US20060106733A1 - Computer for operating distributed software - Google Patents
Computer for operating distributed software Download PDFInfo
- Publication number
- US20060106733A1 US20060106733A1 US11/323,846 US32384605A US2006106733A1 US 20060106733 A1 US20060106733 A1 US 20060106733A1 US 32384605 A US32384605 A US 32384605A US 2006106733 A1 US2006106733 A1 US 2006106733A1
- Authority
- US
- United States
- Prior art keywords
- license
- software
- client
- computer
- licensing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
- 238000001514 detection method Methods 0.000 claims abstract 2
- 238000010200 validation analysis Methods 0.000 claims description 28
- 238000000034 method Methods 0.000 abstract description 50
- 230000004044 response Effects 0.000 description 46
- 238000011144 upstream manufacturing Methods 0.000 description 46
- 238000012550 audit Methods 0.000 description 28
- 238000004891 communication Methods 0.000 description 28
- 238000013475 authorization Methods 0.000 description 27
- 230000008569 process Effects 0.000 description 20
- 230000007246 mechanism Effects 0.000 description 16
- 238000007726 management method Methods 0.000 description 15
- 230000000737 periodic effect Effects 0.000 description 13
- 230000000694 effects Effects 0.000 description 9
- 238000012544 monitoring process Methods 0.000 description 8
- 230000035755 proliferation Effects 0.000 description 8
- 230000006870 function Effects 0.000 description 5
- 238000003780 insertion Methods 0.000 description 4
- 230000037431 insertion Effects 0.000 description 4
- 230000009471 action Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 3
- 241000276498 Pollachius virens Species 0.000 description 2
- 230000009118 appropriate response Effects 0.000 description 2
- 230000015572 biosynthetic process Effects 0.000 description 2
- 238000011156 evaluation Methods 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000002452 interceptive effect Effects 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000000644 propagated effect Effects 0.000 description 2
- 238000012827 research and development Methods 0.000 description 2
- 230000004913 activation Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 230000007123 defense Effects 0.000 description 1
- 230000008260 defense mechanism Effects 0.000 description 1
- 230000003111 delayed effect Effects 0.000 description 1
- 238000012217 deletion Methods 0.000 description 1
- 230000037430 deletion Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000010348 incorporation Methods 0.000 description 1
- 238000011835 investigation Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- ZRHANBBTXQZFSP-UHFFFAOYSA-M potassium;4-amino-3,5,6-trichloropyridine-2-carboxylate Chemical compound [K+].NC1=C(Cl)C(Cl)=NC(C([O-])=O)=C1Cl ZRHANBBTXQZFSP-UHFFFAOYSA-M 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000002035 prolonged effect Effects 0.000 description 1
- 230000001902 propagating effect Effects 0.000 description 1
- 238000009420 retrofitting Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 238000013519 translation Methods 0.000 description 1
- 230000014616 translation Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q99/00—Subject matter not provided for in other groups of this subclass
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/12—Transmitting and receiving encryption devices synchronised or initially set up in a particular manner
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2135—Metering
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2137—Time limited access, e.g. to a computer or data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/101—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying security measures for digital rights management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
Definitions
- the present invention relates to software licensing, and in particular to a system for automated monitoring and management of licensed software.
- Registration of software provides a software provider with a record of a valid license. Registration typically involves filling out and mailing a registration card that is provided in an off-the-shelf software package. A user may be asked to write in the serial number of the software set, along with other pertinent information.
- the defense mechanism in registration albeit weak, is that a software provider will only render assistance and support to properly registered users. That is, a software provider will refuse to grant assistance to a user unless the user has properly registered their software.
- the registration process also may involve responding to prompts generated by the software when it is first run.
- the prompt may be a security system asking the user to enter the serial number and/or a codeword to enable the software.
- the codeword may be a word appearing at prompt-designated locations in a user manual. This security scheme operates on the premise that a pirate will not ordinarily have a copy of the user manual. After the software is up and running, it may periodically prompt the user to re-enable the software by entering a different codeword appearing at varying locations in the user manual. This scheme is subverted by copying the manual and registration number.
- An on screen registration/enablement process may involve writing the registration number to disk. This is only possible with floppy disks as CD-ROMS are, at present, a largely read-only medium. If the disk is used again to load the software application, the software may prompt the user with a warning that the software has already been loaded (e.g., “IS LOADING OF THIS SOFTWARE PERMITTED? RECORDS INDICATE THAT THIS SOFTWARE HAS ALREADY BEEN LOADED. YOU MAY BE IN VIOLATION OF YOUR LICENSE AGREEMENT.”). However, reloading of software may be normal in the event of hard disk failure. Consequently, software providers cannot feasibly prevent the software application from being loaded more than once. Furthermore, if first run registration enablement is required, copiers can simply copy the software repeatedly prior to registering the original copy.
- Another security technique is to enable a software application for a defined period of time. This usually involves incorporating a date/time checking mechanism into the software application.
- a date/time checking mechanism may be used where a software provider wants to supply, for example, a 30-day demonstration version of a software application for user evaluation. If the user decides to purchase a license following the evaluation period, the user may contact the software provider and supply payment information. Following approval (e.g., credit card) or receipt (i.e., check) of the payment, the software provider may supply the user with a regular copy of the software, or provide instructions or a codeword to disarm or reset the date/time checking mechanism.
- approval e.g., credit card
- receipt i.e., check
- a date/time checking mechanism records a date/time stamp when a software application is first brought up.
- the date/time mechanism may start a timer when the application is brought up.
- the date/time stamp is compared with the system date/time information maintained by the computer to determine if the software application is to be disabled.
- users have been known to reset the system date and system time to prevent expiration.
- some software providers have resorted to writing complex code schemes to disable the software in the event that the system date is tampered with. Such a security mechanism is often used to control licensed software used in a commercial setting.
- the networked computers are usually connected to a file server, which file server may itself be tended by a computer management system that monitors and controls various file server groups.
- the file server computers act as a central location at which the desktop computers in the file server group can access files and applications.
- the file server also may facilitate the control of licensed software on the desktop computers. This occurs in the situation where the commercial software license is a so-called “floating license.”
- a fixed license permits a software application to run on certain designated computers (e.g., computer numbers one through five, in a ten computer file server group, are designated for the licensed software application).
- a floating license permits a certain number of applications to run on any number of computers at a given time. So an application operating under a floating license may be allowed to simultaneously run on no more than ten of twenty computers in a network at any given time. Licensing management software is maintained in the network file server to monitor the number of floating licenses being used.
- Management of floating licenses on networked computers involves two control software components: an application portion, and an authenticator portion.
- the application portion is nested within an application running on a desktop computer.
- the authentication portion is a code module contained in the file server that monitors and authorizes applications running on the desktop computers.
- the application portion code communicates with the authenticator code module to check to see if a floating license is available. If the maximum number of floating licenses are already being used, the software application is not allowed to open.
- Licensing control software also may be used to monitor defined term licenses to disable software in networked machines after license expiration.
- the software may be disabled, midstream, preventing users from completing projects.
- Re-enablement requires contacting the software provider to purchase an additional license or extension. This may require re-execution of enablement procedures with new instructions or codes. Hence, it may take some time before the software application is up and running again, which situation can seriously inconvenience users.
- a licensing system that allows software use to be monitored in an automated fashion, without user input.
- a software licensing system is needed that permits a software provider to transparently control the use of licensed software.
- a generic licensing module or “client module” that a software provider can attach to a software application.
- a software application having a client module attached thereto is hereinafter referred to as a “client application.”
- client application loaded on a computer having access to a public network, such as the Internet, automatically reports to a computer maintained by a software provider.
- the client module is a program, application, or like composition of code that is preferably nested in a compiled version of a software application (i.e., to form a client application).
- the client module can, in alternative embodiments of the invention, be attached to a previously compiled software application. Whether it is referring to a program nested in, or attached to a software application, the term client module is used throughout the present disclosure.
- a client module utilizes the public network as a means to transparently send license inquiry request messages to, and receive license inquiry response messages from, a license server maintained by a software provider.
- the license server has a database on which license information, or records, are stored.
- the license server also can record information contained in license inquiry request messages, and thereby audit use of client applications.
- the license record can identify a license in accordance with a hardware address, or hardware identifier of the computer, such as an IP address.
- Operation of an exemplary system incorporating the invention involves the client module in a client application generating inquiries that are sent to the license server in the context of an Internet communication session.
- the license server responds to the inquiry by investigating its database to determine whether a corresponding license record is present.
- the license server then forms an appropriate response message that is sent back to the client module.
- the response sent by the licensing server does not allow the client application to be enabled. If the client application is licensed (i.e., the database contains a record of a license), the response can allow the client application to be enabled, or re-enabled. In sum, the client application must be enabled for it to properly operate. Communication between the computer and the licensing server is generally transparent to a user. That is, the client module automatically forms a connection with the license server, sends a message, and receives a response, all without user input or notification.
- an exemplary embodiment of the invention can be used to monitor use of client applications.
- Operation of an exemplary system incorporating the invention for monitoring client application use involves using the client module in the client application to generate messages that are sent to the licensing server.
- Such messages can be sent over any public network to which a user computer, upon which the client application is loaded, is connected.
- a message can be sent to the license server in the context of an Internet communication session.
- the license server tracks, or audits, the use of client applications by recording pertinent information contained in a message generated by a client module.
- a database can be used to store the information.
- a software provider or vendor can access recorded information stored in the database to generate client application use reports.
- Such an auditing system can be a part, or a function of, a system for enabling, validating and/or disabling licensed software (i.e., client applications).
- audit data can be derived from license inquiry request messages.
- the license record database in the license server can be used to store the collected audit data. Alternatively, a separate database can be used.
- an exemplary process in accordance with the invention may involve utilizing a modem, or like device, in the computer.
- the client module generates and sends a license validity inquiry request message to a regional or central license server maintained by the software provider.
- the license server contains an agent module for communicating with the client module and a database containing license records.
- the database in the license server is checked to see if a valid license record exists for the requesting client application and computer. If so, a message is transmitted back that allows enablement or re-enablement of the client application.
- the licensing server also can record information corresponding to the request in the database containing the license records, or in a different database.
- a menu can be presented asking whether the user would like to purchase a license, and thus enable the software.
- the menu may direct a user to a Web homepage where a license can be purchased, automatically open a session to such a homepage, or provide a telephone number of a sales representative or automated operator.
- the user can initiate a demonstration mode of operation to evaluate the client application.
- a licensing system in accordance with exemplary embodiments of the invention can involve a hierarchical arrangement of licensing modules arranged between client application(s) and a license server.
- a client module monitors one, or more, software applications on the desktop computer.
- Licensing modules include an agent component for communicating with a downstream client, a cache component for interim storage of license information, and a client component for communicating with an upstream agent.
- Operation in an exemplary process involves the client module in a desktop computer communicating upstream with an agent component in a licensing module.
- a client component in that licensing module communicates upstream with an agent component in a next licensing module, whose client component, in turn, communicates with a next upstream agent, and so on.
- This arrangement is continued upward to converge on a license server which contains an agent module.
- the license server is maintained by the software provider. Consequently, the uppermost licensing module in the institutional network communicates with the license server by initiating a connection over a public network, such as the Internet. License enablement information is supplied to the upper-most licensing module by the license server, which information is propagated back downstream via the licensing modules.
- the cache components in the licensing modules can be used to store license records so that license inquiries can be addressed without having to forward the validation inquiry request messages to the license server.
- the client and agent elements are generic. That is, client modules in the desktop computers and client components in each of the network level computers are substantially similar. Agent components in the licensing modules and the agent module in the license server also are substantially similar. The cache components of the licensing modules are used to store information that defines the structure of license records. Any client can communicate with any agent and vice versa. This arrangement facilitates network configuration flexibility.
- Operation of an exemplary system incorporating the invention in the network environment involves a client module in a client application forming and communicating a license validity inquiry request message upstream.
- An agent component in a nearest upstream licensing module receives the request.
- the licensing module checks its cache to determine if a license record exists corresponding to the request.
- the licensing module can then respond with an appropriate message. If the license information is not found at that level, the licensing module can forward the request upstream to determine if the license is of record in an upstream cache. This may continue up to the license server.
- the information is copied into the cache of the licensing module nearest to the computer originating the request for future reference.
- the licensing modules periodically communicate upstream to fetch license information in order to revise and maintain currency of their cached license records. By doing so, a validity request can be addressed by a nearest upstream agent. Furthermore, periodic checking can permit management of request message traffic on the license server.
- license information is organized in class and sub-class designations. License information maintained on the license server covers blocks of underlying computers rather than the individual desktop computers themselves. This provides for efficient communication of license information between the license server, licensing modules, and desktop computers.
- systems incorporating the present invention allow client software to be enabled or re-enabled at any time without significant delay.
- Software applications operating in accordance with the present invention can be installed on any computer in the world having access to a public network, such as the Internet. If so desired, a client application can be configured to not operate unless it receives acknowledgment of the presence of a valid license record.
- a licensing system in accordance with the present invention can ensure that a client application operating on any computer in the world is properly licensed.
- systems incorporating the present invention can be used to monitor client application use.
- Such a system can operate by recording information from license validity inquiry requests messages that are received at the license server.
- Client application use, and corresponding details, can be recorded when the client module sends license inquiry request messages back to the license server.
- the system can be used in an audit-only mode whereby the client applications report relevant information back to the license server, but do not require an enabling response message to continue operating.
- a licensing system in accordance with the present invention can assist in tracking client application use and proliferation.
- Preferred embodiments of the present invention take advantage of the fact that an increasing number of computers, and computer networks, have direct access to the Internet.
- Systems in accordance with the present invention can utilize the Internet as the medium over which license validity inquiry request inquiries and their corresponding responses are transmitted.
- a client application if a client application does not receive enablement information, the client application is not enabled, or is disabled.
- any software application that contains a client module accordance with the invention can be automatically enabled, or disabled.
- client module equipped applications can be tracked.
- Such a system allows software to be freely distributed while ensuring that a license is taken for its use, or at the very least, ensuring that the use of the software can be tracked.
- FIG. 1 depicts a desktop computer in accordance with an exemplary embodiment of the invention
- FIG. 2 depicts a flow diagram for operating the arrangement of FIG. 1 in accordance with an exemplary process incorporating the present invention
- FIG. 3 depicts a regional server scenario in accordance with an exemplary embodiment of the invention
- FIG. 4 depicts a computer network arrangement in accordance with an exemplary embodiment of the invention
- FIG. 5 depicts a symbolic representation of the computer network of FIG. 4 ;
- FIG. 7 depicts an additional exemplary embodiment of the invention in a portable computer.
- FIG. 1 depicts a personal computer system in accordance with an exemplary embodiment of the invention.
- the system includes a personal computer 100 that has a client application 103 residing on a hard drive 104 .
- the client application 103 is comprised of a software application 102 and a client module 108 .
- the computer 100 includes a modem 106 .
- the client module 108 operates to enable or disable the software application 102 pursuant to a response from a license server 110 in the context of license validity inquiries.
- the license server 110 contains a database 112 having license records recorded thereon, and an agent module 114 that communicates with the client module 108 .
- the licensing server 110 is typically maintained by the software provider who developed the software application 102 . Alternatively, the license server 110 can be maintained by a contracted service provider.
- the client module 108 and the agent module 114 communicate over the Internet 116 .
- the client and agent can communicate over any public network.
- the term public network encompasses not only networks that are freely available to the public, generally, but also any private network which can be subscribed to.
- the depiction of the client module 108 is merely for descriptive and illustrative purposes.
- the client module 108 can be code nested within the software application 102 .
- the client module 108 automatically initiates a process to determine whether the software application 102 is validly licensed. This can happen each time the client application 103 is brought up.
- the licensing module 108 operates transparently and utilizes the modem 106 to form a connection with the licensing server 110 . Once the connection is made, the client module 108 sends a license validity inquiry request message to the license server 110 .
- the agent module 114 receives the request and queries the database 112 to determine whether a license record exists that corresponds to the client application 103 and computer 100 .
- the license server 110 also can record relevant information contained in the license validity inquiry request message to audit the use of client application.
- a response message is generated and returned back to the client module 108 by the agent module 114 . If the query finds a valid license record, the response message indicates the license record's existence and location in the database 112 . The client module 108 can record the license record location for future reference. If a license record is not located in the database 112 , an appropriate response message is generated and returned. The presence of a record permits the client module 108 to enable, or to allow continued operation of (i.e., re-enable), the software application 102 .
- the client module 108 can pursue any one of many courses of action.
- the first possible course of action is to not enable the software application 102 , or to it if it is presently operating.
- the client module 108 also may supply an appropriate message to the user indicating that a license does not exist for the client application.
- the client module 108 can supply a message instructing the user as to where and how a license can be purchased. This may involve directing the user to telephone the software provider's sales department, or the message can direct the user to an appropriate Web site homepage on a Web server 118 where the software can be purchased.
- the Web server 118 can automatically update the database 112 with the information supplied by the user or the computer 100 (e.g., IP address supplied in the context of a Web session), thereby creating a valid license record.
- a subsequent client module license inquiry will allow the client application 103 to be enabled. If the license purchase transaction fails for any reason (e.g., a credit card supplied is not approved), the license record can be removed from the database 112 by the software provider. This has the effect of disabling the client application in a next license validity inquiry.
- FIG. 2 An exemplary process of operating the arrangement depicted in FIG. 1 is shown in the flowchart of FIG. 2 .
- the frequency and timing for performing a license validation check can be selected according to the discretion of the software application designer.
- the client module performs an initial check each time the software application is brought up (step 200 ).
- the license validity checking process is initiated (step 202 ) by utilizing a modem to form an Internet connection between the computer 100 and a licensing server (step 204 ). This may be done by having the client module instruct the modem to dial a 1-800 number maintained by the software provider that accesses a local Internet gateway (if used in the United States).
- the client module 103 forms a license validity inquiry request message (step 208 ).
- the request message may contain information such as the application name, the application version number, a date/time stamp, the name of a license server 110 (if several license servers are maintained by the software provider), and a hardware identifier, such as the IP address of the computer 100 .
- the request message is sent to the license server 110 (step 210 ) over a public network*.
- the agent module 114 in the license server 110 forms a query (step 212 ) to determine whether a corresponding license record is stored in the database 112 (step 214 ).
- the agent module 114 also can record audit information from the request message (step 213 ).
- a response message is returned having a license ID field comprising a pointer to the location of the license record in the database 112 (step 218 ). If the query does not locate a record of a license for the request, a response message is returned having a null indication in the license ID field (step 216 ). The response message is returned to the client module 108 (step 220 ) after which the Internet connection is closed (step 222 ).
- the client module 108 investigates the response message to determine whether the license ID field contains a license ID (step 224 ). If the license ID field is null, the client module 108 fails to enable the software application, or disables it (step 226 ). The client module 108 may then prompt the user with any variety of messages (step 227 ). For example, the user may be prompted to assess whether a demonstration period of operation would be acceptable. If so, this information can be recorded in the client module 108 and be passed upstream in the context of a next validity inquiry request message. The server 110 will record this information in the database 112 . Alternatively, the user can be prompted to contact a sales representative or automated operator to purchase a license, or directed to a Web homepage where a license for the software application can be purchased. In the event of a license purchase, the database 112 can be automatically updated to record the license. Thereafter, a validity check will find a license record and allow the client application 103 to be enabled.
