A method and system for prevention of piracy of a given software application
via
a communications network, such as the Internet. A given software application, installed
on a user system, will not function until it is activated by a remote service provider.
This will require the user to provide the remote service provider with user data,
such as the user's personal identity information and the unique software identification
code relating to the specific software. User data will then be compared to archived
data in order to determine if the user is a pirator of the software. If not a pirator,
the remote service provider may transmit undisclosed service data, such as a software
activation code, to the user system. Once activated, the software will become fully
operational and allow the user complete access to its functions. In this manner,
piracy of a given software application can be prevented.