Knowledge

Product activation

Source 📝

22: 180:, such as a time limit or enabling of product features, from the vendor's system and optionally also locks the license to the user's system. Once activated the license continues working on the user's machine with no further communication required with the vendor's systems. Some activation systems also support activation on user systems without Internet connections; a common approach is to exchange 188:
serial number was validated. A unique "key" was returned which allowed the program to continue for a trial period. If two D'Bridge systems communicated using the same key, the software deliberately crashed. The software has long since had the entire activation system removed and is now freeware by Nick J. Andre, Ltd.
263:. Despite independently developing its own technology, in April 2009 a jury found Microsoft to have willfully infringed Uniloc's patent. However, in September 2009, US District Judge William Smith "vacated" the jury's verdict and ruled in favour of Microsoft. This ruling was subsequently overturned in 2011. 271:
Software that has been installed but not activated does not perform its full functions, and/or imposes limits on file size or session time. Some software allows full functionality for a limited "trial" time before requiring activation. Unactivated software typically reminds the user to activate, at
187:
An early example of product activation was in the MS-DOS program D'Bridge Email System written by Chris Irwin, a commercial network system for BBS users and Fidonet. The program generated a unique serial number which then called the author's BBS via a dialup modem connection. Upon connection, the
287:
Software verifies activation every time it starts up, and sometimes while it is running. Some software even "phones home", checking a central database (across the Internet or other means) to check whether the specific activation has been revoked. Some software might stop working or reduce
315:
Product activation where there is no straightforward way to transfer the license to another person to activate on their computer has been widely criticised as making second-hand sales of products, particularly games, very difficult. Some suspect companies such as
279:
until a product key—a number encoded as a sequence of alphanumeric characters—is purchased and used to activate the software. Some products allow licenses to be transferred from one machine to another using online tools, without having to call
247:, required the user to activate the product via the Internet. However, all copies of Office 2000 do not require activation after April 15, 2003. After its success, the product activation system was extended worldwide and incorporated into 171:
Alternatively, the software vendor sends the user a unique product serial number. When the user installs the application it requests that the user enter their product serial number, and checks it with the vendor's systems over the
329:
Malfunction of the verification mechanism can cause vital software to suddenly stop working until re-activated or patched. This can happen in response to detected changes of installed hardware, or other software, of the operating
133:
whether it is authorized to fully function. Activation allows the software to stop blocking its use. An activation can last "forever", or it can have a time limit, requiring a renewal or re-activation for continued use.
301:
restrictions that may be legally invalid. For example, a company may refuse to reactivate software on an upgraded or new PC, even if the user may have a legal right to use the product under such circumstances.
323:
As the transfer of an activation request usually happens encrypted or at least obfuscated, the user cannot see or check if additional data from his/her machine gets transferred, creating privacy concerns.
164:) to generate a unique installation ID. This installation ID is sent to the manufacturer to verify the authenticity of the product key and to ensure that the product key is not being used for multiple 272:
program startup or at intervals, and when the imposed size or time limits are reached. (Some unactivated software has taken disruptive actions such as crashing or vandalism, but this is rare.)
312:, its purchased product may become unusable or incapable of being (re)installed unless an activation-free copy or final patch that removes or bypasses activation is released. 439: 129:
programs. Product activation prevents unlimited free use of copied or replicated software. Unactivated software refuses to fully function until it
525: 86: 58: 65: 518: 39: 105: 418:"Frequently asked questions about a problem that may cause Office 2000 prompts you to register after April 15, 2003" 72: 320:
to be using product activation to reduce second-hand sales of their games in order to increase sales of new copies.
165: 577: 511: 54: 43: 469: 560: 326:
Malfunction of the activating mechanism can delay users from getting started using newly-licensed software.
196: 932: 808: 396: 876: 756: 298: 871: 597: 375: 340: 781: 309: 901: 32: 79: 720: 592: 740: 582: 534: 216: 831: 715: 705: 587: 570: 126: 8: 836: 821: 618: 212: 200: 896: 841: 555: 493: 215:
in the Brazilian market. Microsoft then rolled out product activation in its flagship
911: 851: 826: 650: 350: 284:
to deactivate the copy on the old machine before reactivating it on the new machine.
281: 256: 725: 542: 260: 177: 122: 906: 881: 863: 730: 667: 623: 397:"Microsoft Incorporates New Anti-Piracy TechnologiesIn Windows 2000, Office 2000" 317: 304:
If the company ceases to support a specific product, goes out of business due to
204: 143: 160:
hardware serial numbers and an ID number specific to the product's license (a
148: 926: 786: 565: 244: 157: 710: 672: 660: 635: 891: 816: 766: 630: 417: 236: 161: 503: 798: 771: 735: 464: 462: 460: 305: 248: 181: 176:. The application obtains the license limits that apply to that user's 846: 793: 689: 677: 276: 252: 220: 457: 21: 655: 645: 640: 550: 173: 776: 761: 682: 208: 613: 345: 240: 232: 224: 211:
market. It broadened that successful pilot with the release of
153: 142:
In one form, product activation refers to a method invented by
228: 288:
functionality if it cannot connect to the central database.
470:"Viktor T. Toth - Just Say No... to Product Activation" 440:"Aussie inventor's $ 445m Microsoft windfall wiped out" 376:"Microsoft Extends Anti-Piracy Features in Office 2000" 498: 46:. Unsourced material may be challenged and removed. 924: 519: 199:was introduced in the Brazilian version of 526: 512: 370: 368: 366: 533: 106:Learn how and when to remove this message 363: 925: 125:validation procedure required by some 507: 437: 275:Some 'unactivated' products act as a 44:adding citations to reliable sources 15: 219:product. All retail copies sold in 13: 438:Moses, Asher (30 September 2009). 137: 14: 944: 494:Inside Windows Product Activation 487: 431: 20: 255:and all subsequent versions of 184:files at an Internet terminal. 31:needs additional citations for 410: 389: 1: 356: 291: 156:where a software application 197:Microsoft Product Activation 191: 7: 809:Software release life cycle 399:. Microsoft.com. 2000-02-10 378:. Microsoft.com. 1998-12-09 334: 266: 203:Small Business Edition and 10: 949: 877:Software protection dongle 757:Unwanted software bundling 299:software license agreement 872:Digital rights management 862: 807: 749: 698: 606: 541: 341:Digital rights management 750:Deceptive and/or illicit 902:Software license server 420:. Support.microsoft.com 578:Freely redistributable 213:Microsoft Publisher 98 741:Software as a service 535:Software distribution 217:Microsoft Office 2000 149:U.S. patent 5,490,216 832:Software maintenance 706:Digital distribution 561:Free and open-source 127:proprietary software 55:"Product activation" 40:improve this article 837:Software maintainer 619:Commercial software 607:Compensation models 499:Windows Product Key 239:, and some sold in 201:Microsoft Office 97 933:Software licensing 897:Software copyright 887:Product activation 842:Software publisher 556:Floating licensing 277:time-limited trial 119:Product activation 920: 919: 912:Torrent poisoning 827:Long-term support 651:Pay what you want 351:Technical support 282:technical support 205:Microsoft Word 97 116: 115: 108: 90: 940: 726:Product bundling 699:Delivery methods 598:Source-available 528: 521: 514: 505: 504: 481: 480: 478: 477: 466: 455: 454: 452: 451: 435: 429: 428: 426: 425: 414: 408: 407: 405: 404: 393: 387: 386: 384: 383: 372: 151: 111: 104: 100: 97: 91: 89: 48: 24: 16: 948: 947: 943: 942: 941: 939: 938: 937: 923: 922: 921: 916: 907:Software patent 882:License manager 864:Copy protection 858: 803: 745: 731:Retail software 694: 668:Open-core model 624:Retail software 602: 537: 532: 490: 485: 484: 475: 473: 468: 467: 