- the license ID field contains a license ID
- this information is recorded by the client module 103 for future use (step 228 ).
- the client module 108 then enables the software application 102 (step 230 ).
- the client module may, at this point, start a timer (step 232 ) for periodic checking of license validity. Such a validity check is automatically initiated when the timer expires (step 234 ).
- the client module also can be configured to initiate a validity check whenever an interrupt is present indicating a certain activity (step 236 ), such as printing or saving.
- the date/time stamp information passed upstream in the license validity inquiry request message can be used to detect whether the system date/time information on the computer 100 has been tampered with. This is done by comparing the date/time information passed in the request message with the date/time information maintained on the licensing server 110 .
- license ID information is communicated between the client module 108 and the agent module 114 in an encrypted form, as explained in greater detail below.
- a response can be to provide the user with a phone number through which a software license can be purchased, or to direct the computer user to a Web homepage maintained by the software provider.
- the client module 108 can directly initiate a session with the Web server 118 that supports a homepage through which the user can purchase a license.
- a first screen on such a homepage can prompt the user to indicate whether the purchase of a full license would be desirable, or whether a demonstration period is preferable to evaluate the application. If neither of these options is selected the session is terminated.
- the user can be prompted with questions asking which features in the software application are to be enabled (the price of the license can be adjusted accordingly).
- the session can conclude with the presentation of a payment screen inviting the user to enter credit card information, or to call a sales representative in order to supply payment information.
- the exemplary inventive system described above allows client applications (i.e., software application having client modules) to be freely distributed while reasonably ensuring that they are, or will be, licensed if used. Any software application having a licensing system client module attached will not operate unless and until the license system client module receives authority to enable the software application.
- client applications i.e., software application having client modules
- Any software application having a licensing system client module attached will not operate unless and until the license system client module receives authority to enable the software application.
- Such a system allows global proliferation of the software, even in the form of a copy.
- a dedicated license server can be set up to handle all of the license inquiry traffic for a particular software application. Alternatively, some form of traffic management can be invoked.
- Traffic management can take many forms. It can involve establishing regional license servers according to a geographic arrangement that permits efficient response to any licensing inquiry request messages.
- a client application initialization process can be used wherein a user enters the location (e.g., zip code, city, and country). This information can be used by the client module to select an appropriate autodial telephone number whereby a nearest software provider license server can be accessed.
- Regional license servers can receive license information propagated from a central licensing server. Client modules can contact their regional license server to assess whether license records exist for their corresponding client applications. Because use of the Internet is contemplated as a means for communicating licensing inquiry and response messages, the regional license server designated for a particular client module can be assigned in accordance with efficient network, and/or geographic, considerations. This can facilitate provision of a swift response to license validity inquiry request messages.
- Regional licensing servers 302 are comprised of an agent component 306 , a database component 308 , and a client component 310 .
- a client module in a desktop machine 300 communicates with an agent component 306 in an assigned regional license server 302 over a public access network, such as the Internet 316 .
- the client component 310 in the regional license servers 302 communicates with an agent module 314 in a central license server 304 .
- License information can be systematically directed from the central license server 316 to appropriate regional license servers 302 in accordance with information supplied when the license is procured.
- the regional license servers 302 can systematically request license record information with which to update their database components 308 .
- a variation on the regional license servers 302 can be used in a licensing management system incorporating the invention for application in a commercial setting. That is, wherein computers are networked in a hierarchical arrangement within a company or institution.
- FIG. 4 depicts a commercial network system in accordance with an exemplary embodiment of the invention.
- Desktop machines 400 are organized in file server groups.
- the file server groups are administered by file server computers 402 through networks 404 .
- the file server groups can, for example, serve various design teams in a research and development facility of a corporation.
- the file servers 402 in the R&D facility are, in turn, tended by a minicomputer 406 .
- the minicomputer 406 , and minicomputers 408 and 410 at other facilities (e.g., manufacturing and sales) are networked under a main computer 412 located, e.g., at the headquarters of the corporation.
- each desktop computer 400 contains a client module for monitoring one or more client applications.
- the client modules in the desktop computers 400 communicate upstream with licensing modules contained respective file server computers 402 .
- the licensing modules in the file server computers 402 communicate with a licensing module in the minicomputer 406 , which licensing module, in turn, communicates with a licensing module in the main computer 412 at the corporation headquarters.
- the licensing module in the main computer 412 uses a public network, such as the Internet 414 , to communicate with a license server 416 maintained by a software provider who developed the software application(s) on the desktop computers 400 .
- Main computers 413 and 415 at other corporations or institutions also can communicate with the license server 416 to communicate license inquiry and response messages.
- FIG. 5 A representation of the network scenario depicted in FIG. 4 , illustrating licensing system components in accordance with an exemplary embodiment of the invention, is shown in FIG. 5 .
- Various network computers are depicted in symbolic form to assist in illustrating the components involved in the exemplary embodiment of the invention.
- Desktop computers 500 contain software applications 514 having licensing system client modules 516 attached thereto.
- the desktop computers 500 are tended by group file servers 502 on networks 504 .
- Each of the group file server computers 502 , minicomputers 506 , 508 and 510 , and a main computer 512 contain a licensing module.
- a licensing module comprises an agent component 518 , a cache memory component 520 , and a client component 522 .
- the license server 526 maintained by the software provider contains an agent module 524 .
- the licensing module's client component 522 communicates with the agent component 518 of an upstream licensing module, or with the agent module 524 of the license server.
- the licensing module's agent component 518 communicates with a downstream licensing module's client component 522 , or a client module 516 in a desktop computer 500 .
- Communication between the upper-most licensing module in the internal network (i.e., licensing module 512 ) and the agent module 524 in the license server 526 is conducted over a public network, such as the Internet 528 .
- An audit function can be implemented in a networked embodiment of the present invention in a number of ways.
- the upper-most licensing module 512 can maintain software, such as an audit tool 530 , that tracks use of client applications in underlying computers in the network.
- An audit report can be periodically generated and sent upstream to the license server 526 .
- the license server 526 can record and interpret the audit report to monitor use of client application software.
- license validity inquiry request message traffic from individual client applications can be recorded in the license server 526 .
- Audit information can be used to generate billing invoices.
- An additional aspect of the aforementioned audit system permits an MIS manager at a corporation or institution to monitor the use of client applications for internal audit purposes.
- Such a system operates by monitoring license inquiry traffic passing through a network to and from a license server.
- such a system involves maintaining internal auditing software (e.g., a tool or utility program) in an upper-most level licensing module in an internal network.
- a report can be generated by the internal auditing software tool. Data in the report can be derived from information collected at the upper-most licensing module.
- the MIS manager can use the internal audit reports to manage the licensing arrangements of the client applications on the network. For example, if a network of twenty desktop computers is frequently using a maximum number of floating licenses for a particular client application, the MIS manager can ascertain this by reviewing internal audit records, and take appropriate action.
- each of the agent-type components, and each of the client-type components are generic. That is, any given agent component 518 , and the agent module 524 in the license server 526 , is substantially similar. The same is true of the client components 522 and the client modules in the desktop computers 500 .
- the parameters maintained by, and passed between various license system elements defines the licensing system structure.
- the license system operates by distributing licensing information to the cache components 520 in the licensing modules in response to inquiry requests.
- the information contained in a particular cache component 520 is specific to subordinate software applications 514 , or licensing modules.
- license information is organized by class designations. Individual licenses for client applications on desktop machines 500 can be covered by sub-class licenses maintained in the cache components 520 in the file server computers 502 .
- the sub-class licenses on the file server machines 502 can, in turn, fall under a class license maintained in the cache component 520 of the minicomputer 506 .
- the class license maintained on the minicomputer's licensing module can be designated under a block license maintained in a cache component 520 of the main computer 512 .
- the client component 522 of the main computer's licensing module communicates with the license server 526 to verify block licenses.
- Validity inquiry traffic is managed in the exemplary system of FIG. 5 through the use of the aforementioned license class designation structure and through periodic updating of caches in licensing modules.
- a single license validity inquiry generated by, for example, a file server's licensing module can enable a sub-class license that covers the client applications of all of the desktop computers 500 in the file server's group. This is generally more efficient than having each desktop computer 500 individually validate its own license through the license server 526 .
- the sub-class license maintained on the file server itself can fall under a class license maintained on the minicomputer, the validity inquiry by the file server may be addressed by the minicomputer rather than forwarding the request further upstream.
- licensing modules periodically and systematically initiate license validity inquiries upstream.
- the responses to the periodic inquiries are recorded into the cache components of the licensing modules.
- client modules and client components need ordinarily communicate with a next upstream agent to be enabled, re-enabled, or to update their caches.
- Periodic self-validation updating of the licensing modules also provides for more uniform request traffic on the licensing server 526 . This can provide efficiencies in propagating license information from the licensing server in response to license validity inquiries.
- the foregoing system can operate by passing individual license validity request and response messages through the licensing modules.
- the result of the hierarchical arrangement is to control the flow of validity inquiry traffic received and responded to by the licensing server. If a license server dedicated to a particular client application is employed, the license server may be able to handle all of the license inquiry traffic received. However, if a single license server handles license validity inquiry requests for a variety of client applications, request traffic management may be needed. By arranging the system in a hierarchical fashion and designating the licenses in accordance with class and hierarchical subclass designations, the licensing server can manage request traffic for a several different client applications.
- Client components and modules contain a set of license management procedures for handling license record information.
- three validation procedures are used: Check Out License, Validate License, and Check In License.
- Check Out License is responsible for the initial enablement of a client application.
- Validate License is responsible for periodic re-enablement of a client application.
- Check In License can be used for decrementing a floating license count, or indicating client application status in a database license record when use of a client application is completed.
- Check In License also may be used for disabling a license or feature after its use in the event that there is a per-use cost associated with the software.
- the following exemplary process descriptions are provided for a case wherein a client application is validating itself directly, or indirectly (i.e., through one or more licensing modules) over the Internet.
- Each of the procedures involves initially forming a connection with a corresponding upstream agent.
- the agent can be the agent component of a licensing module in an upstream network file server, or like machine containing a licensing module.
- the upstream agent may be the agent module in a license server in which case the connection is formed over a public network, such as the Internet.
- the Check Out License procedure When a client application is first brought up, the Check Out License procedure is initiated.
- the purpose of the Check Out License procedure is to enable the software application to which the client module is attached.
- the Check Out License procedure can be used by to track the proliferation of a client application.
- the client module's Check Out License call generates a client data structure containing: the name of the software application, any feature name(s) that is to be enabled, the name of the upstream agent component/module, a hardware identifier of the computer containing the client application, a date/time stamp, and a version number of the licensing system.
- Other fields are created in the client data structure that are filled in by the upstream licensing module or license server.
- the query finds a license record in the database or cache, the location of that record, in the form of a pointer, is generated for storage in a license ID field in the client data structure.
- the licensing module also generates an authorization ID for storage in a field of the same name in the client data structure. If the query does not locate a license record, the license ID field and authorization ID field are left blank (i.e., nulled). Following the query, a license validity inquiry response message is formed by the agent and returned to the client. The response message contains the license and authorization IDs, if any, that are to be stored in the client data structure.
- the client module investigates the client data structure content returned by the agent component/module to analyze the license and authorization ID information contained therein, if any. If these fields indicate the presence of a valid license, the client module enables the software application.
- the license and authorization IDs are stored in the client data structure in the client module for future license validation checks. If the data structure fields for the license and authorization IDs are null, the client application is not enabled and the client data structure is deleted from the client module.
- the database or cache query also may involve a comparison of the date/time stamp contained in the client data structure with date/time information maintained by the license server or license module system. This added security measure can detect a user's tampering with system time and date information on their computer. If the particular software application is operating in a demonstration mode for a predefined period of time, the date/time stamp passed in the client data structure can be used as an initial check of whether the demonstration period has expired. If there is date/time corruption, the client application can be disabled.
- the contents of a message generated by the Check Out License procedure can be recorded in the license server or upstream licensing module.
- Relevant information recorded by the license server can include, but is not limited to, the hardware identifier of the computer upon which the client application is loaded (e.g., the IP address), the application name, feature names, and the application version number.
- a client module registration number, or like identifying means can be nested in a client application. This registration number also can be passed upstream in a request message for audit recordation.
- a client module registration number allows a software provider to track the proliferation paths and patterns of copied client applications. Consequently, a software provider can determine the source of copied software.
- a software provider can force a user to attach a non-connected computer to a network access point by supplying a prompt indicating to the user that a client application will not enable unless and until it checks in. Consequently, if the user chooses to use the client application (i.e., attach the computer to a network access point), the software provider is informed of the client application's use.
- a second process initiated by a client module or a client component is the Validate License procedure.
- This process determines whether a previously enabled client application is still validly licensed.
- the procedure can be called at any time. For instance, the initiation of the Validate License procedure can be in response to a timer expiration (i.e., a periodic check) or at the appearance of a system interrupt (e.g., printing is selected).
- the Validate License procedure in accordance with an exemplary process incorporating the invention, generates a new client data structure containing: the name of the software application, any feature name(s) that is to be enabled, the name of the upstream agent component/module, the license ID, the authorization ID, a date/time stamp, and the version number of the licensing system.
- the Validate License procedure sends a license validity inquiry request message to the upstream agent, which request message contains the new client data structure contents.
- the license ID information in the client data structure is used by the upstream agent to directly access the memory location where the license record was previously located. If the query finds a license record, a new authorization ID is generated by the agent and stored in the authorization ID field in the client data structure. If a license record no longer exists, the license ID field and authorization ID field are nulled.
- a license validity inquiry response message containing the client data structure is then formed by the agent and returned to the client module.
- the client module investigates the data structure contents returned in the response message to analyze license and authorization ID information. If the authorization ID indicates the continued presence of a valid license, the client module allows the client application to remain enabled. The new authorization ID is stored in the client data structure in the client module for future license validation checks or to check in the license. If the data structure fields for the license and authorization IDs are null, the client application is disabled and the client data structure is deleted. Alternatively, the user can be prompted to indicate whether a new license would be desirable. If so, any of the procedures previously described can be used to procure a new license (e.g., access a Web homepage).
- the Check In License procedure can be used to return a license or disable a feature when a user has completed use of the client application or a feature contained therein.
- the procedure in accordance with an exemplary process incorporating the invention, generates a new client data structure containing: the name of the software application, any feature name(s) that is to be disabled, the name of the upstream agent component/module, the license ID, the authorization ID, a date/time stamp, and the version number of the licensing system.
- the Check In License procedure sends a license check in request message to the upstream agent, which request message contains the new client data structure contents.
- the license ID information in the client data structure is used by the upstream agent to directly access the memory location where the license record was previously located.
- the existing license record is modified to indicate the disablement of a feature, or is deleted (if the agent is the agent module in the license server). If the agent is an agent component in a licensing module, the license is designated for deletion.
- This information is passed upstream in a license check in request message subsequently sent up stream by the licensing module in its next periodic self-validation.
- the license and authorization ID fields of the client data structure are nulled, and a license check in response message containing the client data structure is then formed by the agent and returned to the client module. The client module then deletes the client data structure.
- Automatically auditing cached license records improves the likelihood of a client application, or client component, finding a current license record in a next upstream agent in the context of a Check Out or Validate License procedure.
- a licensing system in accordance with the invention involves inserting licensing system code into a pre-compiled version of a software application and then compiling that application into a single executable client application.
- the licensing system can be provided as a module that is inserted into to an existing software structure on a computer network.
- a system can be used to monitor software application use in a computer network that does not otherwise have a means to audit application use.
- This type of system can be used by individuals, such as MIS managers, who wish to audit software application use activity in a network.
- a client module installed in an individual desktop computer “wraps around” software applications selected for monitoring. When the wrapped application used, or seeks a floating license from a file server, a licensing module installed in the file server computer records the activity.
- the licensing module can be configured to always reserve a license for use by certain individual computers (e.g., the CEO's computer). Audit records generated by the licensing module can be periodically checked by the MIS manager to see if adjustments are needed (e.g., purchase a greater number of floating licenses).
- a variation of the latter system also can be installed in existing network to retrofit a licensing management system.
- Client modules wrap previously installed applications thereby converting them into client applications.
- the client modules on individual computers monitor and/or control client application use.
- the client modules can report to licensing modules in upstream file servers, or report directly to a license server over a public network.
- Such a system can be used by software providers as an aftermarket component installed on top of existing software systems.
- a client module can be responsible for handling license validation of more than one client application loaded on the computer. If two or more client software applications on a computer are by a same software provider, the client module can generate a single validity request message covering each wrapped client application.
- Such a system has the effect of providing a generic licensing validation system for all of the licensed software on a desktop machine supplied by a particular software provider.
- FIG. 6 An exemplary licensing system that can be retrofitted in an existing computer network is depicted in FIG. 6 .
- An individual computer 600 has a client module 618 installed therein.
- the client module 618 is wrapped around one or more software applications 620 , 622 , 624 and 626 to create client applications.
- the client applications are specific to the software provider who is retrofitting their networked software with the licensing system.
- a license record database is configured as a “clearing house,” whereby a multitude of software providers consolidate license information in a single server or a network of license servers, the client module 618 can validate software licenses by a variety of software providers.
- the hardware identifier maintained in the client data structure is preferably the IP address of a computer.
- any other suitable hardware identifier can be used to identify the computer on which a client application or licensing module is loaded.
- Intel's Pentium.RTM.processor contains an internal serial number that can be used as a hardware identifier.
- a hardware module can be provided that is designed specifically for a licensing system in accordance with the present invention. Such a hardware module can be attached to a parallel port on a computer can be used as a tag to identify the computer. The client module in the computer scans the parallel port to acquire the computer's hardware ID for insertion into a client data structure.
- the license ID maintained in the client data structure is used as a pointer to a location in the cache or database of a corresponding upstream licensing agent or server.
- the pointer designates the location of the licensing record.
- a license record at any given level can represent a relationship between the agent and an underlying client. That relationship, as designated by the license ID can be used as a universal designator to replace designating a particular client/agent pair by application name, feature name, IP address, agent name, etc. Use of a license ID provides a more efficient means with which to track and communicate information regarding a particular license.
- the authorization ID is used as a means to indicate the status of a license in response to an enablement or validation inquiry.
- the authorization ID also can be used as an acknowledgement to a Check In License procedure that permits a client application to delete a client data structure.
- the authorization ID also can be used to return a status message containing an error code, an indication that the server or agent is presently too busy to handle a query, an indication of a connection or communication failure, or any other like message.
- Another important task facilitated by the authorization ID is its use in supporting encrypted communication between a client and an agent.
- the authorization ID is used to pass back a key for use in encryption processing.
- the encryption scheme involves maintaining identical encryption engines in corresponding clients and agents.
- the key passed by the authorization ID is used as a common seed, or initialization vector, for initializing the respective encryption engines for encryption and decryption of messages.
- a new key is generated and passed back each time an agent responds to a client inquiry, which key is used in a next round of communications.
- the key is stored in the client module in the context of storing the client data structure (containing the authorization ID). In a subsequent client-to-agent communication the key is used for client encryption of a message.
