Product activation
The product activation ( software activation ) is a form of copy protection that the conditions for the use of some software forms. In contrast to product registration, there is generally no transfer of personal data during product activation . Instead, the software is linked to the user's hardware.
Until the product has been successfully activated, the use of appropriately protected software is not possible or only possible to a limited extent (for a limited period of time).
As far as can be understood, product activation was used by Microsoft for the first time for private users to prevent the illegal use of Windows XP and Office . Thus, the term itself and the process flow are heavily influenced by Microsoft.
Procedure
The differences in the technical process of product activation are only very minor in the case of different software manufacturers. When the user installs the software, he must first enter the individual license key (also called CD key or product key) that he received with the purchased software. In the course of the installation routine, a so-called installation ID is then calculated from the license key and hardware features. This has the property that the individual hardware features can practically no longer be traced from it, but the product key can be easily found. The installation ID is then transmitted to the manufacturer via the Internet or telephone, who now has the license key in connection with a hash value , i.e. a number that was calculated from hardware features. The manufacturer can now check in its database how many different computers the software has already been installed on. The manufacturer can now send the user the confirmation ID, which in turn is calculated from the installation ID and is therefore individual for each installation.
Microsoft offers two product activation methods for volume license keys for companies that run without user intervention: the establishment of a Key Management Service ( KMS ) or the use of a Multiple Activation Key ( MAK ). KMS requires a minimum number of 25 clients to be activated, which are regularly connected to the KMS via the network. MAK, on the other hand, is recommended if fewer than 25 computers need to be activated or if they have limited network connections. KMS and MAK are offered for both operating systems and other Microsoft products.
See also: Product Activation of Windows XP
Legal problems in Germany
The use of product activation technologies in the mass market poses several legal problems. These are discussed in specialist journals, but are largely unresolved as there have not been any legal disputes regarding the following conflicts in the past. In particular, the questions arise whether the use of product activation routines
- restricts the rights of the user from § 69 UrhG . These are in detail the right to copy, as far as this is necessary for loading or running the program ( § 69c No. 1 UrhG in connection with § 69d Abs. 1 UrhG ), as well as the right of the user to make a backup copy, which is specified in § 69d of the Law on Copyright and Related Rights (UrhG) .
- the software renders defective .
Furthermore, there is often talk of a violation of the right to informational self-determination , which, however, is to be denied in the case of a pure software activation, since here, as already mentioned, no personal data is transmitted. However, some product activation techniques such as Steam require the creation of a personal account. The latter in particular turns out to be an obstacle, since reselling after use is impossible or only possible with great effort in advance of activation.
Examples of software that must be activated
Examples of operating systems :
- Windows from Windows XP , 2001
- ZETA 1.0, 2005
Examples of application software :
- Microsoft Office ( Office package ), from 2001
- Adobe Creative Suite (for the first time Adobe Photoshop from 2005, graphics processing software , then also the other CS applications)
- Norton AntiVirus ( antivirus program ), from 2005
- Autodesk Inventor ( CAD program)
Examples of computer games :
- Earth 2160 , 2005
- Games that are based on the Steam platform and can be bought on Steam (including Counter-Strike version 1.6 or higher, Half-Life and other games mainly produced by Valve , but also by other development studios); however, there are a few exceptions
Examples of software that program developers can offer product activation
- CopyShield
- Protection! Licensing Toolkit
- OriginKeyring
- CrypKey
- PELock
- EnigmaProtector
- FLEXnet Publisher (Flexera Software)
- SafeNet (Gemalto)
- SolidLicense
- ICE License Protection
- CodeMeter (Wibu-Systems)
With some so-called PE detector programs, laypeople can find out not only general technical information about a program file , but also the activation technologies used by the program.
Regionalized activation
Kaspersky Lab, for example, uses regionalized activation codes for its antivirus programs (this is how a US code does not work in Germany and vice versa), partly to make international trade in pirated copies more difficult, partly because the programs are sold at different prices in different regions. Once activated, the software can be used anywhere. Problems can arise if the license has to be renewed or the software has to be reinstalled in a different region than the one for which the license was purchased. The region is recognized by the IP address, so an Internet connection is required for activation.
A number of computer games also have regionalized activation.
The Galaxy smartphones from Samsung sold in America and Europe must be activated by a local SIM card, but can then also be used in other regions. The regionalized activation is intended to prevent gray imports.
Some credit cards can be blocked for certain regions of the world in order to prevent theft and misuse abroad. If the cardholder wishes to travel abroad and use the card there, the block for the region concerned can be temporarily lifted.
Distinguish themselves from the regionalised activation is the region code , which is to prevent the use of a product in other regions. The best-known examples are region-protected DVDs and Blu-ray discs, which only run in players with a matching region code. In the case of Blu-ray discs, the region code is only requested from the playback program, not from the drive or the operating system, so that by manipulating the playback program on the computer, discs from different regions can be played as often as required. The region code is only part of the firmware for standalone players. Blu-ray discs can also query the country code of the player / playback program, so that e.g. For example, such a protected disc from the USA does not run in Japan or vice versa (the USA and Japan are both in Blu-ray region A, but have different country codes). Although there are only three Blu-ray regions, this allows for more precise distribution control than with DVDs.
But also, for example, printers and their cartridges can have a regional code so that the user has to buy them in his region and cannot switch to imports from cheaper regions. Most of these cartridges also have a "built-in expiration date" (after a certain period of time they no longer work, even if they are still full), so that you can not stock up and can also tell whether you have tried to refill them.
Some video games and game consoles are also region protected.
Internet activation of demo versions
Some programs have to be activated on the Internet during the trial period. The program then connects to the Internet when it starts and checks whether the trial period has expired. Since the information about the trial period is not stored on the user's computer but on an external Internet server, manipulation to reset the trial period is extremely difficult. A disadvantage for the user is that the program cannot be used without an Internet connection, even if it is no longer needed.
See also
literature
- Christoph Baus: Avoiding the exhaustion effect by withholding usage rights? . In: Multimedia and Law . Vol. 1, 2002, p. 14 ff.
- Florian Faust : Software protection through product activation . In: Communication & Law . 2002, p. 583 ff.
- Christian Runte: Product activation - Civil law aspects of the "activation" of software . In: Computer and Law . 2001, p. 657 ff.