. Unactivated software typically reminds the user to activate, at
187:
An early example of product activation was in the MS-DOS program D'Bridge Email System written by Chris Irwin, a commercial network system for BBS users and
Fidonet. The program generated a unique serial number which then called the author's BBS via a dialup modem connection. Upon connection, the
287:
Software verifies activation every time it starts up, and sometimes while it is running. Some software even "phones home", checking a central database (across the
Internet or other means) to check whether the specific activation has been revoked. Some software might stop working or reduce
315:
Product activation where there is no straightforward way to transfer the license to another person to activate on their computer has been widely criticised as making second-hand sales of products, particularly games, very difficult. Some suspect companies such as
279:
until a product key—a number encoded as a sequence of alphanumeric characters—is purchased and used to activate the software. Some products allow licenses to be transferred from one machine to another using online tools, without having to call
247:, required the user to activate the product via the Internet. However, all copies of Office 2000 do not require activation after April 15, 2003. After its success, the product activation system was extended worldwide and incorporated into
171:
Alternatively, the software vendor sends the user a unique product serial number. When the user installs the application it requests that the user enter their product serial number, and checks it with the vendor's systems over the
329:
Malfunction of the verification mechanism can cause vital software to suddenly stop working until re-activated or patched. This can happen in response to detected changes of installed hardware, or other software, of the operating
133:
whether it is authorized to fully function. Activation allows the software to stop blocking its use. An activation can last "forever", or it can have a time limit, requiring a renewal or re-activation for continued use.
301:
restrictions that may be legally invalid. For example, a company may refuse to reactivate software on an upgraded or new PC, even if the user may have a legal right to use the product under such circumstances.
323:
As the transfer of an activation request usually happens encrypted or at least obfuscated, the user cannot see or check if additional data from his/her machine gets transferred, creating privacy concerns.
164:) to generate a unique installation ID. This installation ID is sent to the manufacturer to verify the authenticity of the product key and to ensure that the product key is not being used for multiple
272:
program startup or at intervals, and when the imposed size or time limits are reached. (Some unactivated software has taken disruptive actions such as crashing or vandalism, but this is rare.)
312:, its purchased product may become unusable or incapable of being (re)installed unless an activation-free copy or final patch that removes or bypasses activation is released.
439:
129:
programs. Product activation prevents unlimited free use of copied or replicated software. Unactivated software refuses to fully function until it
525:
86:
58:
65:
518:
39:
105:
418:"Frequently asked questions about a problem that may cause Office 2000 prompts you to register after April 15, 2003"
72:
320:
to be using product activation to reduce second-hand sales of their games in order to increase sales of new copies.
165:
577:
511:
54:
43:
469:
560:
326:
Malfunction of the activating mechanism can delay users from getting started using newly-licensed software.
196:
932:
808:
396:
876:
756:
298:
871:
597:
375:
340:
781:
309:
901:
32:
79:
720:
592:
740:
582:
534:
216:
831:
715:
705:
587:
570:
126:
8:
836:
821:
618:
212:
200:
896:
841:
555:
493:
215:
in the
Brazilian market. Microsoft then rolled out product activation in its flagship
911:
851:
826:
650:
350:
284:
to deactivate the copy on the old machine before reactivating it on the new machine.
281:
256:
725:
542:
260:
177:
122:
906:
881:
863:
730:
667:
623:
397:"Microsoft Incorporates New Anti-Piracy TechnologiesIn Windows 2000, Office 2000"
317:
304:
If the company ceases to support a specific product, goes out of business due to
204:
143:
160:
hardware serial numbers and an ID number specific to the product's license (a
148:
926:
786:
565:
244:
157:
710:
672:
660:
635:
891:
816:
766:
630:
417:
236:
161:
503:
798:
771:
735:
464:
462:
460:
305:
248:
181:
176:. The application obtains the license limits that apply to that user's
846:
793:
689:
677:
276:
252:
220:
457:
21:
655:
645:
640:
550:
173:
776:
761:
682:
208:
613:
345:
240:
232:
224:
211:
market. It broadened that successful pilot with the release of
153:
142:
In one form, product activation refers to a method invented by
228:
288:
functionality if it cannot connect to the central database.