- the message is then decrypted at the agent using the common key to-agent
- all of the data structure fields in an initial communication between a client/agent pair are unencrypted. Subsequent communications have certain fields encrypted.
- the agent passes back a first key.
- the message is then re-sent having designated fields of the client data structure encrypted.
- the response passed back by the agent in a next communication contains a new key for use in a subsequent communication. In this way, the client and agent maintain encryption synchronization by supplying the same key to their respective encryption engines.
- the key is a random number generated by an agent.
- the encrypted fields of the data structure contents passing between a client and agent include the license and authorization Ids, and any proprietary data required for validation, such as floating license information. All of the fields of the data structure contents can be encoded, however, the application name, feature name, hardware identifier, and a licensing system version number are preferably left unencoded.
- a client or agent can look to the unencoded information and revert back to a most recent encryption key. If there is still lack of synchronization, a request is passed that the client return to the initial message state, thereby allowing both the client and agent encryption engines to reset.
- the frequency of validation checks is application dependent. A software designer can select when and how often validation checks are to occur, if at all.
- the licensing system can be configured in accordance with the needs of a particular application.
- the software license can be validated, or enabled, each time the application is brought up on a computer, or each time a particular feature is used (e.g., printing).
- the software license also can be validated in response to the expiration of a timer (i.e., periodic validation). If the response to the validation check is returns a null license ID, the client application is disabled.
- any number of watchdog timers can be nested in the client application. The nested watchdog timer can be used to periodically self-check the client application to determine whether it has been validated within the watchdog period. If so, the watchdog timer is reset. If not, a validation check can be initiated or the client application can be disabled.
- Establishing a database license record in the licensing server can be performed in a variety of ways.
- Software can be purchased and paid for in an interactive commercial transaction conducted over the Internet, as described above. The result of such a transaction is to establish a license record in the licensing server database.
- a subsequent validation check by the client application will allow the software to be enabled.
- the database entry also can be formed by pre-authorization. If the software is purchased from a vendor, the vendor, in the context of the transaction can perform the database entry shortly after the software is supplied to the user or company. When the software is brought up on the client computer, an initial validity check will return an enablement response because a license record has already been established.
- software can be pre-enabled with a temporary term license thereby providing a software provider with a time window in which to establish a license record.
- Other techniques for establishing an entry in the database, and thus enabling the corresponding client application include using automated telephone operator systems.
- a client can call a telephone number and use a touch-tone phone to respond to prompts presented by an automated operator.
- any mechanism for initializing the database, and consequently automatically enabling the software is deemed suitable.
- Another aspect of systems operating in accordance with the invention is feature enablement.
- the systems described above can be used to enable and disable particular features in a client application. Such a situation may occur wherein a software application has several levels of operating capability. For instance, a user can selectively enhance operating capability by selecting features defined in a software feature application menu. In response, an associated client module can invoke the Check Out License procedure wherein the desired feature name is passed upstream.
- the license does not exist yet, but the system can be configured to direct the user to, or provide the user with, a feature enablement menu that requests that the user enter credit card information, as described above.
- the system can be organized to automatically initiate a process that creates a license when new software is brought up. This can involve a mechanism that forms a Web server connection and supplies an authorization message that creates a database license entry.
- a software provider can monitor the activation and use of client application features and bill the client accordingly.
- Attachment of a licensing module to a software application causes that software application to report back to a licensing server at some point. If the client module or software application is configured to report back the first time that the software application is brought up, a software provider can keep track of, or audit, which and how many machines the software application is operating on.
- the licensing server can be set to initially enable any request received for the software application being audited. At the discretion of the software provider, the software application can be turned off at anytime. The software provider can respond to subsequent licensing enablement or validation requests by supplying a prompt inviting the user to purchase a license.
- a variation on the audit function can be used to log questionable user activity.
- An additional security aspect of systems in accordance with the invention is the provision of an activities log in the client module, licensing modules, or license server.
- a log gathers information associated with any or all validation requests, or irregularities.
- Information gathered in such a log may include, but is not limited to, data/time stamps (to ensure periodic checking is not interfered with), and the identity of a machine corresponding to the origin of an inquiry request.
- the foregoing information can be used to facilitate the investigation of a pirate if the pirate's activities require legal attention.
- Software version control can be provided in accordance with another aspect of the invention.
- Software version number information can be passed upstream in the context of a license validity inquiry request message. If the software version has expired, a message can be passed back in the status field of the authorization ID indicating this information to a user. The user may then be asked to license and procure a new version of the software.
- Software version control can be used to prevent version collision, and to force users to stop using expired software versions by simply disabling them.
- license system version control By monitoring and controlling the version of the license system that is operating, a common denominator between client and agent communications can be maintained. Alternatively, in the event that different versions are allowed, appropriate translations of data fields can be made to ensure the different versions can still communicate. In a preferred embodiment, a given client can only communicate with an agent of the same or newer version. Licensing system version control also permits modifications to be made to improve, enhance, or entirely change an encryption schemes used by the licensing system.
- the present invention also can be used to maintain a software use billing system for use with commercial client applications.
- a billing system in accordance with the invention can use client application and feature use information from the audit system.
- the audit system information can be translated into billing statements. Consequently, a commercial client can optionally be billed only for what they have used, rather than a set up-front, annual, or monthly amount.
- Most computers sold today have pre-installed modems. Individual desktop machines operating in a DOS, Windows, OS/2, or like environment, can utilize their pre-installed, or aftermarket modems to initiate communications with an upstream agent or license server. Most commercial computers are designed for incorporation into network settings. Commercial computing systems, such as workstations, may operate in a UNIX environment. The UNIX environment is well suited to operation in accordance with the invention. Most UNIX workstations are furnished with network cards permitting them to be network connected. Such networked computers thus have ready direct access to Internet or gateway nodes through which a license server or licensing module can be accessed.
- a desktop machine can contain an Ethernet network card, ISDN connection card, Internet card, conventional modem, terminal adapter, or like device, with which to gain access to and communicate with a license server or licensing module. Any accepted form of connection between two more computers can be used.
- a communications protocol in an Internet environment is based on a TCP/IP protocol, or a derivative thereof. However use of other communication protocols such as IPX/SPX (NOVEL), or like protocols, also are suitable for facilitation of communication in the present invention.
- TCP Transfer Control Protocol
- UDP Universal Datagram Protocol
- a connection is first formed before any information is transferred. That is, an interactive two-way session is established.
- UDP Universal Datagram Protocol
- a message is sent without forming a connection. The message is routed in accordance with its destination address information. The message's receipt is not guaranteed. More importantly, response time to a messages sent by UDP is unknown. More specifically, if heavy network traffic is present, a UDP-based message may be delayed. Consequently, there can be an unacceptable delay in enabling a client application.
- TCP messaging format guarantees a response, even if that response indicates that a connection cannot be made. A decision can be made whether to re-attempt communication immediately or at a later time.
- a TCP connection also is more secure because data is not being cast into the network without guarantee of receipt, as is the case with UDP communications.
- UDP communication can be utilized in an audit system incorporating the invention.
- a client application can generate and send a UDP message when it is initially brought up, or whenever a computer upon which the client application is loaded is attached to a public network.
- an exemplary licensing system in accordance with the invention can involve running an internal licensing module, or an agent component thereof, on the laptop computer itself.
- An exemplary embodiment of such an arrangement is depicted in FIG. 7 .
- the agent component 706 of the licensing module 702 acts on behalf of a license server 712 during the periods that the portable computer 700 is out of communication with the license server 712 .
- the agent component 706 can receive and respond to license validity inquiries generated by a client module 704 on software application 705 that is loaded on the portable 700 while the portable 700 is in transit. Audits of client application use can be stored in the cache 708 of the licensing module 702 .
- the client component 710 of the licensing module 702 can establish communication with the agent module 714 in the license server 712 to refresh the information in its cache component 708 and/or supply any audit data upstream. If the user has not connected the laptop to a network access point for a prolonged period of time, the user can be prompted accordingly. This can be done pursuant to the expiration of a timer.
- the licensing module in a software package to run on a non-networked machine can contain a tag indicating this fact.
- the user may be prompted to call a number and receive recorded information for enabling the software.
- This information requires initial manual entry to enable the software, and periodic manual entry to validate the software.
- the validation check can be performed by prompting a user to call a number to automatically receive further enablement instructions. Such instructions are only provided if the license remains valid.
- instructions can be automatically be returned by fax in response to a validation request phone call.
- a licensing module can be operated as a proxy agent on a firewall separating a protected computer from a public network to which the computer is attached.
- a firewall proxy agent can operate in accordance with the system disclosed in the U.S. patent application Ser. No. (BDSM Attorney Docket No. 025553-013), entitled: “Firewall System For Protecting Network Elements Connected To A Public Network,” by Coley and Wesinger, filed on Feb. 6, 1996, and incorporated herein by reference in its entirety.
- the foregoing application describes a system for preventing unauthorized access to network elements protected by a firewall.
- the firewall operates by maintaining a plurality of proxy agents that are assigned to verify and connect any incoming access requests.
- a proxy agent is usually assigned based on the port number associated with an incoming access request.
- a proxy agent for validating a license is assigned for a request originating from a desktop machine that resides behind the firewall (i.e., is protected by the firewall).
- the proxy agent acts as licensing module performing all of the previously described tasks associated with licensing modules.
- a proxy agent licensing module can receive and forward a license validity inquiry request message from a client application residing on a protected computer.
- the proxy agent also acts on behalf of the responding agent to accept a inquiry response message and then pass the response back to the protected computer on behalf of the responding agent.
- the proxy agent also can facilitate periodic updates of a cache component maintained therein.
- the proxy agent is the only IP address visible outside of the firewall. The foregoing system protects the identity of the client application computer because the proxy agent acts on behalf of the computer when communicating with the outside world.
- the present invention can take the form of a software package comprised of floppy disks, a CD-ROM, or even a downloadable package.
- the software package may consist of a library of object modules that can be selected, as needed, by a software applications designer. The designer may select various object modules from the library for insertion into a pre-compiled version of a software application. The entire software application, including the selected object modules, are compiled to create a single executable client application. The selection of insertion points and frequency is left to the discretion of the designer.
- Validation check watchdog timers can be distributed throughout a software application. Validation checks can be inserted to correspond to various interrupts, or procedure calls within the software application (e.g., printing, saving). An opening routine in the software application can be selected for insertion of an initial license validation or enablement check.
- an exemplary embodiment of the invention can take the form of a medium for controlling such computing systems.
- the invention can be embodied in the form of an article of manufacture as a machine readable medium such as floppy disk, computer tape, hard drive disk, CD ROM, RAM, or any other suitable memory medium.
- the invention can also be embodied in a form that can be accessed and retrieved over a public network, such as the Internet, and downloaded onto a machine readable memory medium.
- the memory medium contains computer readable program code which causes one or more computing systems upon which the licensing system is running to function or carry out processes in accordance with the present invention.
- the invention has been described with respect to several exemplary embodiments. However, one skilled in the art will readily appreciate and recognize that the licensing system or method of operation in accordance with the invention can be applied in any computing system using licensed software, which systems are preferably attachable to a public network, such as the Internet.
- the invention provides the benefit of being able to freely distribute licensed software incorporating the invention with reduced apprehension of the software being illicitly copied or used without its being properly licensed.
- a system in accordance with the invention can be used to track and maintain records of the proliferation and use of software incorporating the invention.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Computing Systems (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- General Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Methods and apparatus for evaluating software freely distributed over the Internet are disclosed. In one disclosed embodiment, licensing system code is inserted into software to be distributed. The code includes a client module associated with the distributed software. A computer operating the software may then by caused to form a connection to a license server over an IP-compliant network responsive to detection by the client module of use of the distributed software on a client computer. The client computer may also be directed to a Web site associated with the distributed software and the user prompted to either purchase the distributed software or-evaluate the distributed software for a demonstration period.
Description
- This application is a divisional of co-pending U.S. patent application Ser. No. 11/109,972, filed Apr. 19, 2005, which is a continuation of U.S. patent application Ser. No. 10/079,221, filed Feb. 19, 2002, which is a continuation of U.S. patent application Ser. No. 09/128,652, filed Aug. 4, 1998, which is a continuation of U.S. patent application Ser. No. 08/607,081, filed Feb. 26, 1996, now issued as U.S. Pat. No. 5,790,664, all of which are incorporated herein by reference in their entirety.
- The present invention relates to software licensing, and in particular to a system for automated monitoring and management of licensed software.
- It is well known that software is not purchased, but only licensed for use. Software, unlike manufactured products, can be freely copied and distributed. Hence, software providers are largely limited in their choice of control means. Unfortunately, a software license is merely a legal mechanism, and cannot literally prevent illicit copying of proprietary software. A typical software license grants a permit to use the licensed software application on a particular machine and, perhaps, the generation of backup copies for personal use. A software license provides a software provider with a legal instrument against impermissible use of licensed software. However there remains no effective mechanism for preventing or monitoring illicit copying or illegal proliferation in the first place. Hence, software providers must rely on the public to not pirate software, and rely on their licensees to abstain from furnishing copies of software to friends or others. A significant amount of software piracy occurs in commercial settings. Commercial licensees are usually vigilant about license compliance. However, even the most attentive MIS manager (Management Information Systems) cannot prevent employees from copying software off of company machines for their personal use. As a result of illicit copying, software providers must adjust their prices, forcing legitimate buyers to pay higher prices to offset revenue losses.
- Although the estimates for losses due to piracy are estimated in the billions of U.S. dollars, such estimates remain mere projections. This is because their way of determining how widely software is copied. More specifically, there is no mechanism by which to monitor the proliferation and use of software, copied or otherwise. Statistics regarding the use of legitimately purchased software also remains unknown to software providers and vendors. Despite sales data, purchased software may be found ineffective by users and sit, unused, on hard drives. Consequently, software providers may not have a firm understanding of how their products are being received by users. Whether used or not, most proprietary software contains some security mechanism and/or registration mechanism.
- There are a number of schemes designed to prevent software from being copied, or to make use of copied software unduly burdensome. These schemes, however, are largely ineffective, complex, and add to development costs. Furthermore, for every protection scheme devised by programmers, there are hackers who will diligently go about undermining them. A first line of defense is to encourage legitimate users to register their licensed software.
- Registration of software provides a software provider with a record of a valid license. Registration typically involves filling out and mailing a registration card that is provided in an off-the-shelf software package. A user may be asked to write in the serial number of the software set, along with other pertinent information. The defense mechanism in registration, albeit weak, is that a software provider will only render assistance and support to properly registered users. That is, a software provider will refuse to grant assistance to a user unless the user has properly registered their software.
- The registration process also may involve responding to prompts generated by the software when it is first run. The prompt may be a security system asking the user to enter the serial number and/or a codeword to enable the software. The codeword may be a word appearing at prompt-designated locations in a user manual. This security scheme operates on the premise that a pirate will not ordinarily have a copy of the user manual. After the software is up and running, it may periodically prompt the user to re-enable the software by entering a different codeword appearing at varying locations in the user manual. This scheme is subverted by copying the manual and registration number.
- An on screen registration/enablement process may involve writing the registration number to disk. This is only possible with floppy disks as CD-ROMS are, at present, a largely read-only medium. If the disk is used again to load the software application, the software may prompt the user with a warning that the software has already been loaded (e.g., “IS LOADING OF THIS SOFTWARE PERMITTED? RECORDS INDICATE THAT THIS SOFTWARE HAS ALREADY BEEN LOADED. YOU MAY BE IN VIOLATION OF YOUR LICENSE AGREEMENT.”). However, reloading of software may be normal in the event of hard disk failure. Consequently, software providers cannot feasibly prevent the software application from being loaded more than once. Furthermore, if first run registration enablement is required, copiers can simply copy the software repeatedly prior to registering the original copy.
- Another security technique is to enable a software application for a defined period of time. This usually involves incorporating a date/time checking mechanism into the software application. Such a mechanism may be used where a software provider wants to supply, for example, a 30-day demonstration version of a software application for user evaluation. If the user decides to purchase a license following the evaluation period, the user may contact the software provider and supply payment information. Following approval (e.g., credit card) or receipt (i.e., check) of the payment, the software provider may supply the user with a regular copy of the software, or provide instructions or a codeword to disarm or reset the date/time checking mechanism.
- In operation, a date/time checking mechanism records a date/time stamp when a software application is first brought up. Alternatively, or in addition, the date/time mechanism may start a timer when the application is brought up. The date/time stamp is compared with the system date/time information maintained by the computer to determine if the software application is to be disabled. To subvert such a system, users have been known to reset the system date and system time to prevent expiration. In response, some software providers have resorted to writing complex code schemes to disable the software in the event that the system date is tampered with. Such a security mechanism is often used to control licensed software used in a commercial setting.
- Software sold for use in a commercial or institutional setting is frequently licensed for a predefined period of time. When such software is used on desktop computers, such computers are typically networked. The networked computers are usually connected to a file server, which file server may itself be tended by a computer management system that monitors and controls various file server groups. The file server computers act as a central location at which the desktop computers in the file server group can access files and applications. The file server also may facilitate the control of licensed software on the desktop computers. This occurs in the situation where the commercial software license is a so-called “floating license.”
- Commercial software licenses for operating a plurality of desktop computers normally are of two varieties: “fixed” or “floating.” A fixed license permits a software application to run on certain designated computers (e.g., computer numbers one through five, in a ten computer file server group, are designated for the licensed software application). A floating license permits a certain number of applications to run on any number of computers at a given time. So an application operating under a floating license may be allowed to simultaneously run on no more than ten of twenty computers in a network at any given time. Licensing management software is maintained in the network file server to monitor the number of floating licenses being used.
- Commercial software is prone to installation interruptions, as it almost always requires involved enablement procedures. In accordance with regular industry practices, commercial software applications are ordinarily enabled following their installation by contacting the software provider for enablement instructions and/or enabling codes. This process is rarely instantaneous. The software provider usually confirms that the software license is proper and paid for before faxing, e-mailing, or even using regular mail, to provide a set of enabling instructions, enabling codes, or disk(s) with which to bring the application up. Consequently, the software remains disabled until additional instructions are supplied and followed, which are usually sent only after an enablement request is approved.
- Management of floating licenses on networked computers involves two control software components: an application portion, and an authenticator portion. The application portion is nested within an application running on a desktop computer. The authentication portion is a code module contained in the file server that monitors and authorizes applications running on the desktop computers. When a user attempts to open the application software, the application portion code communicates with the authenticator code module to check to see if a floating license is available. If the maximum number of floating licenses are already being used, the software application is not allowed to open. Licensing control software also may be used to monitor defined term licenses to disable software in networked machines after license expiration.
- If a commercial license expires, the software may be disabled, midstream, preventing users from completing projects. Re-enablement requires contacting the software provider to purchase an additional license or extension. This may require re-execution of enablement procedures with new instructions or codes. Hence, it may take some time before the software application is up and running again, which situation can seriously inconvenience users.
- The common shortcoming shared by all licensed software, is that it requires some form of manual intervention for registration, enablement, and/or re-enablement. Manual intervention is cumbersome and can render software useless until it is enabled or re-enabled. The paramount issue is, however, that software providers have no mechanism for monitoring and controlling the actual use, whether legitimate or illicit, of their product. Proprietary software is misappropriated on a global scale causing massive losses to software providers, which losses are inevitably passed on to legitimate licensees.
