Quote: "If the players buy a key file, then they will just torrent the key file."
So?? The key file would contain a key
unique to each sale. If they torrent it, it wouldn't matter. Only one copy of the software with that key file would be able to be registered at any one time. Look:
Jim D. buys a copy of Rad Game X. After purchase, he receives a key file from your company containing a unique one-time key, something like 1D29-4BB80-7YHT2-6MN6. When he puts the file in the correct directory, and enters the correct key, then the game unlocks. And, the algorithm for generating and encrypting the key is on the company computer, not the customers' computers. How is he going to hack your key file? Hack into
your computer to get the algorithm? Ha! That would take a world class hacker, not some kid trying to hack a frickin' game!
Also, this method would mean a family could have multiple accounts on the same computer without extra subscriptions.
I'm sorry Wyldhunt, but your "WoW" solution is overly complex for what it accomplishes.
In summation, these are the 4 things my method would need:
1) A customer with an internet connection(How many people don't these days?).
2) A randomization and encryption algorithm.
3) A file with a unique key.
4) A decryption algorithm in the target software.
[EDIT]: Also, you do realize my method is used alongside a key archive, correct?
If life were like a box of chocolates, I'd know what I would get... The one that got dropped on the floor and put back in the box.
Iye nehvur yoose spehl chehk, ahn mie tippyng izz fiyne.