470:"Viktor T. Toth - Just Say No... to Product Activation"
440:"Aussie inventor's $ 445m Microsoft windfall wiped out"
376:"Microsoft Extends Anti-Piracy Features in Office 2000"
498:
46:. Unsourced material may be challenged and removed.
924:
519:
199:was introduced in the Brazilian version of
526:
512:
370:
368:
366:
533:
106:Learn how and when to remove this message
363:
925:
125:validation procedure required by some
507:
437:
275:Some 'unactivated' products act as a
44:adding citations to reliable sources
15:
219:product. All retail copies sold in
13:
438:Moses, Asher (30 September 2009).
137:
14:
944:
494:Inside Windows Product Activation
487:
431:
20:
255:and all subsequent versions of
184:files at an Internet terminal.
31:needs additional citations for
410:
389:
1:
356:
291:
156:where a software application
197:Microsoft Product Activation
191:
7:
809:Software release life cycle
399:. Microsoft.com. 2000-02-10
378:. Microsoft.com. 1998-12-09
334:
266:
203:Small Business Edition and
10:
949:
877:Software protection dongle
757:Unwanted software bundling
299:software license agreement
872:Digital rights management
862:
807:
749:
698:
606:
541:
341:Digital rights management
750:Deceptive and/or illicit
902:Software license server
420:. Support.microsoft.com
578:Freely redistributable
213:Microsoft Publisher 98
741:Software as a service
535:Software distribution
217:Microsoft Office 2000
149:U.S. patent 5,490,216
832:Software maintenance
706:Digital distribution
561:Free and open-source
127:proprietary software
55:"Product activation"
40:improve this article
837:Software maintainer
619:Commercial software
607:Compensation models
499:Windows Product Key
239:, and some sold in
201:Microsoft Office 97
933:Software licensing
897:Software copyright
887:Product activation
842:Software publisher
556:Floating licensing
277:time-limited trial
119:Product activation
920:
919:
912:Torrent poisoning
827:Long-term support
651:Pay what you want
351:Technical support
282:technical support
205:Microsoft Word 97
116:
115:
108:
90:
940:
726:Product bundling
699:Delivery methods
598:Source-available
528:
521:
514:
505:
504:
481:
480:
478:
477:
466:
455:
454:
452:
451:
435:
429:
428:
426:
425:
414:
408:
407:
405:
404:
393:
387:
386:
384:
383:
372:
151:
111:
104:
100:
97:
91:
89:
48:
24:
16:
948:
947:
943:
942:
941:
939:
938:
937:
923:
922:
921:
916:
907:Software patent
882:License manager
864:Copy protection
858:
803:
745:
731:Retail software
694:
668:Open-core model
624:Retail software
602:
537:
532:
490:
485:
484:
475:
473:
468:
467:
458:
449:
447:
436:
432:
423:
421:
416:
415:
411:
402:
400:
395:
394:
390:
381:
379:
374:
373:
364:
359:
337:
297:It can enforce
294:
269:
194:
147:
140:
138:Implementations
112:
101:
95:
92:
49:
47:
37:
25:
12:
11:
5:
946:
936:
935:
918:
917:
915:
914:
909:
904:
899:
894:
889:
884:
879:
874:
868:
866:
860:
859:
857:
856:
855:
854:
844:
839:
834:
829:
824:
819:
813:
811:
805:
804:
802:
801:
796:
791:
790:
789:
784:
779:
774:
769:
759:
753:
751:
747:
746:
744:
743:
738:
733:
728:
723:
718:
713:
708:
702:
700:
696:
695:
693:
692:
687:
686:
685:
675:
670:
665:
664:
663:
658:
648:
643:
638:
633:
628:
627:
626:
616:
610:
608:
604:
603:
601:
600:
595:
590:
585:
580:
575:
574:
573:
568:
558:
553:
547:
545:
539:
538:
531:
530:
523:
516:
508:
502:
501:
496:
489:
488:External links
486:
483:
482:
456:
430:
409:
388:
361:
360:
358:
355:
354:
353:
348:
343:
336:
333:
332:
331:
327:
324:
321:
313:
302:
293:
290:
268:
265:
193:
190:
146:and patented (
144:Ric Richardson
139:
136:
114:
113:
28:
26:
19:
9:
6:
4:
3:
2:
945:
934:
931:
930:
928:
913:
910:
908:
905:
903:
900:
898:
895:
893:
890:
888:
885:
883:
880:
878:
875:
873:
870:
869:
867:
865:
861:
853:
850:
849:
848:
845:
843:
840:
838:
835:
833:
830:
828:
825:
823:
820:
818:
815:
814:
812:
810:
806:
800:
797:
795:
792:
788:
785:
783:
780:
778:
775:
773:
770:
768:
765:
764:
763:
760:
758:
755:
754:
752:
748:
742:
739:
737:
734:
732:
729:
727:
724:
722:
721:Pre-installed
719:
717:
714:
712:
709:
707:
704:
703:
701:
697:
691:
688:
684:
681:
680:
679:
676:
674:
671:
669:
666:
662:
659:
657:
654:
653:
652:
649:
647:
644:
642:
639:
637:
634:
632:
629:
625:
622:
621:
620:
617:
615:
612:
611:
609:
605:
599:
596:
594:
593:Public domain
591:
589:
586:
584:
581:
579:
576:
572:
569:
567:
564:
563:
562:
559:
557:
554:
552:
549:
548:
546:
544:
540:
536:
529:
524:
522:
517:
515:
510:
509:
506:
500:
497:
495:
492:
491:
471:
465:
463:
461:
445:
441:
434:
419:
413:
398:
392:
377:
371:
369:
367:
362:
352:
349:
347:
344:
342:
339:
338:
328:
325:
322:
319:
314:
311:
310:consolidation
307:
303:
300:
296:
295:
289:
285:
283:
278:
273:
264:
262:
258:
254:
250:
246:
245:United States
242:
238:
234:
230:
226:
222:
218:
214:
210:
206:
202:
198:
189:
185:
183:
179:
175:
169:
167:
166:installations
163:
159:
155:
150:
145:
135:
132:
128:
124:
120:
110:
107:
99:
88:
85:
81:
78:
74:
71:
67:
64:
60:
57: –
56:
52:
51:Find sources:
45:
41:
35:
34:
29:This article
27:
23:
18:
17:
886:
782:Trojan horse
711:File sharing
673:Postcardware
661:Donationware
636:Crowdfunding
583:License-free
474:. Retrieved
472:. Vttoth.com
448:. Retrieved
443:
433:
422:. Retrieved
412:
401:. Retrieved
391:
380:. Retrieved
286:
274:
270:
207:sold in the
195:
186:
170:
141:
130:
118:
117:
102:
93:
83:
76:
69:
62:
50:
38:Please help
33:verification
30:
892:Product key
822:End-of-life
817:Abandonware
767:Infostealer
716:On-premises
631:Crippleware
588:Proprietary
571:Open source
446:. Melbourne
237:New Zealand
162:product key
799:Shovelware
772:Ransomware
736:Sneakernet
476:2013-05-15
450:2009-11-07
424:2013-05-15
403:2013-05-15
382:2013-05-15
357:References
306:insolvency
292:Criticisms
249:Windows XP
131:determines
96:April 2011
66:newspapers
847:Vaporware
794:Scareware
690:Trialware
678:Shareware
253:Office XP
221:Australia
209:Hungarian
192:Microsoft
182:encrypted
927:Category
656:Careware
646:Freeware
641:Freemium
551:Beerware
543:Licenses
335:See also
267:Blocking
243:and the
174:Internet
777:Spyware
762:Malware
683:Nagware
444:The Age
330:system.
257:Windows
178:license
123:license
80:scholar
614:Adware
346:Dongle
261:Office
241:Canada
235:, and
233:France
225:Brazil
158:hashes
154:Uniloc
82:
75:
68:
61:
53:
229:China
152:) by
121:is a
87:JSTOR
73:books
852:list
787:Worm
566:Free
259:and
251:and
59:news
308:or
42:by
929::
459:^
442:.
365:^
318:EA
231:,
227:,
223:,
168:.
527:e
520:t
513:v
479:.
453:.
427:.
406:.
385:.
109:)
103:(
98:)
94:(
84:·
77:·
70:·
63:·
36:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.