- What is needed is a licensing system that allows software use to be monitored in an automated fashion, without user input. Moreover, a software licensing system is needed that permits a software provider to transparently control the use of licensed software.
- The present invention addresses the foregoing problems by providing a system for automatically determining whether a software application is licensed. In accordance with the invention, a generic licensing module, or “client module,” is provided that a software provider can attach to a software application. A software application having a client module attached thereto is hereinafter referred to as a “client application.” In accordance with preferred embodiments of the invention, a client application loaded on a computer having access to a public network, such as the Internet, automatically reports to a computer maintained by a software provider. The client module is a program, application, or like composition of code that is preferably nested in a compiled version of a software application (i.e., to form a client application).
- However, the client module can, in alternative embodiments of the invention, be attached to a previously compiled software application. Whether it is referring to a program nested in, or attached to a software application, the term client module is used throughout the present disclosure.
- A client module utilizes the public network as a means to transparently send license inquiry request messages to, and receive license inquiry response messages from, a license server maintained by a software provider. The license server has a database on which license information, or records, are stored. The license server also can record information contained in license inquiry request messages, and thereby audit use of client applications. The license record can identify a license in accordance with a hardware address, or hardware identifier of the computer, such as an IP address.
- Operation of an exemplary system incorporating the invention involves the client module in a client application generating inquiries that are sent to the license server in the context of an Internet communication session. The license server responds to the inquiry by investigating its database to determine whether a corresponding license record is present. The license server then forms an appropriate response message that is sent back to the client module.
- If it is determined that the client application is not licensed (i.e., the database does not contain a corresponding license record), the response sent by the licensing server does not allow the client application to be enabled. If the client application is licensed (i.e., the database contains a record of a license), the response can allow the client application to be enabled, or re-enabled. In sum, the client application must be enabled for it to properly operate. Communication between the computer and the licensing server is generally transparent to a user. That is, the client module automatically forms a connection with the license server, sends a message, and receives a response, all without user input or notification.
- Alternatively, an exemplary embodiment of the invention can be used to monitor use of client applications. Operation of an exemplary system incorporating the invention for monitoring client application use involves using the client module in the client application to generate messages that are sent to the licensing server. Such messages can be sent over any public network to which a user computer, upon which the client application is loaded, is connected. For example, a message can be sent to the license server in the context of an Internet communication session. The license server tracks, or audits, the use of client applications by recording pertinent information contained in a message generated by a client module. A database can be used to store the information. A software provider or vendor can access recorded information stored in the database to generate client application use reports. Such an auditing system can be a part, or a function of, a system for enabling, validating and/or disabling licensed software (i.e., client applications). When configured as such, audit data can be derived from license inquiry request messages. Furthermore, the license record database in the license server can be used to store the collected audit data. Alternatively, a separate database can be used.
- In a personal computer setting, an exemplary process in accordance with the invention may involve utilizing a modem, or like device, in the computer. The client module generates and sends a license validity inquiry request message to a regional or central license server maintained by the software provider. The license server contains an agent module for communicating with the client module and a database containing license records. The database in the license server is checked to see if a valid license record exists for the requesting client application and computer. If so, a message is transmitted back that allows enablement or re-enablement of the client application. The licensing server also can record information corresponding to the request in the database containing the license records, or in a different database.
- If a license record is not found, the client application is not enabled. A menu can be presented asking whether the user would like to purchase a license, and thus enable the software. The menu may direct a user to a Web homepage where a license can be purchased, automatically open a session to such a homepage, or provide a telephone number of a sales representative or automated operator. Optionally, the user can initiate a demonstration mode of operation to evaluate the client application.
- In a commercial or institutional computer environment (i.e., networked computers), a licensing system in accordance with exemplary embodiments of the invention can involve a hierarchical arrangement of licensing modules arranged between client application(s) and a license server. At the desktop computer level, a client module monitors one, or more, software applications on the desktop computer. Computers, such as file servers, residing at each level of the network, between the desktop computers and the license server, contain licensing modules. Licensing modules include an agent component for communicating with a downstream client, a cache component for interim storage of license information, and a client component for communicating with an upstream agent.
- Operation in an exemplary process involves the client module in a desktop computer communicating upstream with an agent component in a licensing module. A client component in that licensing module communicates upstream with an agent component in a next licensing module, whose client component, in turn, communicates with a next upstream agent, and so on. This arrangement is continued upward to converge on a license server which contains an agent module. However, the license server is maintained by the software provider. Consequently, the uppermost licensing module in the institutional network communicates with the license server by initiating a connection over a public network, such as the Internet. License enablement information is supplied to the upper-most licensing module by the license server, which information is propagated back downstream via the licensing modules. The cache components in the licensing modules can be used to store license records so that license inquiries can be addressed without having to forward the validation inquiry request messages to the license server.
- In a preferred embodiment of the invention, as applied in a network environment, the client and agent elements are generic. That is, client modules in the desktop computers and client components in each of the network level computers are substantially similar. Agent components in the licensing modules and the agent module in the license server also are substantially similar. The cache components of the licensing modules are used to store information that defines the structure of license records. Any client can communicate with any agent and vice versa. This arrangement facilitates network configuration flexibility.
- Operation of an exemplary system incorporating the invention in the network environment involves a client module in a client application forming and communicating a license validity inquiry request message upstream. An agent component in a nearest upstream licensing module receives the request. The licensing module checks its cache to determine if a license record exists corresponding to the request. The licensing module can then respond with an appropriate message. If the license information is not found at that level, the licensing module can forward the request upstream to determine if the license is of record in an upstream cache. This may continue up to the license server. When and if a license record is found, the information is copied into the cache of the licensing module nearest to the computer originating the request for future reference. In accordance with another aspect of systems incorporating the invention, the licensing modules periodically communicate upstream to fetch license information in order to revise and maintain currency of their cached license records. By doing so, a validity request can be addressed by a nearest upstream agent. Furthermore, periodic checking can permit management of request message traffic on the license server.
- In accordance with an exemplary embodiment of the invention, license information is organized in class and sub-class designations. License information maintained on the license server covers blocks of underlying computers rather than the individual desktop computers themselves. This provides for efficient communication of license information between the license server, licensing modules, and desktop computers.
- Whether used in a personal or commercial computing environment, systems incorporating the present invention allow client software to be enabled or re-enabled at any time without significant delay. Software applications operating in accordance with the present invention can be installed on any computer in the world having access to a public network, such as the Internet. If so desired, a client application can be configured to not operate unless it receives acknowledgment of the presence of a valid license record. As the use of computers expands globally, a licensing system in accordance with the present invention can ensure that a client application operating on any computer in the world is properly licensed.
- In addition, in a personal or network computing environment, systems incorporating the present invention can be used to monitor client application use. Such a system can operate by recording information from license validity inquiry requests messages that are received at the license server. Client application use, and corresponding details, can be recorded when the client module sends license inquiry request messages back to the license server.
- Alternatively, the system can be used in an audit-only mode whereby the client applications report relevant information back to the license server, but do not require an enabling response message to continue operating. As the use of computers expands globally, a licensing system in accordance with the present invention can assist in tracking client application use and proliferation.
- Preferred embodiments of the present invention take advantage of the fact that an increasing number of computers, and computer networks, have direct access to the Internet. Systems in accordance with the present invention can utilize the Internet as the medium over which license validity inquiry request inquiries and their corresponding responses are transmitted.
- In accordance with exemplary embodiments of the invention, if a client application does not receive enablement information, the client application is not enabled, or is disabled. Hence, any software application that contains a client module accordance with the invention, can be automatically enabled, or disabled.
- Furthermore, use of client module equipped applications can be tracked. Such a system allows software to be freely distributed while ensuring that a license is taken for its use, or at the very least, ensuring that the use of the software can be tracked.
- The foregoing, and other objects, features and advantages of the present invention will be more readily understood upon reading the following detailed description in conjunction with the drawings in which:
-
FIG. 1 depicts a desktop computer in accordance with an exemplary embodiment of the invention; -
FIG. 2 depicts a flow diagram for operating the arrangement ofFIG. 1 in accordance with an exemplary process incorporating the present invention; -
FIG. 3 depicts a regional server scenario in accordance with an exemplary embodiment of the invention; -
FIG. 4 depicts a computer network arrangement in accordance with an exemplary embodiment of the invention; -
FIG. 5 depicts a symbolic representation of the computer network ofFIG. 4 ; -
FIG. 6 depicts an additional exemplary embodiment of the invention wherein multiple software application licenses are managed; and -
FIG. 7 depicts an additional exemplary embodiment of the invention in a portable computer. -
FIG. 1 depicts a personal computer system in accordance with an exemplary embodiment of the invention. The system includes apersonal computer 100 that has aclient application 103 residing on ahard drive 104. Theclient application 103 is comprised of asoftware application 102 and aclient module 108. Thecomputer 100 includes amodem 106. Theclient module 108 operates to enable or disable thesoftware application 102 pursuant to a response from alicense server 110 in the context of license validity inquiries. Thelicense server 110 contains adatabase 112 having license records recorded thereon, and anagent module 114 that communicates with theclient module 108. Thelicensing server 110 is typically maintained by the software provider who developed thesoftware application 102. Alternatively, thelicense server 110 can be maintained by a contracted service provider. In a preferred embodiment, theclient module 108 and theagent module 114 communicate over theInternet 116. However, the client and agent can communicate over any public network. As used herein, the term public network encompasses not only networks that are freely available to the public, generally, but also any private network which can be subscribed to. The depiction of theclient module 108 is merely for descriptive and illustrative purposes. Theclient module 108 can be code nested within thesoftware application 102. - In accordance with an exemplary embodiment of the invention, the
client module 108 automatically initiates a process to determine whether thesoftware application 102 is validly licensed. This can happen each time theclient application 103 is brought up. Thelicensing module 108 operates transparently and utilizes themodem 106 to form a connection with thelicensing server 110. Once the connection is made, theclient module 108 sends a license validity inquiry request message to thelicense server 110. Theagent module 114 receives the request and queries thedatabase 112 to determine whether a license record exists that corresponds to theclient application 103 andcomputer 100. Thelicense server 110 also can record relevant information contained in the license validity inquiry request message to audit the use of client application. - Pursuant to the query, a response message is generated and returned back to the
client module 108 by theagent module 114. If the query finds a valid license record, the response message indicates the license record's existence and location in thedatabase 112. Theclient module 108 can record the license record location for future reference. If a license record is not located in thedatabase 112, an appropriate response message is generated and returned. The presence of a record permits theclient module 108 to enable, or to allow continued operation of (i.e., re-enable), thesoftware application 102. - If the query of the
database 112 returns an indication that a license does not exist, theclient module 108 can pursue any one of many courses of action. The first possible course of action is to not enable thesoftware application 102, or to it if it is presently operating. Theclient module 108 also may supply an appropriate message to the user indicating that a license does not exist for the client application. Alternatively, theclient module 108 can supply a message instructing the user as to where and how a license can be purchased. This may involve directing the user to telephone the software provider's sales department, or the message can direct the user to an appropriate Web site homepage on aWeb server 118 where the software can be purchased. - If a license is purchased via a homepage on the
Web server 118, theWeb server 118 can automatically update thedatabase 112 with the information supplied by the user or the computer 100 (e.g., IP address supplied in the context of a Web session), thereby creating a valid license record. A subsequent client module license inquiry will allow theclient application 103 to be enabled. If the license purchase transaction fails for any reason (e.g., a credit card supplied is not approved), the license record can be removed from thedatabase 112 by the software provider. This has the effect of disabling the client application in a next license validity inquiry. - The practical effect of such a system is to be able to provide software that is freely distributable. Any user in possession of the
client application 103 will not be able to use it until a license is procured and a license record is established. - An exemplary process of operating the arrangement depicted in
FIG. 1 is shown in the flowchart ofFIG. 2 . The frequency and timing for performing a license validation check can be selected according to the discretion of the software application designer. In the exemplary process depicted, the client module performs an initial check each time the software application is brought up (step 200). The license validity checking process is initiated (step 202) by utilizing a modem to form an Internet connection between thecomputer 100 and a licensing server (step 204). This may be done by having the client module instruct the modem to dial a 1-800 number maintained by the software provider that accesses a local Internet gateway (if used in the United States). - Once the connection is confirmed (step 206), the
client module 103 forms a license validity inquiry request message (step 208). The request message may contain information such as the application name, the application version number, a date/time stamp, the name of a license server 110 (if several license servers are maintained by the software provider), and a hardware identifier, such as the IP address of thecomputer 100. After formation, the request message is sent to the license server 110 (step 210) over a public network*. Theagent module 114 in thelicense server 110 forms a query (step 212) to determine whether a corresponding license record is stored in the database 112 (step 214). Theagent module 114 also can record audit information from the request message (step 213). If the query locates a record of a license for the request, a response message is returned having a license ID field comprising a pointer to the location of the license record in the database 112 (step 218). If the query does not locate a record of a license for the request, a response message is returned having a null indication in the license ID field (step 216). The response message is returned to the client module 108 (step 220) after which the Internet connection is closed (step 222). - The
client module 108 investigates the response message to determine whether the license ID field contains a license ID (step 224). If the license ID field is null, theclient module 108 fails to enable the software application, or disables it (step 226). Theclient module 108 may then prompt the user with any variety of messages (step 227). For example, the user may be prompted to assess whether a demonstration period of operation would be acceptable. If so, this information can be recorded in theclient module 108 and be passed upstream in the context of a next validity inquiry request message. Theserver 110 will record this information in thedatabase 112. Alternatively, the user can be prompted to contact a sales representative or automated operator to purchase a license, or directed to a Web homepage where a license for the software application can be purchased. In the event of a license purchase, thedatabase 112 can be automatically updated to record the license. Thereafter, a validity check will find a license record and allow theclient application 103 to be enabled. - If the license ID field contains a license ID, this information is recorded by the
client module 103 for future use (step 228). Theclient module 108 then enables the software application 102 (step 230). The client module may, at this point, start a timer (step 232) for periodic checking of license validity. Such a validity check is automatically initiated when the timer expires (step 234). The client module also can be configured to initiate a validity check whenever an interrupt is present indicating a certain activity (step 236), such as printing or saving. - Periodic checks performed at timer expiration, or upon appropriate interrupt, use the license ID, which is a pointer, to directly access the database record corresponding to the license. If the license record is found, a response message indicates so, the software remains enabled, and the timer is reset. If the record is found empty, it may indicate that the license has expired. The response message will indicate this, and the software can be disabled. Alternatively, the user may be requested to renew the license within a certain period of time before the
software application 102 is disabled. - The date/time stamp information passed upstream in the license validity inquiry request message can be used to detect whether the system date/time information on the
computer 100 has been tampered with. This is done by comparing the date/time information passed in the request message with the date/time information maintained on thelicensing server 110. Furthermore, in preferred embodiments of the invention, license ID information is communicated between theclient module 108 and theagent module 114 in an encrypted form, as explained in greater detail below. - In the event that no license is found, several response options are available which vary according to the requirements of, and discretion of a designer of the
software application 102. As previously mentioned, a response can be to provide the user with a phone number through which a software license can be purchased, or to direct the computer user to a Web homepage maintained by the software provider. Alternatively, theclient module 108 can directly initiate a session with theWeb server 118 that supports a homepage through which the user can purchase a license. A first screen on such a homepage can prompt the user to indicate whether the purchase of a full license would be desirable, or whether a demonstration period is preferable to evaluate the application. If neither of these options is selected the session is terminated. If the user opts to take a license, the user can be prompted with questions asking which features in the software application are to be enabled (the price of the license can be adjusted accordingly). The session can conclude with the presentation of a payment screen inviting the user to enter credit card information, or to call a sales representative in order to supply payment information. - If credit card information is supplied in the homepage session, it can be gathered using the system disclosed in the U.S. patent application Ser. No. (BDSM Attorney Docket No. 025553-014) entitled: “System for Securely Storing Information Received Over a Public Network,” by Coley and Wesinger, filed on Feb. 6, 1996, and incorporated herein by reference in its entirety. Once the credit card information is entered, a response message can be sent to the
client module 108 temporarily enabling thesoftware application 102. Thedatabase 112 can then automatically updated with a license record. If a credit card turns out to be invalid, thelicense server database 112 can be updated accordingly by removing the license record and thereby disabling the software pursuant to a next inquiry. - The exemplary inventive system described above allows client applications (i.e., software application having client modules) to be freely distributed while reasonably ensuring that they are, or will be, licensed if used. Any software application having a licensing system client module attached will not operate unless and until the license system client module receives authority to enable the software application. Such a system allows global proliferation of the software, even in the form of a copy. However, such widespread use of client applications may result in the
license server 110 being inundated with validity request message traffic. A dedicated license server can be set up to handle all of the license inquiry traffic for a particular software application. Alternatively, some form of traffic management can be invoked. - Traffic management can take many forms. It can involve establishing regional license servers according to a geographic arrangement that permits efficient response to any licensing inquiry request messages. A client application initialization process can be used wherein a user enters the location (e.g., zip code, city, and country). This information can be used by the client module to select an appropriate autodial telephone number whereby a nearest software provider license server can be accessed.
- Regional license servers can receive license information propagated from a central licensing server. Client modules can contact their regional license server to assess whether license records exist for their corresponding client applications. Because use of the Internet is contemplated as a means for communicating licensing inquiry and response messages, the regional license server designated for a particular client module can be assigned in accordance with efficient network, and/or geographic, considerations. This can facilitate provision of a swift response to license validity inquiry request messages.
