HOME

TheInfoList



OR:

A product key, also known as a software key, serial key or activation key, is a specific software-based key for a
computer program A computer program is a sequence or set of instructions in a programming language for a computer to execute. Computer programs are one component of software, which also includes documentation and other intangible components. A computer program ...
. It certifies that the copy of the program is original. Product keys consist of a series of numbers and/or letters. This sequence is typically entered by the user during the installation of computer software, and is then passed to a verification function in the program. This function manipulates the key sequence according to a mathematical
algorithm In mathematics and computer science, an algorithm () is a finite sequence of rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algorithms are used as specificat ...
and attempts to match the results to a set of valid solutions.


Effectiveness

Standard key generation, where product keys are generated mathematically, is not completely effective in stopping
copyright infringement of software Copyright infringement (at times referred to as piracy) is the use of works protected by copyright without permission for a usage where such permission is required, thereby infringing certain exclusive rights granted to the copyright holder, s ...
, as these keys can be distributed. In addition, with improved communication from the rise of the
Internet The Internet (or internet) is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a '' network of networks'' that consists of private, pub ...
, more sophisticated attacks on keys such as cracks (removing the need for a key) and product key generators have become common. Because of this, software publishers use additional
product activation Product activation is a license validation procedure required by some proprietary software programs. Product activation prevents unlimited free use of copied or replicated software. Unactivated software refuses to fully function until it ''determin ...
methods to verify that keys are both valid and uncompromised. One method assigns a product key based on a unique feature of the purchaser's computer hardware, which cannot be as easily duplicated since it depends on the user's hardware. Another method involves requiring one-time or periodical validation of the product key with an internet server (for games with an online component, this is done whenever the user signs in). The server can deactivate unmodified client software presenting invalid or compromised keys. Modified clients may bypass these checks, but the server can still deny those clients information or communication.


Examples


Windows 95 retail key

Windows 95 retail product keys take the form XXX-XXXXXXX. To determine whether the key is valid, Windows 95 performs the following checks: * The first 3 characters must not be equal to 333, 444, 555, 666, 777, 888 or 999. * The last 7 characters must all be numbers from 0-8. * The sum of the last 7 numbers must be divisible by 7 with no remainder. * The fourth character is unchecked. If all checks pass, the product key is valid.


Controversy

Some of the most effective product key protections are controversial due to inconvenience, strict enforcement, harsh penalties and, in some cases, false positives. Some product keys use uncompromising digital procedures to enforce the license agreement.


Inconvenience

Product keys are somewhat inconvenient for end users. Not only do they need to be entered whenever a program is installed, but the user must also be sure not to lose them. Loss of a product key usually means the software is useless once uninstalled, unless, prior to uninstallation, a key recovery application is used (although not all programs support this). Product keys also present new ways for distribution to go wrong. If a product is shipped with missing or invalid keys, then the product itself is useless. For example, all copies of '' Splinter Cell: Pandora Tomorrow'' originally shipped to Australia without product keys.


Enforcement and penalties

There are many cases of permanent bans enforced by companies detecting usage violations. It is common for an online system to immediately
blacklist Blacklisting is the action of a group or authority compiling a blacklist (or black list) of people, countries or other entities to be avoided or distrusted as being deemed unacceptable to those making the list. If someone is on a blacklist, t ...
an account caught running cracks or, in some cases, cheats. This results in a permanent ban. Players who wish to continue use of the software must repurchase it. This has inevitably led to criticism over the motivations of enforcing permanent bans. Particularly controversial is the situation which arises when multiple products' keys are bound together. If products have dependencies on other products (as is the case with
expansion pack An expansion pack, expansion set, supplement, or simply expansion is an addition to an existing role-playing game, tabletop game, video game or collectible card game. These add-ons usually add new game areas, weapons, objects, characters, or an ...
s), it is common for companies to ban all bound products. For example, if a fake key is used with an expansion pack, the server may ban legitimate keys from the original game. Similarly, with Valve's Steam service, all products the user has purchased are bound into the one account. If this account is banned, the user will lose access to every product associated with the same account. This "multi-ban" is highly controversial, since it bans users from products which they have legitimately purchased and used.


False positives

Bans are enforced by servers immediately upon detection of cracks or cheats, usually without human intervention. Sometimes, legitimate users are wrongly deemed in violation of the license, and banned. In large cases of false positives, they are sometimes corrected (as happened in ''
World of Warcraft ''World of Warcraft'' (''WoW'') is a massively multiplayer online role-playing game (MMORPG) released in 2004 by Blizzard Entertainment. Set in the ''Warcraft'' fantasy universe, ''World of Warcraft'' takes place within the world of Azeroth ...
''.Blizzard Unbans Linux World of Warcraft Players
''Softpedia'') However, individual cases may not be given any attention. A common cause of false positives (as with the ''World of Warcraft'' case above) is users of unsupported platforms. For example, users of
Linux Linux ( or ) is a family of open-source Unix-like operating systems based on the Linux kernel, an operating system kernel first released on September 17, 1991, by Linus Torvalds. Linux is typically packaged as a Linux distribution, which ...
can run Windows applications through compatibility layers such as
Wine Wine is an alcoholic drink typically made from fermented grapes. Yeast consumes the sugar in the grapes and converts it to ethanol and carbon dioxide, releasing heat in the process. Different varieties of grapes and strains of yeasts are m ...
and Cedega. This software combination sometimes triggers the game's server anti-cheating software, resulting in a ban due to Wine or Cedega being a Windows API compatibility layer for Linux, so it is considered third-party (cheating) software by the game's server.


See also

*
Biometric passport A biometric passport (also known as an e-passport or a digital passport) is a traditional passport that has an embedded electronic microprocessor chip which contains biometric information that can be used to authenticate the identity of the pa ...
*
Cryptographic hash function A cryptographic hash function (CHF) is a hash algorithm (a map of an arbitrary binary string to a binary string with fixed size of n bits) that has special properties desirable for cryptography: * the probability of a particular n-bit output re ...
*
Intel Upgrade Service The Intel Upgrade Service was a relatively short-lived and controversial program of Intel that allowed some low-end processors to have additional features unlocked by paying a fee and obtaining an activation code that was then entered in a softwar ...
*
Keygen A key generator (key-gen) is a computer program that generates a product licensing key, such as a serial number, necessary to activate for use of a software application. Keygens may be legitimately distributed by software manufacturers for lice ...
*
License manager A software license manager is a software management tool used by Independent software vendors or by end-user organizations to control where and how software products are able to run. License managers protect software vendors from losses due to ...
*
Product activation Product activation is a license validation procedure required by some proprietary software programs. Product activation prevents unlimited free use of copied or replicated software. Unactivated software refuses to fully function until it ''determin ...
*
Serial number A serial number is a unique identifier assigned incrementally or sequentially to an item, to ''uniquely'' identify it. Serial numbers need not be strictly numerical. They may contain letters and other typographical symbols, or may consist enti ...
*
Software license server A software license server is a centralized computer software system which provides access tokens, or keys, to client computers in order to enable licensed software to run on them. In 1989, Sassafras Software Inc developed their trademarked KeySe ...
*
Volume license key In software licensing, a volume licensing is the practice of selling a license authorizing one computer program to be used on a large number of computers or by a large number of users. Customers of such licensing schemes are typically business, ...


References

{{reflist Copyright infringement