Microsoft Product Activation
Encyclopedia
Microsoft Product Activation is a form of digital rights management
used by Microsoft Corporation in several of its computer
software programs
, most notably its Windows
operating system
and its Office
productivity suite. The procedure enforces compliance with the program's end-user license agreement
by transmitting information about both the product key used to install
the program and the user's computer hardware to Microsoft, inhibiting or completely preventing the use of the program until the validity of its license is confirmed.
The procedure has been met with significant criticism by many consumers, technical analysts and computer experts, who argue that it is poorly designed, highly inconvenient and ultimately does nothing to prevent software piracy. The process has been successfully circumvented
in the past on multiple occasions.
copy of Windows or Office, the user is asked to input a unique product key supplied on a certificate of authenticity
included with the program, which is later verified during activation. Immediate activation is not required following installation, but the program must be activated within a specific period of time in order to continue to function properly. Throughout this grace period, the user will be periodically reminded to activate the program, with warnings becoming more frequent over time.
Certain versions of Windows and Office are available under a volume license
, where a single product key is used for multiple installations. Programs purchased under this license must still be activated, with the exception of Windows XP
and all versions of Office released prior to Office 2010. Businesses using this licensing system have the option of using Microsoft's activation servers
or creating and managing their own.
If Windows is pre-installed on a computer by an original equipment manufacturer
(OEM), the operating system is automatically activated without the need for interaction from the user. In this case, the copy of Windows installed does not use the product key listed on the certificate of authenticity, but rather a master product key issued to OEMs called a System Locked Pre-installation (SLP) key. On each boot, Windows confirms the presence of specific information stored in the BIOS
by the manufacturer, ensuring the activation only remains valid on that computer, even if the product key is used on another machine.
or by telephone
. When activating over the Internet, the Activation Wizard automatically transmits and receives verification data to and from Microsoft servers, completing the process without any interaction by the user. Activation by telephone requires that a user and a Microsoft agent verbally exchange activation information. In this case, an installation ID is generated, which is then be read to the agent. The agent verifies the information and replies with a confirmation ID, which is then typed into the Activation Wizard.
The Activation Wizard generates verification data primarily based on information about hardware
in the computer. In Windows XP
, information about the following eight categories of hardware are included:
The verification data is also based on the product key entered during activation. In some cases, the product key is checked against a list of known illegally distributed keys.
Certain retail copies of Windows and Office sold in certain countries classified as emerging markets
have geographical activation restrictions, which only allow the user to activate the product within the indicated region.
When activation takes place, the program saves a record of the verification data in the user's computer. If the system is booted up with significant hardware changes, the application will likely require reactivation to prevent the same copy of the program being installed on two different systems.
questioned whether activation would ultimately be effective in stopping piracy, pointing out that while casual computer users would be affected, he would "be a fool to think that someone out there won't find a way to break this whole thing." Dave Wilson, a technology columnist at the Los Angeles Times
, describes activation as "just another example of a rapacious monopolist
abusing computer users who are helpless to do anything about it." He too believed that the system would not have "any significant effect on professional pirates." Fred Langa at InformationWeek
, with reference to the transmission of hardware information during activation, stated that "many users are incensed at this level of monitoring, intrusion, and control by Microsoft." Finally, Dr. Cyrus Peikari and Seth Fogie, security consultants, considered product activation to be "hostile both to privacy and to human dignity."
However, others defend Microsoft's use of product activation. The Harrison Group, a market research
firm, conducted a study in 2011 illustrating that computers running activated versions of Windows software were on average 50% faster than their pirated counterparts. The group concluded by stating that users of genuine Microsoft products ultimately receive superior performance while counterfeit users are susceptible to security issues and lost productivity. Fully Licensed GmbH, a developer of digital rights management technology, while criticizing Microsoft for being vague about the nature of information sent from a given computer during activation, nevertheless concluded that activation is not particularly intrusive and does not significantly violate privacy.
Microsoft Product Activation has also been criticized on multiple occasions for violating patent law. In 2006, Microsoft was required to pay $142 million to z4 Technologies for infringing on a product activation patent
, while in 2009 Microsoft was ordered to pay $388 million to Uniloc
for patent infringement in product activation in Windows XP, Office XP and Windows Server 2003.