- An arrangement of regional licensing servers in accordance with an exemplary embodiment of the invention is depicted in
FIG. 3 .Regional licensing servers 302 are comprised of anagent component 306, adatabase component 308, and aclient component 310. A client module in adesktop machine 300 communicates with anagent component 306 in an assignedregional license server 302 over a public access network, such as theInternet 316. Theclient component 310 in theregional license servers 302 communicates with anagent module 314 in acentral license server 304. License information can be systematically directed from thecentral license server 316 to appropriateregional license servers 302 in accordance with information supplied when the license is procured. Alternatively, theregional license servers 302 can systematically request license record information with which to update theirdatabase components 308. - A variation on the
regional license servers 302 can be used in a licensing management system incorporating the invention for application in a commercial setting. That is, wherein computers are networked in a hierarchical arrangement within a company or institution. -
FIG. 4 depicts a commercial network system in accordance with an exemplary embodiment of the invention.Desktop machines 400 are organized in file server groups. The file server groups are administered byfile server computers 402 throughnetworks 404. The file server groups can, for example, serve various design teams in a research and development facility of a corporation. Thefile servers 402 in the R&D facility are, in turn, tended by aminicomputer 406. Theminicomputer 406, andminicomputers main computer 412 located, e.g., at the headquarters of the corporation. In accordance with an embodiment of the invention, eachdesktop computer 400 contains a client module for monitoring one or more client applications. The client modules in thedesktop computers 400 communicate upstream with licensing modules contained respectivefile server computers 402. The licensing modules in thefile server computers 402 communicate with a licensing module in theminicomputer 406, which licensing module, in turn, communicates with a licensing module in themain computer 412 at the corporation headquarters. The licensing module in themain computer 412 uses a public network, such as theInternet 414, to communicate with alicense server 416 maintained by a software provider who developed the software application(s) on thedesktop computers 400.Main computers license server 416 to communicate license inquiry and response messages. - A representation of the network scenario depicted in
FIG. 4 , illustrating licensing system components in accordance with an exemplary embodiment of the invention, is shown inFIG. 5 . Various network computers are depicted in symbolic form to assist in illustrating the components involved in the exemplary embodiment of the invention.Desktop computers 500 containsoftware applications 514 having licensingsystem client modules 516 attached thereto. Thedesktop computers 500 are tended bygroup file servers 502 onnetworks 504. Each of the groupfile server computers 502,minicomputers main computer 512 contain a licensing module. A licensing module comprises anagent component 518, acache memory component 520, and aclient component 522. Thelicense server 526 maintained by the software provider contains anagent module 524. For any of the licensing modules in the intermediate computers between thedesktop computer 500 and thelicense server 526, the licensing module'sclient component 522 communicates with theagent component 518 of an upstream licensing module, or with theagent module 524 of the license server. The licensing module'sagent component 518 communicates with a downstream licensing module'sclient component 522, or aclient module 516 in adesktop computer 500. Communication between the upper-most licensing module in the internal network (i.e., licensing module 512) and theagent module 524 in thelicense server 526 is conducted over a public network, such as theInternet 528. - An audit function can be implemented in a networked embodiment of the present invention in a number of ways. For example, the
upper-most licensing module 512 can maintain software, such as anaudit tool 530, that tracks use of client applications in underlying computers in the network. An audit report can be periodically generated and sent upstream to thelicense server 526. Thelicense server 526 can record and interpret the audit report to monitor use of client application software. Alternatively, license validity inquiry request message traffic from individual client applications can be recorded in thelicense server 526. Audit information can be used to generate billing invoices. - An additional aspect of the aforementioned audit system permits an MIS manager at a corporation or institution to monitor the use of client applications for internal audit purposes. Such a system operates by monitoring license inquiry traffic passing through a network to and from a license server. In an exemplary embodiment, such a system involves maintaining internal auditing software (e.g., a tool or utility program) in an upper-most level licensing module in an internal network. A report can be generated by the internal auditing software tool. Data in the report can be derived from information collected at the upper-most licensing module. The MIS manager can use the internal audit reports to manage the licensing arrangements of the client applications on the network. For example, if a network of twenty desktop computers is frequently using a maximum number of floating licenses for a particular client application, the MIS manager can ascertain this by reviewing internal audit records, and take appropriate action.
- In accordance with preferred embodiments of the invention in a network setting, each of the agent-type components, and each of the client-type components are generic. That is, any given
agent component 518, and theagent module 524 in thelicense server 526, is substantially similar. The same is true of theclient components 522 and the client modules in thedesktop computers 500. The parameters maintained by, and passed between various license system elements defines the licensing system structure. - In accordance with a preferred embodiment of the invention, the license system operates by distributing licensing information to the
cache components 520 in the licensing modules in response to inquiry requests. The information contained in aparticular cache component 520 is specific tosubordinate software applications 514, or licensing modules. In accordance with a preferred embodiment, license information is organized by class designations. Individual licenses for client applications ondesktop machines 500 can be covered by sub-class licenses maintained in thecache components 520 in thefile server computers 502. The sub-class licenses on thefile server machines 502 can, in turn, fall under a class license maintained in thecache component 520 of theminicomputer 506. The class license maintained on the minicomputer's licensing module can be designated under a block license maintained in acache component 520 of themain computer 512. Theclient component 522 of the main computer's licensing module communicates with thelicense server 526 to verify block licenses. - Validity inquiry traffic is managed in the exemplary system of
FIG. 5 through the use of the aforementioned license class designation structure and through periodic updating of caches in licensing modules. By maintaining license information in a class/sub-class designation, a single license validity inquiry generated by, for example, a file server's licensing module, can enable a sub-class license that covers the client applications of all of thedesktop computers 500 in the file server's group. This is generally more efficient than having eachdesktop computer 500 individually validate its own license through thelicense server 526. Furthermore, because the sub-class license maintained on the file server itself can fall under a class license maintained on the minicomputer, the validity inquiry by the file server may be addressed by the minicomputer rather than forwarding the request further upstream. - In accordance with a preferred embodiment of the invention, licensing modules periodically and systematically initiate license validity inquiries upstream. The responses to the periodic inquiries are recorded into the cache components of the licensing modules. As a result, client modules and client components need ordinarily communicate with a next upstream agent to be enabled, re-enabled, or to update their caches. Periodic self-validation updating of the licensing modules also provides for more uniform request traffic on the
licensing server 526. This can provide efficiencies in propagating license information from the licensing server in response to license validity inquiries. Of course, the foregoing system can operate by passing individual license validity request and response messages through the licensing modules. - The result of the hierarchical arrangement is to control the flow of validity inquiry traffic received and responded to by the licensing server. If a license server dedicated to a particular client application is employed, the license server may be able to handle all of the license inquiry traffic received. However, if a single license server handles license validity inquiry requests for a variety of client applications, request traffic management may be needed. By arranging the system in a hierarchical fashion and designating the licenses in accordance with class and hierarchical subclass designations, the licensing server can manage request traffic for a several different client applications.
- Client components and modules contain a set of license management procedures for handling license record information. In accordance with an exemplary embodiment of the invention, three validation procedures are used: Check Out License, Validate License, and Check In License. Check Out License is responsible for the initial enablement of a client application. Validate License is responsible for periodic re-enablement of a client application. Check In License can be used for decrementing a floating license count, or indicating client application status in a database license record when use of a client application is completed. Check In License also may be used for disabling a license or feature after its use in the event that there is a per-use cost associated with the software. The following exemplary process descriptions are provided for a case wherein a client application is validating itself directly, or indirectly (i.e., through one or more licensing modules) over the Internet.
- Each of the procedures involves initially forming a connection with a corresponding upstream agent. The agent can be the agent component of a licensing module in an upstream network file server, or like machine containing a licensing module. Or the upstream agent may be the agent module in a license server in which case the connection is formed over a public network, such as the Internet.
- When a client application is first brought up, the Check Out License procedure is initiated. The purpose of the Check Out License procedure is to enable the software application to which the client module is attached. In addition, the Check Out License procedure can be used by to track the proliferation of a client application. In accordance with an exemplary process incorporating the invention, the client module's Check Out License call generates a client data structure containing: the name of the software application, any feature name(s) that is to be enabled, the name of the upstream agent component/module, a hardware identifier of the computer containing the client application, a date/time stamp, and a version number of the licensing system. Other fields are created in the client data structure that are filled in by the upstream licensing module or license server.
- Prior to, concurrently, or following the formation of the client data structure, the client module forms a connection with the upstream agent component designated in the client data structure. Once the connection is completed, the Check Out License procedure sends a license validity inquiry request message to the upstream agent, which request message contains the contents of the client data structure. Alternatively, the entire data structure can be sent. The information from the client data structure is used by the upstream agent to form a query with which to determine the existence, if any, of a license record for the client application. In the case where the upstream agent is the agent module in the license server, the query is performed on the server database. In the case where the upstream agent is an agent component in a licensing module (e.g., in a file server) the query is performed on the licensing module's cache component.
- If the query finds a license record in the database or cache, the location of that record, in the form of a pointer, is generated for storage in a license ID field in the client data structure. The licensing module also generates an authorization ID for storage in a field of the same name in the client data structure. If the query does not locate a license record, the license ID field and authorization ID field are left blank (i.e., nulled). Following the query, a license validity inquiry response message is formed by the agent and returned to the client. The response message contains the license and authorization IDs, if any, that are to be stored in the client data structure.
- The client module investigates the client data structure content returned by the agent component/module to analyze the license and authorization ID information contained therein, if any. If these fields indicate the presence of a valid license, the client module enables the software application. The license and authorization IDs are stored in the client data structure in the client module for future license validation checks. If the data structure fields for the license and authorization IDs are null, the client application is not enabled and the client data structure is deleted from the client module.
- The database or cache query also may involve a comparison of the date/time stamp contained in the client data structure with date/time information maintained by the license server or license module system. This added security measure can detect a user's tampering with system time and date information on their computer. If the particular software application is operating in a demonstration mode for a predefined period of time, the date/time stamp passed in the client data structure can be used as an initial check of whether the demonstration period has expired. If there is date/time corruption, the client application can be disabled.
- In an audit function, the contents of a message generated by the Check Out License procedure can be recorded in the license server or upstream licensing module. Relevant information recorded by the license server can include, but is not limited to, the hardware identifier of the computer upon which the client application is loaded (e.g., the IP address), the application name, feature names, and the application version number. Additionally, a client module registration number, or like identifying means, can be nested in a client application. This registration number also can be passed upstream in a request message for audit recordation. A client module registration number allows a software provider to track the proliferation paths and patterns of copied client applications. Consequently, a software provider can determine the source of copied software. A software provider can force a user to attach a non-connected computer to a network access point by supplying a prompt indicating to the user that a client application will not enable unless and until it checks in. Consequently, if the user chooses to use the client application (i.e., attach the computer to a network access point), the software provider is informed of the client application's use.
- A second process initiated by a client module or a client component is the Validate License procedure. This process determines whether a previously enabled client application is still validly licensed. The procedure can be called at any time. For instance, the initiation of the Validate License procedure can be in response to a timer expiration (i.e., a periodic check) or at the appearance of a system interrupt (e.g., printing is selected). The Validate License procedure, in accordance with an exemplary process incorporating the invention, generates a new client data structure containing: the name of the software application, any feature name(s) that is to be enabled, the name of the upstream agent component/module, the license ID, the authorization ID, a date/time stamp, and the version number of the licensing system.
- Following completion of the upstream connection, the Validate License procedure sends a license validity inquiry request message to the upstream agent, which request message contains the new client data structure contents. The license ID information in the client data structure is used by the upstream agent to directly access the memory location where the license record was previously located. If the query finds a license record, a new authorization ID is generated by the agent and stored in the authorization ID field in the client data structure. If a license record no longer exists, the license ID field and authorization ID field are nulled. A license validity inquiry response message containing the client data structure is then formed by the agent and returned to the client module.
- The client module investigates the data structure contents returned in the response message to analyze license and authorization ID information. If the authorization ID indicates the continued presence of a valid license, the client module allows the client application to remain enabled. The new authorization ID is stored in the client data structure in the client module for future license validation checks or to check in the license. If the data structure fields for the license and authorization IDs are null, the client application is disabled and the client data structure is deleted. Alternatively, the user can be prompted to indicate whether a new license would be desirable. If so, any of the procedures previously described can be used to procure a new license (e.g., access a Web homepage).
- The Check In License procedure can be used to return a license or disable a feature when a user has completed use of the client application or a feature contained therein. The procedure, in accordance with an exemplary process incorporating the invention, generates a new client data structure containing: the name of the software application, any feature name(s) that is to be disabled, the name of the upstream agent component/module, the license ID, the authorization ID, a date/time stamp, and the version number of the licensing system.
- Following completion of the upstream connection, the Check In License procedure sends a license check in request message to the upstream agent, which request message contains the new client data structure contents. The license ID information in the client data structure is used by the upstream agent to directly access the memory location where the license record was previously located. The existing license record is modified to indicate the disablement of a feature, or is deleted (if the agent is the agent module in the license server). If the agent is an agent component in a licensing module, the license is designated for deletion. This information is passed upstream in a license check in request message subsequently sent up stream by the licensing module in its next periodic self-validation. The license and authorization ID fields of the client data structure are nulled, and a license check in response message containing the client data structure is then formed by the agent and returned to the client module. The client module then deletes the client data structure.
- It is important to note that, in a network setting incorporating the aforementioned exemplary processes, the client components of the licensing modules also can use the Check Out, Check In, and Validate License procedures to update licensing records stored in their cache components. Performance of these procedures by the licensing modules is substantially similar to performance of the procedures by a client module. However, the corresponding license ID, instead of referring to an individual client application, can refer to a class or sub-class license that covers a block of underlying client applications, or licensing modules. As previously mentioned, the Validate License procedure can be periodically initiated by the licensing modules to systematically update the contents of their caches and to provide for request traffic management received at the license server.
- Automatically auditing cached license records improves the likelihood of a client application, or client component, finding a current license record in a next upstream agent in the context of a Check Out or Validate License procedure.
- A licensing system in accordance with the invention, in a preferred embodiment, involves inserting licensing system code into a pre-compiled version of a software application and then compiling that application into a single executable client application.
- However, in accordance with another embodiment of the invention, the licensing system can be provided as a module that is inserted into to an existing software structure on a computer network. Such a system can be used to monitor software application use in a computer network that does not otherwise have a means to audit application use. This type of system can be used by individuals, such as MIS managers, who wish to audit software application use activity in a network. In an exemplary embodiment, a client module installed in an individual desktop computer “wraps around” software applications selected for monitoring. When the wrapped application used, or seeks a floating license from a file server, a licensing module installed in the file server computer records the activity. In a floating license system, the licensing module can be configured to always reserve a license for use by certain individual computers (e.g., the CEO's computer). Audit records generated by the licensing module can be periodically checked by the MIS manager to see if adjustments are needed (e.g., purchase a greater number of floating licenses).
- A variation of the latter system also can be installed in existing network to retrofit a licensing management system. Client modules wrap previously installed applications thereby converting them into client applications. The client modules on individual computers monitor and/or control client application use. The client modules can report to licensing modules in upstream file servers, or report directly to a license server over a public network. Such a system can be used by software providers as an aftermarket component installed on top of existing software systems. In such a setting, a client module can be responsible for handling license validation of more than one client application loaded on the computer. If two or more client software applications on a computer are by a same software provider, the client module can generate a single validity request message covering each wrapped client application. Such a system has the effect of providing a generic licensing validation system for all of the licensed software on a desktop machine supplied by a particular software provider.
- An exemplary licensing system that can be retrofitted in an existing computer network is depicted in
FIG. 6 . Anindividual computer 600 has aclient module 618 installed therein. Theclient module 618 is wrapped around one ormore software applications client module 618 can validate software licenses by a variety of software providers. Theclient module 618 can enable, or validate, the client applications by communicating with a licensing module in afile server 602. The licensing module in thefile server 602 also is a retrofitted component in the license system. Licensing modules are installed in each of the computers (e.g., file servers, minicomputer, main computers) that form the network hierarchy. Operation of such a system is substantially similar to that of a network embodiment of a license management system described above. Alternatively, client modules can communicate directly with alicense server 604 over a public network, such as theInternet 616. - As mentioned in the Background above, software licensing management systems conventionally maintain proprietary, that is application specific, licensing code in software applications (i.e., application portion). Corresponding proprietary licensing code also is maintained in the file server or like network element (i.e., authenticator portion). Consequently, a conventional system typically has to maintain several separate licensing validation programs on a file server to check each of the software applications loaded on sub-tended computers. A system in accordance with the latter embodiment of the invention provides for a generic solution whereby a single client module is maintained on the desktop computer that handles all of the licensing management for the computer's client applications. Hence, the computers and corresponding servers need not contain several licensing system applications each having proprietary code.
- Because the exemplary embodiments described above describe use of the Internet as a communications medium, the hardware identifier maintained in the client data structure is preferably the IP address of a computer. However, any other suitable hardware identifier can be used to identify the computer on which a client application or licensing module is loaded. For example, Intel's Pentium.RTM.processor contains an internal serial number that can be used as a hardware identifier. Alternatively, a hardware module can be provided that is designed specifically for a licensing system in accordance with the present invention. Such a hardware module can be attached to a parallel port on a computer can be used as a tag to identify the computer. The client module in the computer scans the parallel port to acquire the computer's hardware ID for insertion into a client data structure.
- The license ID maintained in the client data structure is used as a pointer to a location in the cache or database of a corresponding upstream licensing agent or server. The pointer designates the location of the licensing record. A license record at any given level can represent a relationship between the agent and an underlying client. That relationship, as designated by the license ID can be used as a universal designator to replace designating a particular client/agent pair by application name, feature name, IP address, agent name, etc. Use of a license ID provides a more efficient means with which to track and communicate information regarding a particular license.
- The authorization ID is used as a means to indicate the status of a license in response to an enablement or validation inquiry. The authorization ID also can be used as an acknowledgement to a Check In License procedure that permits a client application to delete a client data structure. Furthermore, the authorization ID also can be used to return a status message containing an error code, an indication that the server or agent is presently too busy to handle a query, an indication of a connection or communication failure, or any other like message. Another important task facilitated by the authorization ID is its use in supporting encrypted communication between a client and an agent.
- Communication between clients and agents, in accordance with preferred embodiments of the invention, is encrypted. In an encryption scheme according to an exemplary embodiment, the authorization ID is used to pass back a key for use in encryption processing. The encryption scheme involves maintaining identical encryption engines in corresponding clients and agents. The key passed by the authorization ID is used as a common seed, or initialization vector, for initializing the respective encryption engines for encryption and decryption of messages. A new key is generated and passed back each time an agent responds to a client inquiry, which key is used in a next round of communications. The key is stored in the client module in the context of storing the client data structure (containing the authorization ID). In a subsequent client-to-agent communication the key is used for client encryption of a message. The message is then decrypted at the agent using the common key to-agent In order to allow encryption synchronization, all of the data structure fields in an initial communication between a client/agent pair are unencrypted. Subsequent communications have certain fields encrypted. In response to an initial communication, the agent passes back a first key. The message is then re-sent having designated fields of the client data structure encrypted. The response passed back by the agent in a next communication contains a new key for use in a subsequent communication. In this way, the client and agent maintain encryption synchronization by supplying the same key to their respective encryption engines. In accordance with a preferred embodiment, the key is a random number generated by an agent.
- The encrypted fields of the data structure contents passing between a client and agent include the license and authorization Ids, and any proprietary data required for validation, such as floating license information. All of the fields of the data structure contents can be encoded, however, the application name, feature name, hardware identifier, and a licensing system version number are preferably left unencoded. In the event that there is lack in synchronization, a client or agent can look to the unencoded information and revert back to a most recent encryption key. If there is still lack of synchronization, a request is passed that the client return to the initial message state, thereby allowing both the client and agent encryption engines to reset.
- The frequency of validation checks is application dependent. A software designer can select when and how often validation checks are to occur, if at all. The licensing system can be configured in accordance with the needs of a particular application. The software license can be validated, or enabled, each time the application is brought up on a computer, or each time a particular feature is used (e.g., printing). The software license also can be validated in response to the expiration of a timer (i.e., periodic validation). If the response to the validation check is returns a null license ID, the client application is disabled. To prevent a user from tampering with a client application, or a licensing module associated therewith, in an effort to disable validation checking, any number of watchdog timers can be nested in the client application. The nested watchdog timer can be used to periodically self-check the client application to determine whether it has been validated within the watchdog period. If so, the watchdog timer is reset. If not, a validation check can be initiated or the client application can be disabled.
