A method and system for preventing piracy of a given software application
which makes use of a communications network, such as the Internet. A
given software application, when initially installed on a user system, is
non-functional until activated by a remote service provider. The user
must provide the remote service provider with user data, such as the
user's personal identity information and the unique software
identification code relating to the specific software. User data is
compared to archived data to determine if the user is a pirator of the
software. If the user is not a pirator, then the remote service provider
transmits service data, such as an activation code, to the user system.
Once activated, the software becomes fully operational, and the user is
allowed complete access to its functions.