Since the introduction of Windows Vista, most attempts at circumvention of product activation have focused on using leaked SLP product keys and BIOS information used by OEMs to preactivate Windows. In 2007, a circumvention measure was developed for Windows Vista that simulates the BIOS, allowing leaked SLP information to be fed to the operating system, bypassing activation. In 2009, SLP product keys and certificate information for Windows 7 were leaked to the public, allowing the BIOS to be reconfigured to bypass activation.
Digital rights management
Digital rights management is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that...
used by Microsoft Corporation in several of its computer
Computer
A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem...
software programs
Computer software
Computer software, or just software, is a collection of computer programs and related data that provide the instructions for telling a computer what to do and how to do it....
, most notably its Windows
Microsoft Windows
Microsoft Windows is a series of operating systems produced by Microsoft.Microsoft introduced an operating environment named Windows on November 20, 1985 as an add-on to MS-DOS in response to the growing interest in graphical user interfaces . Microsoft Windows came to dominate the world's personal...
operating system
Operating system
An operating system is a set of programs that manage computer hardware resources and provide common services for application software. The operating system is the most important type of system software in a computer system...
and its Office
Microsoft Office
Microsoft Office is a non-free commercial office suite of inter-related desktop applications, servers and services for the Microsoft Windows and Mac OS X operating systems, introduced by Microsoft in August 1, 1989. Initially a marketing term for a bundled set of applications, the first version of...
productivity suite. The procedure enforces compliance with the program's end-user license agreement
Software license agreement
A software license agreement is a contract between the "licensor" and purchaser of the right to use software. The license may define ways under which the copy can be used, in addition to the automatic rights of the buyer including the first sale doctrine and .Many form contracts are only contained...
by transmitting information about both the product key used to install
Installation (computer programs)
Installation of a program is the act of putting the program onto a computer system so that it can be executed....
the program and the user's computer hardware to Microsoft, inhibiting or completely preventing the use of the program until the validity of its license is confirmed.
The procedure has been met with significant criticism by many consumers, technical analysts and computer experts, who argue that it is poorly designed, highly inconvenient and ultimately does nothing to prevent software piracy. The process has been successfully circumvented
Software cracking
Software cracking is the modification of software to remove or disable features which are considered undesirable by the person cracking the software, usually related to protection methods: copy protection, trial/demo version, serial number, hardware key, date checks, CD check or software annoyances...
in the past on multiple occasions.
Before activation
When installing installing a retailRetail
Retail consists of the sale of physical goods or merchandise from a fixed location, such as a department store, boutique or kiosk, or by mail, in small or individual lots for direct consumption by the purchaser. Retailing may include subordinated services, such as delivery. Purchasers may be...
copy of Windows or Office, the user is asked to input a unique product key supplied on a certificate of authenticity
Certificate of Authenticity
A certificate of authenticity is a seal or small sticker on a proprietary computer program, t-shirt, jersey, or any other memorabilia or art work, especially in the world of computers and sports, it is commonly a seal on paper authenticating a specific art work which and is made to demonstrate...
included with the program, which is later verified during activation. Immediate activation is not required following installation, but the program must be activated within a specific period of time in order to continue to function properly. Throughout this grace period, the user will be periodically reminded to activate the program, with warnings becoming more frequent over time.
Certain versions of Windows and Office are available under a volume license
Volume license key
Volume License Key is a term used by many computer software companies to denote the product key used when installing software licensed under volume licensing, which allows a single product key to be used for multiple installations....
, where a single product key is used for multiple installations. Programs purchased under this license must still be activated, with the exception of Windows XP
Windows XP
Windows XP is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops and media centers. First released to computer manufacturers on August 24, 2001, it is the second most popular version of Windows, based on installed user base...
and all versions of Office released prior to Office 2010. Businesses using this licensing system have the option of using Microsoft's activation servers
Server (computing)
In the context of client-server architecture, a server is a computer program running to serve the requests of other programs, the "clients". Thus, the "server" performs some computational task on behalf of "clients"...
or creating and managing their own.