- Establishing a database license record in the licensing server can be performed in a variety of ways. Software can be purchased and paid for in an interactive commercial transaction conducted over the Internet, as described above. The result of such a transaction is to establish a license record in the licensing server database. A subsequent validation check by the client application will allow the software to be enabled. The database entry also can be formed by pre-authorization. If the software is purchased from a vendor, the vendor, in the context of the transaction can perform the database entry shortly after the software is supplied to the user or company. When the software is brought up on the client computer, an initial validity check will return an enablement response because a license record has already been established.
- Alternatively, software can be pre-enabled with a temporary term license thereby providing a software provider with a time window in which to establish a license record. Other techniques for establishing an entry in the database, and thus enabling the corresponding client application, include using automated telephone operator systems. A client can call a telephone number and use a touch-tone phone to respond to prompts presented by an automated operator. Hence, any mechanism for initializing the database, and consequently automatically enabling the software, is deemed suitable.
- Another aspect of systems operating in accordance with the invention is feature enablement. The systems described above can be used to enable and disable particular features in a client application. Such a situation may occur wherein a software application has several levels of operating capability. For instance, a user can selectively enhance operating capability by selecting features defined in a software feature application menu. In response, an associated client module can invoke the Check Out License procedure wherein the desired feature name is passed upstream. The license, of course, does not exist yet, but the system can be configured to direct the user to, or provide the user with, a feature enablement menu that requests that the user enter credit card information, as described above. Alternatively, the system can be organized to automatically initiate a process that creates a license when new software is brought up. This can involve a mechanism that forms a Web server connection and supplies an authorization message that creates a database license entry. For a commercial client, a software provider can monitor the activation and use of client application features and bill the client accordingly.
- As previously discussed, systems in accordance with the present invention can be used to audit the use and proliferation of software. Attachment of a licensing module to a software application causes that software application to report back to a licensing server at some point. If the client module or software application is configured to report back the first time that the software application is brought up, a software provider can keep track of, or audit, which and how many machines the software application is operating on. The licensing server can be set to initially enable any request received for the software application being audited. At the discretion of the software provider, the software application can be turned off at anytime. The software provider can respond to subsequent licensing enablement or validation requests by supplying a prompt inviting the user to purchase a license. A variation on the audit function can be used to log questionable user activity.
- An additional security aspect of systems in accordance with the invention is the provision of an activities log in the client module, licensing modules, or license server. Such a log gathers information associated with any or all validation requests, or irregularities. Information gathered in such a log may include, but is not limited to, data/time stamps (to ensure periodic checking is not interfered with), and the identity of a machine corresponding to the origin of an inquiry request. The foregoing information can be used to facilitate the investigation of a pirate if the pirate's activities require legal attention.
- Software version control can be provided in accordance with another aspect of the invention. Software version number information can be passed upstream in the context of a license validity inquiry request message. If the software version has expired, a message can be passed back in the status field of the authorization ID indicating this information to a user. The user may then be asked to license and procure a new version of the software. Software version control can be used to prevent version collision, and to force users to stop using expired software versions by simply disabling them.
- Another aspect of the invention is license system version control. By monitoring and controlling the version of the license system that is operating, a common denominator between client and agent communications can be maintained. Alternatively, in the event that different versions are allowed, appropriate translations of data fields can be made to ensure the different versions can still communicate. In a preferred embodiment, a given client can only communicate with an agent of the same or newer version. Licensing system version control also permits modifications to be made to improve, enhance, or entirely change an encryption schemes used by the licensing system.
- The present invention also can be used to maintain a software use billing system for use with commercial client applications. A billing system in accordance with the invention can use client application and feature use information from the audit system. The audit system information can be translated into billing statements. Consequently, a commercial client can optionally be billed only for what they have used, rather than a set up-front, annual, or monthly amount.
- Most computers sold today have pre-installed modems. Individual desktop machines operating in a DOS, Windows, OS/2, or like environment, can utilize their pre-installed, or aftermarket modems to initiate communications with an upstream agent or license server. Most commercial computers are designed for incorporation into network settings. Commercial computing systems, such as workstations, may operate in a UNIX environment. The UNIX environment is well suited to operation in accordance with the invention. Most UNIX workstations are furnished with network cards permitting them to be network connected. Such networked computers thus have ready direct access to Internet or gateway nodes through which a license server or licensing module can be accessed.
- The particular connectivity associated with a system incorporating the invention is not critical. For example, a desktop machine can contain an Ethernet network card, ISDN connection card, Internet card, conventional modem, terminal adapter, or like device, with which to gain access to and communicate with a license server or licensing module. Any accepted form of connection between two more computers can be used. A communications protocol in an Internet environment is based on a TCP/IP protocol, or a derivative thereof. However use of other communication protocols such as IPX/SPX (NOVEL), or like protocols, also are suitable for facilitation of communication in the present invention.
- When using the Internet, the medium through which to check license validity, preferred embodiments of systems according to the invention operate using a TCP (Transfer Control Protocol) mechanism rather than a UDP (Universal Datagram Protocol) mechanism. In a TCP communication, a connection is first formed before any information is transferred. That is, an interactive two-way session is established. In a UDP communication, a message is sent without forming a connection. The message is routed in accordance with its destination address information. The message's receipt is not guaranteed. More importantly, response time to a messages sent by UDP is unknown. More specifically, if heavy network traffic is present, a UDP-based message may be delayed. Consequently, there can be an unacceptable delay in enabling a client application. Using a TCP messaging format guarantees a response, even if that response indicates that a connection cannot be made. A decision can be made whether to re-attempt communication immediately or at a later time. A TCP connection also is more secure because data is not being cast into the network without guarantee of receipt, as is the case with UDP communications.
- One scenario where UDP communication can be utilized is in an audit system incorporating the invention. A client application can generate and send a UDP message when it is initially brought up, or whenever a computer upon which the client application is loaded is attached to a public network.
- In a non-connected or portable computer, such as a laptop, an exemplary licensing system in accordance with the invention can involve running an internal licensing module, or an agent component thereof, on the laptop computer itself. An exemplary embodiment of such an arrangement is depicted in
FIG. 7 . Theagent component 706 of thelicensing module 702 acts on behalf of alicense server 712 during the periods that theportable computer 700 is out of communication with thelicense server 712. Theagent component 706 can receive and respond to license validity inquiries generated by aclient module 704 onsoftware application 705 that is loaded on the portable 700 while the portable 700 is in transit. Audits of client application use can be stored in thecache 708 of thelicensing module 702. When the portable 700 is re-connected to a network access point, such as anInternet 716 gateway, theclient component 710 of thelicensing module 702 can establish communication with theagent module 714 in thelicense server 712 to refresh the information in itscache component 708 and/or supply any audit data upstream. If the user has not connected the laptop to a network access point for a prolonged period of time, the user can be prompted accordingly. This can be done pursuant to the expiration of a timer. - Systems not having network, or Internet access, can still be enabled in an automated, albeit semi-manual fashion. The licensing module in a software package to run on a non-networked machine can contain a tag indicating this fact. The user may be prompted to call a number and receive recorded information for enabling the software. This information, of course, requires initial manual entry to enable the software, and periodic manual entry to validate the software. The validation check can be performed by prompting a user to call a number to automatically receive further enablement instructions. Such instructions are only provided if the license remains valid. Optionally, instructions can be automatically be returned by fax in response to a validation request phone call.
- A licensing module can be operated as a proxy agent on a firewall separating a protected computer from a public network to which the computer is attached. Such a firewall proxy agent can operate in accordance with the system disclosed in the U.S. patent application Ser. No. (BDSM Attorney Docket No. 025553-013), entitled: “Firewall System For Protecting Network Elements Connected To A Public Network,” by Coley and Wesinger, filed on Feb. 6, 1996, and incorporated herein by reference in its entirety. The foregoing application describes a system for preventing unauthorized access to network elements protected by a firewall. The firewall operates by maintaining a plurality of proxy agents that are assigned to verify and connect any incoming access requests. A proxy agent is usually assigned based on the port number associated with an incoming access request. In the present case, however, a proxy agent for validating a license is assigned for a request originating from a desktop machine that resides behind the firewall (i.e., is protected by the firewall). Hence, the proxy agent acts as licensing module performing all of the previously described tasks associated with licensing modules. For example, a proxy agent licensing module can receive and forward a license validity inquiry request message from a client application residing on a protected computer. The proxy agent also acts on behalf of the responding agent to accept a inquiry response message and then pass the response back to the protected computer on behalf of the responding agent. The proxy agent also can facilitate periodic updates of a cache component maintained therein. The proxy agent is the only IP address visible outside of the firewall. The foregoing system protects the identity of the client application computer because the proxy agent acts on behalf of the computer when communicating with the outside world.
- In an exemplary commercial embodiment, the present invention can take the form of a software package comprised of floppy disks, a CD-ROM, or even a downloadable package. The software package may consist of a library of object modules that can be selected, as needed, by a software applications designer. The designer may select various object modules from the library for insertion into a pre-compiled version of a software application. The entire software application, including the selected object modules, are compiled to create a single executable client application. The selection of insertion points and frequency is left to the discretion of the designer. Validation check watchdog timers can be distributed throughout a software application. Validation checks can be inserted to correspond to various interrupts, or procedure calls within the software application (e.g., printing, saving). An opening routine in the software application can be selected for insertion of an initial license validation or enablement check.
- Because the present invention involves the operation of computing systems, an exemplary embodiment of the invention can take the form of a medium for controlling such computing systems. Hence, the invention can be embodied in the form of an article of manufacture as a machine readable medium such as floppy disk, computer tape, hard drive disk, CD ROM, RAM, or any other suitable memory medium. The invention can also be embodied in a form that can be accessed and retrieved over a public network, such as the Internet, and downloaded onto a machine readable memory medium. Embodied as such, the memory medium contains computer readable program code which causes one or more computing systems upon which the licensing system is running to function or carry out processes in accordance with the present invention.
- The invention has been described with respect to several exemplary embodiments. However, one skilled in the art will readily appreciate and recognize that the licensing system or method of operation in accordance with the invention can be applied in any computing system using licensed software, which systems are preferably attachable to a public network, such as the Internet. The invention provides the benefit of being able to freely distribute licensed software incorporating the invention with reduced apprehension of the software being illicitly copied or used without its being properly licensed. Alternatively, a system in accordance with the invention can be used to track and maintain records of the proliferation and use of software incorporating the invention.
- The invention has been described with reference to particular embodiments. However, it will be readily apparent to those skilled in the art that it is possible to embody the invention in specific forms other than those of the embodiments described above. Embodiment of the invention in ways not specifically described may be done without departing from the spirit of the invention.
- Therefore, the preferred embodiments described herein are merely illustrative and should not be considered restrictive in any way.
- The scope of the invention is given by the appended claims, rather than by the preceding description, and all variations and equivalents which fall within the range of the claims are intended to be embraced therein.
Claims (5)
1. A computer for operating distributed software comprising:
a computer for operating distributed software, the distributed software having licensing system code inserted therein including a client module associated with the distributed software;
the computer being configured to:
form a connection to a license server over an IP-compliant network responsive to detection by the client module of use of the distributed software on the computer;
direct said computer to Web site associated with the distributed software; and
wherein the Web site prompts the user to either purchase the distributed software or evaluate the distributed software for a demonstration period.
2. The computer of claim 1 , wherein said computer is further configured to receiving a validation from said license server over said connection responsive to an election to either purchase or evaluate said distributed software and operate said client software application in accordance with the contents of said validation.
3. The computer of claim 1 , wherein said computer is further configured to selectively enable features of said distributed software.
4. The computer of claim 3 , wherein said computer is further configured to prompt a user to enter credit card information responsive to a request to enable a selected feature of said distributed software.
5. The computer of claim 1 , wherein said computer is further configured to monitor the use of said distributed software and billing the user according to those features used.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/323,846 US20060106733A1 (en) | 1996-02-26 | 2005-12-29 | Computer for operating distributed software |
Applications Claiming Priority (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US08/607,081 US5790664A (en) | 1996-02-26 | 1996-02-26 | Automated system for management of licensed software |
US09/128,652 US20010011253A1 (en) | 1998-08-04 | 1998-08-04 | Automated system for management of licensed software |
US10/079,221 US20020161718A1 (en) | 1998-08-04 | 2002-02-19 | Automated system for management of licensed software |
US11/109,972 US20050251489A1 (en) | 1996-02-26 | 2005-04-19 | Method for evaluating software freely distributed over the internet |
US11/323,846 US20060106733A1 (en) | 1996-02-26 | 2005-12-29 | Computer for operating distributed software |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/109,972 Division US20050251489A1 (en) | 1996-02-26 | 2005-04-19 | Method for evaluating software freely distributed over the internet |
Publications (1)
Publication Number | Publication Date |
---|---|
US20060106733A1 true US20060106733A1 (en) | 2006-05-18 |
Family
ID=22436337
Family Applications (22)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/128,652 Abandoned US20010011253A1 (en) | 1996-02-26 | 1998-08-04 | Automated system for management of licensed software |
US10/079,221 Abandoned US20020161718A1 (en) | 1996-02-26 | 2002-02-19 | Automated system for management of licensed software |
US11/109,973 Abandoned US20050251490A1 (en) | 1996-02-26 | 2005-04-19 | Method for determining whether a client software application is licensed |
US11/109,972 Abandoned US20050251489A1 (en) | 1996-02-26 | 2005-04-19 | Method for evaluating software freely distributed over the internet |
US11/113,360 Abandoned US20050273436A1 (en) | 1996-02-26 | 2005-04-21 | Method for determining by a license server whether a client software application is licensed |
US11/113,313 Abandoned US20050273435A1 (en) | 1996-02-26 | 2005-04-22 | Firewall for licensing protected software on a computer |
US11/119,373 Abandoned US20050273437A1 (en) | 1996-02-26 | 2005-04-29 | Method for synchronous encryption between a client and a licensing agent |
US11/148,005 Abandoned US20050289074A1 (en) | 1996-02-26 | 2005-06-07 | System for updating a licensing cache memory |
