A system for providing protection against pirating of software product or
products or any other digital information being sent over the Internet,
or by physical means, to a computer system. The system generates a set of
parameters associated to the authorized user's system and uses those
parameters to form a value. Then the invention encrypts that value
leaving a set of encrypted forms of the value. The set of encrypted
values is then sent to the user's system. The original set of parameters
are again generated on the user's system and used to decrypt the set of
encrypted values sent to the user. If the result of this decryption
yields a minimum number of identical values, a quorum is deemed reached,
and the invention allows the user to access to the software product. The
software product also may have been encrypted using the initial formed
value. Thus, if the quorum is reached, the resultant most identical value
will be the initial value formed by the invention, and will then
successfully decrypt the encrypted software product.