If Windows is pre-installed on a computer by an original equipment manufacturer
Original Equipment Manufacturer
An original equipment manufacturer, or OEM, manufactures products or components that are purchased by a company and retailed under that purchasing company's brand name. OEM refers to the company that originally manufactured the product. When referring to automotive parts, OEM designates a...
(OEM), the operating system is automatically activated without the need for interaction from the user. In this case, the copy of Windows installed does not use the product key listed on the certificate of authenticity, but rather a master product key issued to OEMs called a System Locked Pre-installation (SLP) key. On each boot, Windows confirms the presence of specific information stored in the BIOS
BIOS
In IBM PC compatible computers, the basic input/output system , also known as the System BIOS or ROM BIOS , is a de facto standard defining a firmware interface....
by the manufacturer, ensuring the activation only remains valid on that computer, even if the product key is used on another machine.
During activation
Activation is performed with a utility supplied with Windows and Office called the Activation Wizard. It can be performed either over the InternetInternet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide...
or by telephone
Telephone
The telephone , colloquially referred to as a phone, is a telecommunications device that transmits and receives sounds, usually the human voice. Telephones are a point-to-point communication system whose most basic function is to allow two people separated by large distances to talk to each other...
. When activating over the Internet, the Activation Wizard automatically transmits and receives verification data to and from Microsoft servers, completing the process without any interaction by the user. Activation by telephone requires that a user and a Microsoft agent verbally exchange activation information. In this case, an installation ID is generated, which is then be read to the agent. The agent verifies the information and replies with a confirmation ID, which is then typed into the Activation Wizard.
The Activation Wizard generates verification data primarily based on information about hardware
Hardware
Hardware is a general term for equipment such as keys, locks, hinges, latches, handles, wire, chains, plumbing supplies, tools, utensils, cutlery and machine parts. Household hardware is typically sold in hardware stores....
in the computer. In Windows XP
Windows XP
Windows XP is an operating system produced by Microsoft for use on personal computers, including home and business desktops, laptops and media centers. First released to computer manufacturers on August 24, 2001, it is the second most popular version of Windows, based on installed user base...
, information about the following eight categories of hardware are included:
- Display adapterVideo cardA video card, Graphics Card, or Graphics adapter is an expansion card which generates output images to a display. Most video cards offer various functions such as accelerated rendering of 3D scenes and 2D graphics, MPEG-2/MPEG-4 decoding, TV output, or the ability to connect multiple monitors...
- SCSI adapterSCSISmall Computer System Interface is a set of standards for physically connecting and transferring data between computers and peripheral devices. The SCSI standards define commands, protocols, and electrical and optical interfaces. SCSI is most commonly used for hard disks and tape drives, but it...
- IDE adapter
- Network adapter MAC addressMAC addressA Media Access Control address is a unique identifier assigned to network interfaces for communications on the physical network segment. MAC addresses are used for numerous network technologies and most IEEE 802 network technologies, including Ethernet...
- RAMRam-Animals:*Ram, an uncastrated male sheep*Ram cichlid, a species of freshwater fish endemic to Colombia and Venezuela-Military:*Battering ram*Ramming, a military tactic in which one vehicle runs into another...
amount range (e.g. 0-512 MB) - ProcessorCentral processing unitThe central processing unit is the portion of a computer system that carries out the instructions of a computer program, to perform the basic arithmetical, logical, and input/output operations of the system. The CPU plays a role somewhat analogous to the brain in the computer. The term has been in...
type and serial numberSerial numberA serial number is a unique number assigned for identification which varies from its successor or predecessor by a fixed discrete integer value... - Hard drive device and volume serial number
- Optical drive (e.g. DVD-ROM)
The verification data is also based on the product key entered during activation. In some cases, the product key is checked against a list of known illegally distributed keys.
Certain retail copies of Windows and Office sold in certain countries classified as emerging markets
Emerging markets
Emerging markets are nations with social or business activity in the process of rapid growth and industrialization. Based on data from 2006, there are around 28 emerging markets in the world . The economies of China and India are considered to be the largest...
have geographical activation restrictions, which only allow the user to activate the product within the indicated region.