US11/297,206 Abandoned US20060085355A1 (en) | 1996-02-26 | 2005-12-07 | Downloadable software package incorporating license management software |
US11/297,208 Abandoned US20060085356A1 (en) | 1996-02-26 | 2005-12-07 | Method for purchasing a software license over a public network |
US11/321,835 Abandoned US20060106731A1 (en) | 1996-02-26 | 2005-12-28 | Regional network licensing system |
US11/321,845 Abandoned US20060136343A1 (en) | 1996-02-26 | 2005-12-28 | Commercial network licensing system |
US11/321,844 Abandoned US20060122941A1 (en) | 1996-02-26 | 2005-12-28 | Licensing system using a firewall gateway for protecting and licensing computers |
US11/321,843 Abandoned US20060106732A1 (en) | 1996-02-26 | 2005-12-28 | Network licensing system for portable computers |
US11/321,834 Abandoned US20060106730A1 (en) | 1996-02-26 | 2005-12-28 | Retro-fitted network licensing system |
US11/321,788 Abandoned US20060122940A1 (en) | 1996-02-26 | 2005-12-28 | Regional network licensing system |
US11/323,846 Abandoned US20060106733A1 (en) | 1996-02-26 | 2005-12-29 | Computer for operating distributed software |
US11/621,701 Abandoned US20070112684A1 (en) | 1996-02-26 | 2007-01-10 | Method for determining by a license server whether a client software application is licensed |
US11/621,734 Expired - Fee Related US8510226B2 (en) | 1996-02-26 | 2007-01-10 | Method for synchronous encryption between a client and a licensing agent |
US11/623,895 Abandoned US20070130081A1 (en) | 1996-02-26 | 2007-01-17 | Downloadable software package incorporating license management software |
US11/624,131 Abandoned US20070130082A1 (en) | 1996-02-26 | 2007-01-17 | Licensing system using a firewall gateway for protecting and licensing computers |
US13/857,086 Abandoned US20130227282A1 (en) | 1996-02-26 | 2013-04-04 | Method for synchronous encryption between a client and a licensing agent |
Family Applications Before (16)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US09/128,652 Abandoned US20010011253A1 (en) | 1996-02-26 | 1998-08-04 | Automated system for management of licensed software |
US10/079,221 Abandoned US20020161718A1 (en) | 1996-02-26 | 2002-02-19 | Automated system for management of licensed software |
US11/109,973 Abandoned US20050251490A1 (en) | 1996-02-26 | 2005-04-19 | Method for determining whether a client software application is licensed |
US11/109,972 Abandoned US20050251489A1 (en) | 1996-02-26 | 2005-04-19 | Method for evaluating software freely distributed over the internet |
US11/113,360 Abandoned US20050273436A1 (en) | 1996-02-26 | 2005-04-21 | Method for determining by a license server whether a client software application is licensed |
US11/113,313 Abandoned US20050273435A1 (en) | 1996-02-26 | 2005-04-22 | Firewall for licensing protected software on a computer |
US11/119,373 Abandoned US20050273437A1 (en) | 1996-02-26 | 2005-04-29 | Method for synchronous encryption between a client and a licensing agent |
US11/148,005 Abandoned US20050289074A1 (en) | 1996-02-26 | 2005-06-07 | System for updating a licensing cache memory |
US11/297,206 Abandoned US20060085355A1 (en) | 1996-02-26 | 2005-12-07 | Downloadable software package incorporating license management software |
US11/297,208 Abandoned US20060085356A1 (en) | 1996-02-26 | 2005-12-07 | Method for purchasing a software license over a public network |
US11/321,835 Abandoned US20060106731A1 (en) | 1996-02-26 | 2005-12-28 | Regional network licensing system |
US11/321,845 Abandoned US20060136343A1 (en) | 1996-02-26 | 2005-12-28 | Commercial network licensing system |
US11/321,844 Abandoned US20060122941A1 (en) | 1996-02-26 | 2005-12-28 | Licensing system using a firewall gateway for protecting and licensing computers |
US11/321,843 Abandoned US20060106732A1 (en) | 1996-02-26 | 2005-12-28 | Network licensing system for portable computers |
US11/321,834 Abandoned US20060106730A1 (en) | 1996-02-26 | 2005-12-28 | Retro-fitted network licensing system |
US11/321,788 Abandoned US20060122940A1 (en) | 1996-02-26 | 2005-12-28 | Regional network licensing system |
Family Applications After (5)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/621,701 Abandoned US20070112684A1 (en) | 1996-02-26 | 2007-01-10 | Method for determining by a license server whether a client software application is licensed |
US11/621,734 Expired - Fee Related US8510226B2 (en) | 1996-02-26 | 2007-01-10 | Method for synchronous encryption between a client and a licensing agent |
US11/623,895 Abandoned US20070130081A1 (en) | 1996-02-26 | 2007-01-17 | Downloadable software package incorporating license management software |
US11/624,131 Abandoned US20070130082A1 (en) | 1996-02-26 | 2007-01-17 | Licensing system using a firewall gateway for protecting and licensing computers |
US13/857,086 Abandoned US20130227282A1 (en) | 1996-02-26 | 2013-04-04 | Method for synchronous encryption between a client and a licensing agent |
Country Status (1)
Country | Link |
---|---|
US (22) | US20010011253A1 (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20020161718A1 (en) * | 1998-08-04 | 2002-10-31 | Coley Christopher D. | Automated system for management of licensed software |
US20050107898A1 (en) * | 2003-10-31 | 2005-05-19 | Gannon Julie A. | Software enhabled attachments |
US20060020555A1 (en) * | 2004-07-26 | 2006-01-26 | Septon Daven W | Monitoring a license proxy |
US20070299779A1 (en) * | 2006-06-27 | 2007-12-27 | Edmund Yu Liang Sung | Method and apparatus for authorizing a software product to be used on a computer system |
US20080027742A1 (en) * | 2006-07-27 | 2008-01-31 | Canon Kabushiki Kaisha | Information processing method, information processing apparatus, computer program and storage medium |
US20080270310A1 (en) * | 2006-06-27 | 2008-10-30 | Intuit Inc. | Facilitating dynamic configuration of software products |
US20090119218A1 (en) * | 2007-11-01 | 2009-05-07 | Nec Infrontia Corporation | License management apparatus, license management method, and license authentication program |
Families Citing this family (294)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5898830A (en) * | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
US6480486B2 (en) * | 1997-05-21 | 2002-11-12 | Lextron Systems, Inc. | Micro-localized internet service center |
US7257554B1 (en) | 1999-03-19 | 2007-08-14 | Hewlett-Packard Development Company, L.P. | Anonymous purchases while allowing verifiable identities for refunds returned along the paths taken to make the purchases |
US6453305B1 (en) * | 1999-05-21 | 2002-09-17 | Compaq Computer Corporation | Method and system for enforcing licenses on an open network |
US6968384B1 (en) * | 1999-09-03 | 2005-11-22 | Safenet, Inc. | License management system and method for commuter licensing |
DE19950249C1 (en) * | 1999-10-18 | 2001-02-01 | Siemens Ag | Electronic device with software protection for runtime software for automated systems |
US6832230B1 (en) | 1999-12-22 | 2004-12-14 | Nokia Corporation | Apparatus and associated method for downloading an application with a variable lifetime to a mobile terminal |
KR100847596B1 (en) * | 2000-03-02 | 2008-07-21 | 소니 가부시끼 가이샤 | Communication network system, gateway, data communication method and program providing medium |
CA2403270C (en) * | 2000-03-14 | 2011-05-17 | Joseph Robert Marchese | Digital video system using networked cameras |
US7143142B1 (en) * | 2000-05-15 | 2006-11-28 | Ricoh Co., Ltd. | Method and apparatus for appliance host supported network-based application delivery |
US20020107809A1 (en) * | 2000-06-02 | 2002-08-08 | Biddle John Denton | System and method for licensing management |
EP1287474B1 (en) * | 2000-06-05 | 2016-02-03 | Sealedmedia Limited | Digital rights management |
US7024696B1 (en) | 2000-06-14 | 2006-04-04 | Reuben Bahar | Method and system for prevention of piracy of a given software application via a communications network |
US20040073617A1 (en) | 2000-06-19 | 2004-04-15 | Milliken Walter Clark | Hash-based systems and methods for detecting and preventing transmission of unwanted e-mail |
US7063253B1 (en) | 2000-09-27 | 2006-06-20 | Diebold SCLF-Service Systems division of Diebold, Incorporated | Cash dispensing automated banking machine software authorization system and method |
US20020116340A1 (en) * | 2000-10-25 | 2002-08-22 | Isogon Corp. | Method and system for retrieving data from the XSLM license manager |
US20020082717A1 (en) * | 2000-10-31 | 2002-06-27 | Isogon Corporation | Method and system for centralizing and harmonizing the operations of plural software license managers |
US7231360B2 (en) * | 2000-11-22 | 2007-06-12 | Sy Bon K | Time-based software licensing approach |
WO2002050673A2 (en) * | 2000-12-21 | 2002-06-27 | Nokia Corporation | Improvements in and relating to communication terminals |
JP2004530185A (en) * | 2001-02-01 | 2004-09-30 | エイビーエヌ アムロ サービスィズ カンパニー,インコーポレイテッド | System and method for automatic licensing equipment |
US7281263B1 (en) * | 2001-02-23 | 2007-10-09 | Sprint Communications Company L.P. | System and method for managing security access for users to network systems |
US9633182B2 (en) * | 2001-05-15 | 2017-04-25 | Altair Engineering, Inc. | Token based digital content licensing method |
US20020188736A1 (en) * | 2001-06-11 | 2002-12-12 | Nokia Corporation | System and method for controlling terminal application usage through subscriber-application association |
US7546359B2 (en) * | 2001-10-24 | 2009-06-09 | Groove Networks, Inc. | Method and apparatus for managing a peer-to-peer collaboration system |
US7747655B2 (en) | 2001-11-19 | 2010-06-29 | Ricoh Co. Ltd. | Printable representations for time-based media |
US7788080B2 (en) | 2001-11-19 | 2010-08-31 | Ricoh Company, Ltd. | Paper interface for simulation environments |
US7149957B2 (en) | 2001-11-19 | 2006-12-12 | Ricoh Company, Ltd. | Techniques for retrieving multimedia information using a paper-based interface |
US7743347B2 (en) | 2001-11-19 | 2010-06-22 | Ricoh Company, Ltd. | Paper-based interface for specifying ranges |
US7703044B2 (en) | 2001-11-19 | 2010-04-20 | Ricoh Company, Ltd. | Techniques for generating a static representation for time-based media information |
US7861169B2 (en) | 2001-11-19 | 2010-12-28 | Ricoh Co. Ltd. | Multimedia print driver dialog interfaces |
US8539344B2 (en) * | 2001-11-19 | 2013-09-17 | Ricoh Company, Ltd. | Paper-based interface for multimedia information stored by multiple multimedia documents |
US6832358B2 (en) * | 2001-12-19 | 2004-12-14 | Cadence Design Systems, Inc. | System and method for providing burst licensing in a circuit simulation environment |
US20050144175A1 (en) * | 2002-02-18 | 2005-06-30 | Siemens Aktiengesellschaft | Method and system for administrating use of a service |
JP3785640B2 (en) * | 2002-02-25 | 2006-06-14 | ソニー株式会社 | Service providing apparatus and service providing method |
US7707115B2 (en) * | 2002-07-25 | 2010-04-27 | Avaya Inc. | Periodic software licensing system |
DE10238546A1 (en) * | 2002-08-22 | 2004-03-11 | Siemens Ag | Process for the provision of resources in communication networks |
ATE348465T1 (en) * | 2002-10-22 | 2007-01-15 | Hewlett Packard Co | METHOD AND DEVICE FOR OPERATING A TELECOMMUNICATIONS PLATFORM |
US7395536B2 (en) * | 2002-11-14 | 2008-07-01 | Sun Microsystems, Inc. | System and method for submitting and performing computational tasks in a distributed heterogeneous networked environment |
US6859793B1 (en) | 2002-12-19 | 2005-02-22 | Networks Associates Technology, Inc. | Software license reporting and control system and method |
US20040128251A1 (en) * | 2002-12-31 | 2004-07-01 | Chris Adam | Apparatus, system and method for licensing |
US7562229B2 (en) * | 2003-01-23 | 2009-07-14 | Hewlett-Packard Development Company, L.P. | Codeword-based auditing of computer systems and methods therefor |
US7373497B2 (en) * | 2003-01-23 | 2008-05-13 | Hewlett-Packard Development Company, L.P. | Methods and apparatus for rapidly activating previously inactive components in a computer system |
JP4343542B2 (en) * | 2003-01-30 | 2009-10-14 | ソニー株式会社 | Information processing system, information processing apparatus, information processing method, program, and recording medium |
US7644442B2 (en) * | 2003-01-31 | 2010-01-05 | Microsoft Corporation | Systems and methods for using machine attributes to deter software piracy in an enterprise environment |
US8181265B2 (en) * | 2003-01-31 | 2012-05-15 | Microsoft Corporation | Secure machine counting |
US20050004873A1 (en) * | 2003-02-03 | 2005-01-06 | Robin Pou | Distribution and rights management of digital content |
US7627902B1 (en) * | 2003-02-20 | 2009-12-01 | Dell Marketing Usa, L.P. | Method of managing a software item on a managed computer system |
US7370212B2 (en) | 2003-02-25 | 2008-05-06 | Microsoft Corporation | Issuing a publisher use license off-line in a digital rights management (DRM) system |
CN1754371A (en) * | 2003-02-28 | 2006-03-29 | 松下电器产业株式会社 | Content utilization result collection system |
EP1636711B1 (en) * | 2003-06-06 | 2018-04-25 | CA, Inc. | System and method for distribution of software licenses in a networked computing environment |
US20040255289A1 (en) * | 2003-06-11 | 2004-12-16 | Citycites.Com Corp. | Remote access software solution for rapidly deploying a desktop |
US20050044546A1 (en) * | 2003-07-03 | 2005-02-24 | Euroform A/S | Method of allowing printing from a network attached device |
EP1494102A1 (en) * | 2003-07-03 | 2005-01-05 | EuroForm A/S | A method of allowing printing from a network attached device |
US8452153B2 (en) * | 2003-07-11 | 2013-05-28 | Ricoh Company, Ltd. | Associating pre-generated barcodes with temporal events |
US20050028153A1 (en) * | 2003-07-31 | 2005-02-03 | Anderson Glen J. | Method and system for replacing fee-based software |
US20050027657A1 (en) * | 2003-08-01 | 2005-02-03 | Yuri Leontiev | Distinguishing legitimate hardware upgrades from unauthorized installations of software on additional computers |
US7685428B2 (en) * | 2003-08-14 | 2010-03-23 | Ricoh Company, Ltd. | Transmission of event markers to data stream recorder |
US8351914B2 (en) * | 2003-08-29 | 2013-01-08 | Sony Mobile Communications Ab | Method and system for registration of licensed modules in mobile devices |
US7864352B2 (en) | 2003-09-25 | 2011-01-04 | Ricoh Co. Ltd. | Printer with multimedia server |
US20050071273A1 (en) * | 2003-09-25 | 2005-03-31 | Utstarcom, Inc. | Method and Apparatus for Feature Rights Management in a Multilevel Hierarchy |
US8077341B2 (en) | 2003-09-25 | 2011-12-13 | Ricoh Co., Ltd. | Printer with audio or video receiver, recorder, and real-time content-based processing logic |
JP2005108230A (en) | 2003-09-25 | 2005-04-21 | Ricoh Co Ltd | Printing system with embedded audio/video content recognition and processing function |
US20050071274A1 (en) * | 2003-09-27 | 2005-03-31 | Utstarcom, Inc. | Method and Apparatus in a Digital Rights Client and a Digital Rights Source and associated Digital Rights Key |
US7266815B2 (en) * | 2003-09-29 | 2007-09-04 | International Business Machines Corporation | Automated control of a licensed internal code update on a storage controller |
US7392420B2 (en) * | 2003-09-29 | 2008-06-24 | International Business Machines Corporation | Automated error recovery of a licensed internal code update on a storage controller |
US10437964B2 (en) * | 2003-10-24 | 2019-10-08 | Microsoft Technology Licensing, Llc | Programming interface for licensing |
JP2005141683A (en) * | 2003-11-10 | 2005-06-02 | Sony Corp | Content use management system, content reproducing apparatus, content use management method, content reproduction method, and computer program |
US20050114265A1 (en) * | 2003-11-26 | 2005-05-26 | Lingan Satkunanathan | Real-time license enforcement system and method |
US20050114266A1 (en) * | 2003-11-26 | 2005-05-26 | Lingan Satkunanathan | System and method for managing licenses using interactive wizards |
US20050132347A1 (en) * | 2003-12-15 | 2005-06-16 | Harper Eric D. | System for controlling the use of a software application on a plurality of computers |
US9286445B2 (en) * | 2003-12-18 | 2016-03-15 | Red Hat, Inc. | Rights management system |
ATE363169T1 (en) * | 2003-12-22 | 2007-06-15 | Ibm | METHOD OF USE AND SYSTEM IN A COMMUNICATIONS NETWORK |
JP4726805B2 (en) * | 2004-02-03 | 2011-07-20 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Digital rights management |
US8274666B2 (en) | 2004-03-30 | 2012-09-25 | Ricoh Co., Ltd. | Projector/printer for displaying or printing of documents |
US20060059561A1 (en) * | 2004-04-14 | 2006-03-16 | Digital River, Inc. | Electronic storefront that limits download of software wrappers based on geographic location |
US20070248036A1 (en) * | 2004-04-15 | 2007-10-25 | Nokia Corporation | Method and Device for Restricted Execution of Applications on a Mobile Terminal |
US8060923B2 (en) * | 2004-04-23 | 2011-11-15 | Microsoft Corporation | Trusted license removal in a content protection system or the like |
US20050278258A1 (en) * | 2004-06-14 | 2005-12-15 | O'donnell Michael | User software for facilitating copyright licensing and compliance |
JP2006004072A (en) * | 2004-06-16 | 2006-01-05 | Sony Corp | License evaluation device, license evaluation method, and computer program therefor |
US7681241B2 (en) * | 2004-06-18 | 2010-03-16 | Red Hat, Inc. | Apparatus and method for managing digital rights with arbitration |
EP1621956B1 (en) * | 2004-07-30 | 2017-05-31 | Irdeto B.V. | Method of providing rights data objects |
EP1802742A2 (en) * | 2004-08-30 | 2007-07-04 | IKEN Tissue Therapeutics, Inc. | Compositions and methods of promoting hair growth |
US8781973B1 (en) * | 2004-09-24 | 2014-07-15 | Bank Of America Corporation | Event marketing automated system |
JP4725070B2 (en) * | 2004-10-13 | 2011-07-13 | パナソニック株式会社 | Regular content confirmation method, content transmission / reception system, transmitter, and receiver |
US20060117020A1 (en) * | 2004-12-01 | 2006-06-01 | John Toebes | Arrangement for selecting a server to provide distributed services from among multiple servers based on a location of a client device |
WO2006074035A2 (en) * | 2004-12-30 | 2006-07-13 | Abb Ab | Software licensing system |
US8438645B2 (en) * | 2005-04-27 | 2013-05-07 | Microsoft Corporation | Secure clock with grace periods |
US9547708B2 (en) * | 2005-04-01 | 2017-01-17 | Schlumberger Technology Corporation | Method and system for database licensing |
US8725646B2 (en) | 2005-04-15 | 2014-05-13 | Microsoft Corporation | Output protection levels |
US20060265758A1 (en) | 2005-05-20 | 2006-11-23 | Microsoft Corporation | Extensible media rights |
US20060282393A1 (en) * | 2005-06-13 | 2006-12-14 | Sladek Marjorie B | Systems and methods for providing access to product license information |
US20060294019A1 (en) * | 2005-06-22 | 2006-12-28 | Lenovo (Singapore) Pte. Ltd. | On demand business model to reuse software license |
EP1894078A1 (en) * | 2005-06-23 | 2008-03-05 | Thomson Licensing | Digital rights management (drm) enabled portable playback device, method and system |
US20070027815A1 (en) * | 2005-07-29 | 2007-02-01 | Symantec Corporation | Systems and methods for centralized subscription and license management in a small networking environment |
CA2554847C (en) * | 2005-08-08 | 2014-02-04 | Raymond C. Senez, Jr. | System and method for secure electronic data delivery |
US8087092B2 (en) * | 2005-09-02 | 2011-12-27 | Uniloc Usa, Inc. | Method and apparatus for detection of tampering attacks |
US7890569B1 (en) * | 2005-09-29 | 2011-02-15 | Symantec Corporation | Tracking time usage on a disconnected client over a period of time |
US8745223B2 (en) * | 2005-10-14 | 2014-06-03 | Psion Inc. | System and method of distributed license management |
US20070112683A1 (en) * | 2005-11-16 | 2007-05-17 | Cisco Technology, Inc. | Method and system for extending access to a product |
US20070136342A1 (en) * | 2005-12-13 | 2007-06-14 | Sap Ag | Processing a user inquiry |
US7752139B2 (en) * | 2005-12-27 | 2010-07-06 | Michael Noel Hu | Method and system for managing software licenses and reducing unauthorized use of software |