458: 449: 447: 436: 432: 423: 421: 416: 415: 411: 402: 400: 395: 394: 390: 381: 379: 374: 373: 364: 359: 337: 297:It can enforce 294: 269: 194: 147: 140: 138:Implementations 112: 101: 95: 92: 49: 47: 37: 25: 12: 11: 5: 946: 936: 935: 918: 917: 915: 914: 909: 904: 899: 894: 889: 884: 879: 874: 868: 866: 860: 859: 857: 856: 855: 854: 844: 839: 834: 829: 824: 819: 813: 811: 805: 804: 802: 801: 796: 791: 790: 789: 784: 779: 774: 769: 759: 753: 751: 747: 746: 744: 743: 738: 733: 728: 723: 718: 713: 708: 702: 700: 696: 695: 693: 692: 687: 686: 685: 675: 670: 665: 664: 663: 658: 648: 643: 638: 633: 628: 627: 626: 616: 610: 608: 604: 603: 601: 600: 595: 590: 585: 580: 575: 574: 573: 568: 558: 553: 547: 545: 539: 538: 531: 530: 523: 516: 508: 502: 501: 496: 489: 488:External links 486: 483: 482: 456: 430: 409: 388: 361: 360: 358: 355: 354: 353: 348: 343: 336: 333: 332: 331: 327: 324: 321: 313: 302: 293: 290: 268: 265: 193: 190: 146:and patented ( 144:Ric Richardson 139: 136: 114: 113: 28: 26: 19: 9: 6: 4: 3: 2: 945: 934: 931: 930: 928: 913: 910: 908: 905: 903: 900: 898: 895: 893: 890: 888: 885: 883: 880: 878: 875: 873: 870: 869: 867: 865: 861: 853: 850: 849: 848: 845: 843: 840: 838: 835: 833: 830: 828: 825: 823: 820: 818: 815: 814: 812: 810: 806: 800: 797: 795: 792: 788: 785: 783: 780: 778: 775: 773: 770: 768: 765: 764: 763: 760: 758: 755: 754: 752: 748: 742: 739: 737: 734: 732: 729: 727: 724: 722: 721:Pre-installed 719: 717: 714: 712: 709: 707: 704: 703: 701: 697: 691: 688: 684: 681: 680: 679: 676: 674: 671: 669: 666: 662: 659: 657: 654: 653: 652: 649: 647: 644: 642: 639: 637: 634: 632: 629: 625: 622: 621: 620: 617: 615: 612: 611: 609: 605: 599: 596: 594: 593:Public domain 591: 589: 586: 584: 581: 579: 576: 572: 569: 567: 564: 563: 562: 559: 557: 554: 552: 549: 548: 546: 544: 540: 536: 529: 524: 522: 517: 515: 510: 509: 506: 500: 497: 495: 492: 491: 471: 465: 463: 461: 445: 441: 434: 419: 413: 398: 392: 377: 371: 369: 367: 362: 352: 349: 347: 344: 342: 339: 338: 328: 325: 322: 319: 314: 311: 310:consolidation 307: 303: 300: 296: 295: 289: 285: 283: 278: 273: 264: 262: 258: 254: 250: 246: 245:United States 242: 238: 234: 230: 226: 222: 218: 214: 210: 206: 202: 198: 189: 185: 183: 179: 175: 169: 167: 166:installations 163: 159: 155: 150: 145: 135: 132: 128: 124: 120: 110: 107: 99: 88: 85: 81: 78: 74: 71: 67: 64: 60: 57: –  56: 52: 51:Find sources: 45: 41: 35: 34: 29:This article 27: 23: 18: 17: 886: 782:Trojan horse 711:File sharing 673:Postcardware 661:Donationware 636:Crowdfunding 583:License-free 474:. Retrieved 472:. Vttoth.com 448:. Retrieved 443: 433: 422:. Retrieved 412: 401:. Retrieved 391: 380:. Retrieved 286: 274: 270: 207:sold in the 195: 186: 170: 141: 130: 118: 117: 102: 93: 83: 76: 69: 62: 50: 38:Please help 33:verification 30: 892:Product key 822:End-of-life 817:Abandonware 767:Infostealer 716:On-premises 631:Crippleware 588:Proprietary 571:Open source 446:. Melbourne 237:New Zealand 162:product key 799:Shovelware 772:Ransomware 736:Sneakernet 476:2013-05-15 450:2009-11-07 424:2013-05-15 403:2013-05-15 382:2013-05-15 357:References 306:insolvency 292:Criticisms 249:Windows XP 131:determines 96:April 2011 66:newspapers 847:Vaporware 794:Scareware 690:Trialware 678:Shareware 253:Office XP 221:Australia 209:Hungarian 192:Microsoft 182:encrypted 927:Category 656:Careware 646:Freeware 641:Freemium 551:Beerware 543:Licenses 335:See also 267:Blocking 243:and the 174:Internet 777:Spyware 762:Malware 683:Nagware 444:The Age 330:system. 257:Windows 178:license 123:license 80:scholar 614:Adware 346:Dongle 261:Office 241:Canada 235:, and 233:France 225:Brazil 158:hashes 154:Uniloc 82:  75:  68:  61:  53:  229:China 152:) by 121:is a 87:JSTOR 73:books 852:list 787:Worm 566:Free 259:and 251:and 59:news 308:or 42:by 929:: 459:^ 442:. 365:^ 318:EA 231:, 227:, 223:, 168:. 527:e 520:t 513:v 479:. 453:. 427:. 406:. 385:. 109:) 103:( 98:) 94:( 84:· 77:· 70:· 63:· 36:.

Index


verification
improve this article
adding citations to reliable sources
"Product activation"
news
newspapers
books
scholar
JSTOR
Learn how and when to remove this message
license
proprietary software
Ric Richardson
U.S. patent 5,490,216
Uniloc
hashes
product key
installations
Internet
license
encrypted
Microsoft Product Activation
Microsoft Office 97
Microsoft Word 97
Hungarian
Microsoft Publisher 98
Microsoft Office 2000
Australia
Brazil

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.