After activation
If activation completes successfully, the user can continue to use the application without any further issues or impediments. However, if activation is not performed within the grace period or fails because of an illegal or invalid product key, the following restrictions will be imposed on the user:- In Windows XP, Windows Server 2003Windows Server 2003Windows Server 2003 is a server operating system produced by Microsoft, introduced on 24 April 2003. An updated version, Windows Server 2003 R2, was released to manufacturing on 6 December 2005...
and Windows Server 2003 R2, after a grace period of 30 days, the operating system cannot be used at all until the activation process is completed successfully. - In Windows VistaWindows VistaWindows Vista is an operating system released in several variations developed by Microsoft for use on personal computers, including home and business desktops, laptops, tablet PCs, and media center PCs...
, after a grace period of 30 days, the operating system will boot only into a reduced functionality mode. The reduced functionality varies based on whether the operating system is simply out of grace or has undergone a failed activation. In the former case, built-in games and premium features like Windows AeroWindows AeroWindows Aero is the graphical user interface and the default theme in most editions of Windows Vista and Windows 7, operating systems released by Microsoft. It is also available in Windows Server 2008, but is not enabled by default. Its name is a backronym for Authentic, Energetic, Reflective and...
are disabled, and the system is rebooted every hour; in the latter case, certain premium features are disabled and some content is not available from Windows UpdateWindows UpdateWindows Update is a service provided by Microsoft that provides updates for the Microsoft Windows operating system and its installed components, including Internet Explorer...
. - In Windows Vista SP1, Windows 7, Windows Server 2008 and Windows Server 2008 R2Windows Server 2008 R2Windows Server 2008 R2 is a server operating system produced by Microsoft. It was released to manufacturing on July 22, 2009 and launched on October 22, 2009. According to the Windows Server Team blog, the retail availability was September 14, 2009. It is built on Windows NT 6.1, the same core...
, after a grace period of 30 days (60 days for Windows Server 2008), the operating system will add a text message in the bottom-right hand corner of the screen stating that the copy of Windows in question is not valid, set the desktop background to black, allow only critical and security updates to be downloaded from Windows Update and give periodic reminders to activate the operating system. However, the operating system otherwise functions normally. - In Office XP, Office 2003, Office 2007 and Office 2010, after a grace period of 30-60 days for Office 2010, opening the program 25 times for Office 2007 and 50 times for Office 2003 and XP, the programs will enter a reduced functionality mode, where files can be viewed but not edited.
When activation takes place, the program saves a record of the verification data in the user's computer. If the system is booted up with significant hardware changes, the application will likely require reactivation to prevent the same copy of the program being installed on two different systems.
Windows
Retail activation | Volume licensing activation | Geographical activation restrictions | |
---|---|---|---|
Windows XP | |||
Windows Server 2003 | |||
Windows Vista | |||
Windows Server 2008 | |||
Windows 7 | |||
Office
Retail activation | Volume licensing activation | Geographical activation restrictions | |
---|---|---|---|
Office XP | |||
Office 2003 | |||
Office 2007 | |||
Office 2010 | |||
Criticism
While Microsoft claims that product activation ultimately benefits consumers by allowing Microsoft to produce higher quality software, it has nevertheless received much criticism regarding its design and implementation, effectiveness at stopping piracy and respect of privacy rights. For instance, during the development of Windows XP, beta testers strongly criticized the introduction of product activation, particularly because a change in computer hardware required re-activation. Ken Fischer at Ars TechnicaArs Technica
Ars Technica is a technology news and information website created by Ken Fisher and Jon Stokes in 1998. It publishes news, reviews and guides on issues such as computer hardware and software, science, technology policy, and video games. Ars Technica is known for its features, long articles that go...
questioned whether activation would ultimately be effective in stopping piracy, pointing out that while casual computer users would be affected, he would "be a fool to think that someone out there won't find a way to break this whole thing." Dave Wilson, a technology columnist at the Los Angeles Times
Los Angeles Times
The Los Angeles Times is a daily newspaper published in Los Angeles, California, since 1881. It was the second-largest metropolitan newspaper in circulation in the United States in 2008 and the fourth most widely distributed newspaper in the country....
