We have already seen one MASS SOFTWARE PIRACY case filed this year by Siemens, and now on the heels of that lawsuit (also filed in Texas) there is another lawsuit filed by Ansys, Inc. filed by the Law Offices of John F. Lumen out of Houston, Texas. If you received a notice of subpoena from your ISP its because they want to learn your identity, perform due diligence, and decide how they want to respond to the Defendant in the case. In some cases they may want to litigate. In other cases, they may be looking to settle. Regardless, we can help individuals and business owners facing this copyright infringement action.
Ansys is a global leader in engineering simulation software. With its portfolio of engineering simulation software, Ansys helps its customers solve complex design challenges and engineer products. Ansys provides services in a wide range of industries, including aerospace and defense, automotive, construction, consumer goods, and energy.
Ansys Mechanical Enterprise software is a best-in-class finite element solver with structural, thermal, acoustic, and piezoelectric simulation capabilities. 4. Ansys licenses its highly valuable Ansys Software to its customers. Customers may purchase single-use licenses or multi-user licenses. Ansys prevents unauthorized access of the Ansys Software through the use of technological measures.
Ansys' license agreement, which all users see on their computer screens and to which all users must agree to in order to use the Ansys Software, states the Ansys Software may collect information to determine if modifications to certain code files have been made or if there is suspected or confirmed unauthorized access to or use of the Ansys Software.
Despite the fact that Ansys Software includes technological measures to control access to it, and users are put on notice of the same by agreeing to the license agreement, Defendants obtained, installed on their computer systems, and used pirated Ansys Software. Defendants committed willful copyright infringement and DMCA violations when they downloaded pirated Ansys Software, circumvented Ansys' technological measures protecting the software, and used the unlicensed Ansys Software to solve complex design problems and to engineer products and solutions for themselves, their employers, and others.
Ansys generally sells perpetual licenses, annual leases, and maintenance subscriptions to Ansys Software. As long as a maintenance subscription, or the annual lease, is maintained, the customer has access to and may download updates and subsequent versions of the Ansys Software, as well as associated user documentation.
To purchase a license to Ansys Software, a customer must issue a purchase order to Ansys or to an authorized reseller or sign an agreement. To download Ansys Software from Ansys, a customer must log in through their Ansys account. Once Ansys has obtained a signed contract or payment from the customer, the customer can log in to Ansys' customer portal and download the executable files for the licensed Ansys Software.
Ansys also allows students to obtain a license to Ansys Software for free. The student version, however, limits the functionality of the Ansys Software. Student licenses of Ansys Software are obtained directly from Ansys via its website. Students may download the student version of various Ansys products without establishing an Ansys account or providing any information to Ansys.
Once Ansys has obtained a signed contract or payment from the customer, in a separate email, or through a download from the customer portal, Ansys sends the customer a license key for the customer's copy of the purchased Ansys Software. The license key is readable by the licensing tools that are integrated directly into the Ansys Software and facilitates Ansys Software license compliance for its products.
When a user installs an Ansys Software program, and specifically when the user runs the executable files associated with the setup of an Ansys Software program, a local copy of the Ansys Software (the usable, object code version thereof) is created on the user's machine.
When the customer initiates an authorized Ansys Software program, the licensing tools are activated and inquire as to whether that copy of the Ansys Software program is associated with a valid license. If the customer has a valid license, the licensing tools will access and verify the license key. Once the license key is verified, the Ansys Software is enabled for the customer's use. If there is no valid license key, the Software will not start.
Piracy of software occurs when users access software for which they have not purchased a valid license. The ease of digital replication of software lends itself to illegal copying of software, where users may make multiple copies of a software program, and then distribute the copies to users who have not made a legal purchase of a license to the software (i.e., either distributing copies of the software for free or selling the copies of the software at deeply discounted prices).
To reduce the use of illegally copied software, software providers, including Ansys, implement license verification technology that will prevent the software from functioning unless the user has legally purchased a license. This license verification technology may be a software mechanism or a physical mechanism attached to a single computer.
The license verification technology may be in the form of either a license key (i.e., a series of numbers and letters sometimes stored in a computer file) that a user types in or that the software reads from a file during the software installation process, or a hardwire device, where the software will only operate correctly when the hardware device is attached to the computer executing the software. The license verification technology and the license key are provided by the software provider to the buyer when the software is purchased legally.
Users who have not made a legitimate purchase of a software license will not have access to the license key or hardware device provided by the software provider, and therefore the software will not function properly.
Sophisticated websites exist where illegally obtained software, the software utilities that mimic the license verification technology, and hacked versions of the software may be downloaded and installed by those who do not want to pay for properly licensed software. Each hacked version of the software represents a lost sale and/or license for the company that owns the software and for resellers of the software (who may provide hardware installation and support, and software configuration, customization, and maintenance).
A study by the Business Software Alliance reported that properly licensed software has a positive impact on national economic activity that is more than three times the impact of pirated software. Software that has been hacked or modified to use a cracked license may also contain malware that can damage computer systems, and/or infiltrate the computer network and the data on the network. In a study conducted by the Technology Policy Institute, the more times users visited piracy sites, the more likely their machines were infected with malware.
Software that has been hacked also may not operate properly, negatively impacting the reputation of the software company that now has no oversight or control over the quality of the hacked versions of its software in use or the products produced by that software.
Ansys identifies pirated software in use through PDRSS which, along with the license verification technology, is a component of the technological measures used to control access to the software. PDRSS also identifies the means by which software hackers have thwarted the license verification technology (i.e., the above-mentioned cracked license) for a particular software program. For example, PDRSS may accomplish this by downloading pirated software from the above-mentioned websites and determining how the software hackers were able to bypass the license verification technology.
Once the software hackers' methods are identified, Ansys can map out a plan for PDRSS to determine when pirated software is in use. This includes identifying when the pirated software is using a cracked license. The plan may include a variety of means for identifying software piracy. The plan may also include defining software use patterns that are indicative of software piracy. PDRSS can determine various patterns that are indicative of pirated software use, and thresholds at which the PDRSS software should begin to gather and report data on the computer using the pirated software.
Software providers, such as Ansys, embed the PDRSS within their software, validate that the patterns and thresholds will trigger on pirated software (and will not trigger on validly purchased software), and then release the software.
The serial number of the license is a unique identifier and helps in identifying unauthorized versions of the software. Multiple versions of software using the same serial number are indicative of unauthorized versions of software using a cracked license. In some cases, illegal license generators create license files having serial numbers that are inconsistent with the serial numbers generated by the software providers, which is also indicative of a cracked license.
Thus, a computer with both an Ethernet connection and a wireless connection has two unique MAC addresses. A MAC address is a series of numbers and letters. When a network device is manufactured, it is assigned a MAC address at the factory. The first six digits of a MAC address represent the device manufacturer, which can be looked up on the Internet.
Data reported from the embedded PDRSS generates a report that identifies the software that has been pirated and the organizations utilizing the pirated software, such as the version of the software being used, the license serial number, the IP address of the organization where the pirated software is running, the identifying name of the computer, and a MAC address. Through the technological measures used to control access to the software, Ansys collects this identifying information to determine when pirated and unlicensed versions of its Ansys software are being utilized.
b1e95dc632