, describes activation as "just another example of a rapacious monopolist
Monopoly
A monopoly exists when a specific person or enterprise is the only supplier of a particular commodity...
abusing computer users who are helpless to do anything about it." He too believed that the system would not have "any significant effect on professional pirates." Fred Langa at InformationWeek
InformationWeek
InformationWeek is a weekly print magazine, an online site with corresponding face-to-face and virtual events, and research. It is headquartered in San Francisco, California and was first published in 1979 by CMP Media, later called CMP Technology. On February 29, 2008, CMP Technology was...
, with reference to the transmission of hardware information during activation, stated that "many users are incensed at this level of monitoring, intrusion, and control by Microsoft." Finally, Dr. Cyrus Peikari and Seth Fogie, security consultants, considered product activation to be "hostile both to privacy and to human dignity."
However, others defend Microsoft's use of product activation. The Harrison Group, a market research
Market research
Market research is any organized effort to gather information about markets or customers. It is a very important component of business strategy...
firm, conducted a study in 2011 illustrating that computers running activated versions of Windows software were on average 50% faster than their pirated counterparts. The group concluded by stating that users of genuine Microsoft products ultimately receive superior performance while counterfeit users are susceptible to security issues and lost productivity. Fully Licensed GmbH, a developer of digital rights management technology, while criticizing Microsoft for being vague about the nature of information sent from a given computer during activation, nevertheless concluded that activation is not particularly intrusive and does not significantly violate privacy.
Microsoft Product Activation has also been criticized on multiple occasions for violating patent law. In 2006, Microsoft was required to pay $142 million to z4 Technologies for infringing on a product activation patent
Patent
A patent is a form of intellectual property. It consists of a set of exclusive rights granted by a sovereign state to an inventor or their assignee for a limited period of time in exchange for the public disclosure of an invention....
, while in 2009 Microsoft was ordered to pay $388 million to Uniloc
Uniloc
Uniloc Corporation is a computer security and copy protection software company founded in Australia in 1992 recognized as a pioneer in "try and buy" software distributed via magazines and preinstalled on new computers.- History :...
for patent infringement in product activation in Windows XP, Office XP and Windows Server 2003.
Circumvention
Microsoft Product Activation has been cracked or circumvented on several occasions. In 2001, a UK security company called Bit Arts successfully managed to bypass product activation on Windows XP, while in 2003, volume license keys for Windows XP were leaked to the public, allowing users who had not purchased a volume license to the operating system to bypass activation. In 2007, valid product keys for Windows Vista were obtained through a brute force attack. In 2009, several security flaws in Windows 7 were used by hackers to circumvent activation.Since the introduction of Windows Vista, most attempts at circumvention of product activation have focused on using leaked SLP product keys and BIOS information used by OEMs to preactivate Windows. In 2007, a circumvention measure was developed for Windows Vista that simulates the BIOS, allowing leaked SLP information to be fed to the operating system, bypassing activation. In 2009, SLP product keys and certificate information for Windows 7 were leaked to the public, allowing the BIOS to be reconfigured to bypass activation.
See also
- Digital rights managementDigital rights managementDigital rights management is a class of access control technologies that are used by hardware manufacturers, publishers, copyright holders and individuals with the intent to limit the use of digital content and devices after sale. DRM is any technology that inhibits uses of digital content that...
- Product activationProduct activationProduct activation is a license validation procedure required by some proprietary computer software programs. In one form, product activation refers to a method invented by Ric Richardson and patented by Uniloc where a software application hashes hardware serial numbers and an ID number specific...
- Product key
- Software protection dongle
- Windows Genuine AdvantageWindows Genuine AdvantageWindows Genuine Advantage is an anti-piracy system created by Microsoft that enforces online validation of the licensing of several recent Microsoft Windows operating systems when accessing several services, such as Windows Update, and downloading Windows components from the Microsoft Download...