US8111883B2 (en) * | 2006-01-05 | 2012-02-07 | Siemens Medical Solutions Usa, Inc. | System and method for per-patient licensing of interventional imaging software |
US7818261B2 (en) | 2006-01-18 | 2010-10-19 | Corbis Corporation | Method and system for managing licenses to content |
KR100757845B1 (en) * | 2006-02-13 | 2007-09-11 | (주)잉카엔트웍스 | Method of providing license response to encrypted contents to client apparatus and digital rights management conversion system of enabling the method |
US9654456B2 (en) * | 2006-02-16 | 2017-05-16 | Oracle International Corporation | Service level digital rights management support in a multi-content aggregation and delivery system |
US8458789B1 (en) | 2006-03-09 | 2013-06-04 | Mcafee, Inc. | System, method and computer program product for identifying unwanted code associated with network communications |
US9082113B2 (en) * | 2006-03-17 | 2015-07-14 | Wildtangent, Inc. | Licensing media consumption using digital currency |
US9166883B2 (en) | 2006-04-05 | 2015-10-20 | Joseph Robert Marchese | Network device detection, identification, and management |
EP1939786A4 (en) * | 2006-04-05 | 2010-04-07 | Faith Inc | Content providing system |
US20070244825A1 (en) * | 2006-04-14 | 2007-10-18 | Gilbert Semmer | Item, accessory kit, and method for software based medical resource activation |
US20080005787A1 (en) * | 2006-06-28 | 2008-01-03 | Siemens Medical Solutions Usa, Inc. | Software Distribution and License Management System |
US7849017B2 (en) * | 2006-06-29 | 2010-12-07 | Flexera Software, Inc. | Enforced seat-based licensing |
US7836495B2 (en) * | 2006-07-28 | 2010-11-16 | Microsoft Corporation | Remote configuration of software component using proxy |
US8984652B2 (en) * | 2006-07-28 | 2015-03-17 | Sony Corporation | Transfer of digital rights management information |
JP2008033751A (en) * | 2006-07-31 | 2008-02-14 | Ziosoft Inc | Update method and update system |
US8826449B2 (en) * | 2007-09-27 | 2014-09-02 | Protegrity Corporation | Data security in a disconnected environment |
US7840490B1 (en) | 2006-08-30 | 2010-11-23 | United Services Automobile Association (Usaa) | Comprehensive software licensing management system |
US8284929B2 (en) | 2006-09-14 | 2012-10-09 | Uniloc Luxembourg S.A. | System of dependant keys across multiple pieces of related scrambled information |
US8224930B2 (en) * | 2006-09-19 | 2012-07-17 | The Invention Science Fund I, Llc | Signaling partial service configuration changes in appnets |
WO2008039958A2 (en) * | 2006-09-27 | 2008-04-03 | Bright Hub, Inc. | Software development and sales life-cycle services |
US8255374B2 (en) | 2006-10-02 | 2012-08-28 | Salesforce.Com, Inc. | Method and system for selecting amongst a plurality of processes to send a message |
US20080147227A1 (en) * | 2006-10-31 | 2008-06-19 | Delaney William P | Systems and methods for improved product variant configuration and distribution in hub-based distribution |
US20080114695A1 (en) | 2006-11-10 | 2008-05-15 | Semantic Components S.L. | Process for implementing a method for the on-line sale of software product use licenses through a data network, and software component which allows carrying out said process |
US20100250400A1 (en) * | 2006-11-10 | 2010-09-30 | Media Patents, S.L. | Apparatus and methods for the sale of software products |
US20080115197A1 (en) * | 2006-11-14 | 2008-05-15 | Barrie Jon Moss | System and apparatus for digital rights management of content and accessibility at various locations and devices |
US20080141378A1 (en) * | 2006-12-12 | 2008-06-12 | Mclean Ivan Hugh | Method and apparatus for creating licenses in a mobile digital rights management network |
US20080147530A1 (en) | 2006-12-19 | 2008-06-19 | Kwan Shu-Leung | Programmatically transferring applications between handsets based on license information |
US20080189400A1 (en) * | 2007-02-01 | 2008-08-07 | Microsoft Corporation | Measuring Client Access Licenses |
EP1965330A3 (en) * | 2007-02-28 | 2010-02-10 | Ricoh Company, Ltd. | Information processing system, information processor, image forming apparatus, and information processing method |
EP2140605A1 (en) * | 2007-03-20 | 2010-01-06 | Dmvich Software, Llc | Secure electronic messaging system requiring key retrieval for deriving decryption key |
US8127367B2 (en) * | 2007-03-20 | 2012-02-28 | Dmvich Software, Llc | Refreshing software licenses |
CN100464527C (en) * | 2007-04-16 | 2009-02-25 | 华为技术有限公司 | Communication system, Communication apparatus and capability control method |
KR101560131B1 (en) * | 2007-05-18 | 2015-10-26 | 베리메트릭스 인코퍼레이티드 | System and method for defining programmable processing steps applied when protecting the data |
US20080306786A1 (en) * | 2007-06-05 | 2008-12-11 | Lonowski Wayne J | License management tool to monitor and analyze license usage to determine need for additional licenses |
US20080313743A1 (en) * | 2007-06-13 | 2008-12-18 | Brian Chan | Network Software License Management and Piracy Protection |
US7908662B2 (en) * | 2007-06-21 | 2011-03-15 | Uniloc U.S.A., Inc. | System and method for auditing software usage |
US10452820B2 (en) * | 2007-06-26 | 2019-10-22 | International Business Machines Corporation | Thread-based software license management |
US10496799B1 (en) * | 2007-07-24 | 2019-12-03 | United Services Automobile Association (Usaa) | Automated registration and licensing tool |
US7917605B1 (en) | 2007-07-24 | 2011-03-29 | United Services Automobile Association (Usaa) | Automated registration and licensing tool |
WO2009018228A1 (en) * | 2007-07-27 | 2009-02-05 | Digital River, Inc. | Trial optimization system and method |
US20090037287A1 (en) * | 2007-07-31 | 2009-02-05 | Ahmad Baitalmal | Software Marketplace and Distribution System |
US9147049B2 (en) * | 2007-08-16 | 2015-09-29 | Honeywell International Inc. | Embedded building conroller with stored software license information |
FR2920935B1 (en) | 2007-09-06 | 2009-12-11 | Miyowa | METHOD FOR EXCHANGING REQUESTS BETWEEN THE COMPUTER APPLICATION OF A MOBILE TERMINAL AND AN INSTANT MESSAGING SERVER |
JP2009070247A (en) * | 2007-09-14 | 2009-04-02 | Ricoh Co Ltd | Information processor, information processing method, and image processor |
US8160962B2 (en) * | 2007-09-20 | 2012-04-17 | Uniloc Luxembourg S.A. | Installing protected software product using unprotected installation image |
FR2923130A1 (en) * | 2007-10-24 | 2009-05-01 | Miyowa Sa | INSTANT MESSAGING METHOD AND SYSTEM FOR MOBILE TERMINALS EQUIPPED WITH A VIRTUAL PRESENCE SERVER FOR AUTOMATICALLY MANAGING AN INSTANT MESSAGING SESSION |
FR2923131B1 (en) * | 2007-10-24 | 2010-01-15 | Miyowa | INSTANT MESSAGING METHOD AND SYSTEM FOR MOBILE TERMINALS EQUIPPED WITH A VIRTUAL PRESENCE SERVER CONFIGURED TO MANAGE DIFFERENT LISTS OF CONTACTS OF A SAME USER |
WO2009062293A1 (en) * | 2007-11-13 | 2009-05-22 | Protecode Incorporated | System and method for capturing and certifying digital content pedigree |
WO2009065135A1 (en) | 2007-11-17 | 2009-05-22 | Uniloc Corporation | System and method for adjustable licensing of digital products |
US20110060688A1 (en) * | 2007-11-23 | 2011-03-10 | Media Patents, S.L. | Apparatus and methods for the distribution of digital files |
EP2215595B1 (en) * | 2007-11-23 | 2012-02-22 | Media Patents S.L. | A process for the on-line distribution of audiovisual contents with advertisements, advertisement management system, digital rights management system and audiovisual content player provided with said systems |
WO2009076232A1 (en) * | 2007-12-05 | 2009-06-18 | Uniloc Corporation | System and method for device bound public key infrastructure |
US20090150333A1 (en) * | 2007-12-10 | 2009-06-11 | International Business Machines Corporation | In-context collaboration tool for resource management systems |
US9141767B2 (en) * | 2007-12-14 | 2015-09-22 | International Business Machines Corporation | Software configuration based on entitlement records |
US10049190B1 (en) * | 2007-12-21 | 2018-08-14 | Symantec Corporation | Method and apparatus for remotely managing a resource at a computer |
FR2926176B1 (en) * | 2008-01-08 | 2014-10-10 | Miyowa | INFORMATION TRANSFER COMMUNICATION NETWORK BETWEEN A MOBILE TERMINAL AND SOURCE SERVERS, AND TERMINAL AND METHOD FOR MANAGING THE TRANSFER OF INFORMATION IN SUCH A NETWORK. |
US20090254553A1 (en) * | 2008-02-08 | 2009-10-08 | Corbis Corporation | Matching media for managing licenses to content |
WO2009105702A2 (en) * | 2008-02-22 | 2009-08-27 | Etchegoyen Craig S | License auditing for distributed applications |
US9690913B2 (en) * | 2008-02-25 | 2017-06-27 | International Business Machines Corporation | License management in a networked software application solution |
US8196210B2 (en) * | 2008-03-10 | 2012-06-05 | Microsoft Corporation | Software license compliance |
ES2326949B1 (en) * | 2008-03-18 | 2010-07-14 | Clarity Systems, S.L. | PROCEDURE USED BY A STREAMING SERVER TO MAKE A TRANSMISSION OF A MULTIMEDIA FILE IN A DATA NETWORK. |
US7984097B2 (en) * | 2008-03-18 | 2011-07-19 | Media Patents, S.L. | Methods for transmitting multimedia files and advertisements |
US20090254482A1 (en) * | 2008-04-07 | 2009-10-08 | Microsoft Corporation | Time-based licenses |
JP5359355B2 (en) * | 2008-05-08 | 2013-12-04 | 株式会社リコー | Device management apparatus, device management system, device management method, program, and recording medium |
US9355224B1 (en) * | 2008-05-16 | 2016-05-31 | Kaspersky Lab, Zao | System and method for dynamic adjustment of expiration date for authorization key for antivirus products |
EP2311233A1 (en) | 2008-05-21 | 2011-04-20 | Uniloc Usa, Inc. | Device and method for secured communication |
WO2009158525A2 (en) * | 2008-06-25 | 2009-12-30 | Uniloc Usa, Inc. | System and method for monitoring efficacy of online advertising |
US8538889B2 (en) * | 2008-06-25 | 2013-09-17 | Microsoft Corporation | Application hierarchy and state manipulation |
US8281382B1 (en) * | 2008-06-30 | 2012-10-02 | Amazon Technologies, Inc. | Dynamic throttling systems and services |
US20100057703A1 (en) * | 2008-08-29 | 2010-03-04 | Brandt Matthew K | Systems and Methods for Automating Software Updates/Maintenance |
JP5206263B2 (en) * | 2008-09-12 | 2013-06-12 | 株式会社リコー | Information processing apparatus, license determination method, and program |
FR2937442B1 (en) * | 2008-10-16 | 2012-07-20 | Alcatel Lucent | MONITORING THE USE OF VIRTUAL MACHINES |
US20100179982A1 (en) * | 2009-01-15 | 2010-07-15 | Miyowa | Method for auditing the data of a computer application of a terminal |
EP2396742A2 (en) * | 2009-02-10 | 2011-12-21 | Uniloc Usa, Inc. | Web content access using a client device identifier |
US20100228790A1 (en) * | 2009-03-03 | 2010-09-09 | Miyowa | Method for activating functionalities proposed in a computer terminal |
CA2697309A1 (en) * | 2009-03-18 | 2010-09-18 | Luc Bessette | Medical records system with dynamic avatar generator and avatar viewer |
US20100251352A1 (en) * | 2009-03-24 | 2010-09-30 | Snap-On Incorporated | System and method for rendering a set of program instructions as executable or non-executable |
US8959653B2 (en) * | 2009-03-31 | 2015-02-17 | Blackberry Limited | Automatic license key injection |
US20100262963A1 (en) * | 2009-04-09 | 2010-10-14 | Gary Michael Wassermann | Systems and methods for activating a network appliance |
FR2944624A1 (en) * | 2009-04-16 | 2010-10-22 | Miyowa | METHOD FOR AUTHORIZING A CONNECTION BETWEEN A COMPUTER TERMINAL AND A SOURCE SERVER |
US9154532B2 (en) | 2009-04-27 | 2015-10-06 | Zaron Remote Llc | Methods and apparatus for transmitting multimedia files in a data network |
US8103553B2 (en) * | 2009-06-06 | 2012-01-24 | Bullock Roddy Mckee | Method for making money on internet news sites and blogs |
US20100312702A1 (en) * | 2009-06-06 | 2010-12-09 | Bullock Roddy M | System and method for making money by facilitating easy online payment |
US9047450B2 (en) | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Identification of embedded system devices |
US20100325424A1 (en) * | 2009-06-19 | 2010-12-23 | Etchegoyen Craig S | System and Method for Secured Communications |
US9633183B2 (en) | 2009-06-19 | 2017-04-25 | Uniloc Luxembourg S.A. | Modular software protection |
US8423473B2 (en) | 2009-06-19 | 2013-04-16 | Uniloc Luxembourg S. A. | Systems and methods for game activation |
US20100325446A1 (en) * | 2009-06-19 | 2010-12-23 | Joseph Martin Mordetsky | Securing Executable Code Integrity Using Auto-Derivative Key |
US20100325431A1 (en) * | 2009-06-19 | 2010-12-23 | Joseph Martin Mordetsky | Feature-Specific Keys for Executable Code |
US9047458B2 (en) | 2009-06-19 | 2015-06-02 | Deviceauthority, Inc. | Network access protection |
US20100325149A1 (en) * | 2009-06-22 | 2010-12-23 | Craig Stephen Etchegoyen | System and Method for Auditing Software Usage |
US20100325200A1 (en) * | 2009-06-22 | 2010-12-23 | Craig Stephen Etchegoyen | System and Method for Software Activation Through Digital Media Fingerprinting |
US20100325051A1 (en) * | 2009-06-22 | 2010-12-23 | Craig Stephen Etchegoyen | System and Method for Piracy Reduction in Software Activation |
US20100325025A1 (en) * | 2009-06-22 | 2010-12-23 | Etchegoyen Craig S | System and Method for Sharing Media |
US8495359B2 (en) * | 2009-06-22 | 2013-07-23 | NetAuthority | System and method for securing an electronic communication |
US20100324981A1 (en) * | 2009-06-22 | 2010-12-23 | Etchegoyen Craig S | System and Method for Media Distribution on Social Networks |
US20100325735A1 (en) * | 2009-06-22 | 2010-12-23 | Etchegoyen Craig S | System and Method for Software Activation |
US8452960B2 (en) * | 2009-06-23 | 2013-05-28 | Netauthority, Inc. | System and method for content delivery |
US20100324989A1 (en) * | 2009-06-23 | 2010-12-23 | Craig Stephen Etchegoyen | System and Method for Monitoring Efficacy of Online Advertising |
US8903653B2 (en) | 2009-06-23 | 2014-12-02 | Uniloc Luxembourg S.A. | System and method for locating network nodes |
US20100325040A1 (en) * | 2009-06-23 | 2010-12-23 | Craig Stephen Etchegoyen | Device Authority for Authenticating a User of an Online Service |
US8736462B2 (en) | 2009-06-23 | 2014-05-27 | Uniloc Luxembourg, S.A. | System and method for traffic information delivery |
US10068282B2 (en) * | 2009-06-24 | 2018-09-04 | Uniloc 2017 Llc | System and method for preventing multiple online purchases |
US8239852B2 (en) * | 2009-06-24 | 2012-08-07 | Uniloc Luxembourg S.A. | Remote update of computers based on physical device recognition |
US9129097B2 (en) * | 2009-06-24 | 2015-09-08 | Uniloc Luxembourg S.A. | Systems and methods for auditing software usage using a covert key |
US20100332331A1 (en) * | 2009-06-24 | 2010-12-30 | Craig Stephen Etchegoyen | Systems and Methods for Providing an Interface for Purchasing Ad Slots in an Executable Program |
US9075958B2 (en) * | 2009-06-24 | 2015-07-07 | Uniloc Luxembourg S.A. | Use of fingerprint with an on-line or networked auction |
US8213907B2 (en) * | 2009-07-08 | 2012-07-03 | Uniloc Luxembourg S. A. | System and method for secured mobile communication |
US9141489B2 (en) * | 2009-07-09 | 2015-09-22 | Uniloc Luxembourg S.A. | Failover procedure for server system |
WO2011014569A1 (en) * | 2009-07-28 | 2011-02-03 | Etxtbk, Llc | Systems and methods for distributing electronic content |
KR101601976B1 (en) * | 2009-08-18 | 2016-03-17 | 삼성전자주식회사 | System and method for managing digital rights management content |
US8171565B2 (en) * | 2009-08-18 | 2012-05-01 | Condel International Technologies Inc. | Systems and methods for locally generating license and activating DRM agent |
US9727842B2 (en) * | 2009-08-21 | 2017-08-08 | International Business Machines Corporation | Determining entity relevance by relationships to other relevant entities |
US20110061047A1 (en) * | 2009-09-04 | 2011-03-10 | Alcatel Lucent | Licensing Software and Licensing Propagation Mechanism for Embedded Systems in Chassis and Stacked Environments |
JP5428685B2 (en) | 2009-09-11 | 2014-02-26 | 株式会社リコー | License introduction support device, license introduction support method, and license introduction support program |
US8850607B2 (en) | 2009-09-22 | 2014-09-30 | Flexera Software Llc | System and method for capacity licensing |
CA2680594A1 (en) * | 2009-10-15 | 2009-12-23 | Ibm Canada Limited - Ibm Canada Limitee | Ensuring acceptability of software license agreements or legal agreements |
US8726407B2 (en) | 2009-10-16 | 2014-05-13 | Deviceauthority, Inc. | Authentication of computing and communications hardware |
US20110093503A1 (en) * | 2009-10-19 | 2011-04-21 | Etchegoyen Craig S | Computer Hardware Identity Tracking Using Characteristic Parameter-Derived Data |
US9082128B2 (en) | 2009-10-19 | 2015-07-14 | Uniloc Luxembourg S.A. | System and method for tracking and scoring user activities |
US8316421B2 (en) * | 2009-10-19 | 2012-11-20 | Uniloc Luxembourg S.A. | System and method for device authentication with built-in tolerance |
US8769296B2 (en) * | 2009-10-19 | 2014-07-01 | Uniloc Luxembourg, S.A. | Software signature tracking |
US8650246B2 (en) * | 2009-10-29 | 2014-02-11 | Fujitsu Technology Solutions Intellectual Property Gmbh | Method and system for licensing a software product |
US8886957B2 (en) | 2009-11-09 | 2014-11-11 | 3Dlabs Inc. Ltd. | Systems, methods, software, and components using tamper-proof real-time clock |
JP5377282B2 (en) * | 2009-12-28 | 2013-12-25 | キヤノン株式会社 | Information processing apparatus, control method therefor, and computer program |
CN101799851A (en) * | 2009-12-31 | 2010-08-11 | 黄定 | Method for canceling activation after networking activation of software |
US10387927B2 (en) * | 2010-01-15 | 2019-08-20 | Dell Products L.P. | System and method for entitling digital assets |
US9256899B2 (en) | 2010-01-15 | 2016-02-09 | Dell Products, L.P. | System and method for separation of software purchase from fulfillment |
US9235399B2 (en) | 2010-01-15 | 2016-01-12 | Dell Products L.P. | System and method for manufacturing and personalizing computing devices |
US9100396B2 (en) | 2010-01-29 | 2015-08-04 | Dell Products L.P. | System and method for identifying systems and replacing components |
WO2011097670A1 (en) * | 2010-02-09 | 2011-08-18 | Zap Holdings Limited | Database access licence management |
US9275195B1 (en) * | 2010-02-19 | 2016-03-01 | Copyright Clearance Center, Inc. | Intermediated rights management |
US8170783B2 (en) | 2010-03-16 | 2012-05-01 | Dell Products L.P. | System and method for handling software activation in entitlement |
CN105760716B (en) * | 2010-05-19 | 2018-12-14 | 谷歌有限责任公司 | Digital certificates management |
US10108993B2 (en) | 2010-12-15 | 2018-10-23 | Red Hat, Inc. | Data driven rules engine to dynamically change product business rules |
EP2472422A1 (en) * | 2010-12-27 | 2012-07-04 | Siemens Aktiengesellschaft | Improved management of software licenses in a computer network |
AU2011100168B4 (en) | 2011-02-09 | 2011-06-30 | Device Authority Ltd | Device-bound certificate authentication |
US8474057B2 (en) | 2011-02-07 | 2013-06-25 | Microsoft Corporation | License reconciliation for online services |
US20120221709A1 (en) * | 2011-02-24 | 2012-08-30 | Bowes James R | Mechanism to allow hosted and on-site implementations to manage product assets as specified by a third party |
US9224111B2 (en) | 2011-02-25 | 2015-12-29 | Red Hat, Inc. | Message queue based product asset management auditing system |
US20120222083A1 (en) * | 2011-02-28 | 2012-08-30 | Nokia Corporation | Method and apparatus for enforcing data privacy |
US8561151B2 (en) * | 2011-03-24 | 2013-10-15 | Avid Technology, Inc. | Mobile software entitlements manager |
US9152771B2 (en) * | 2011-05-31 | 2015-10-06 | Qualcomm Incorporated | Apparatus and method of managing a licensable item |
US9524378B2 (en) * | 2011-05-31 | 2016-12-20 | Qualcomm Incorporated | Apparatus and method of in-application licensing |
US9319406B2 (en) | 2011-07-12 | 2016-04-19 | Apple Inc. | System and method for linking pre-installed software to a user account on an online store |
US20130019237A1 (en) * | 2011-07-12 | 2013-01-17 | Apple Inc. | System and method for linking pre-installed software to a user account on an online store |
US9152404B2 (en) * | 2011-07-13 | 2015-10-06 | Z124 | Remote device filter |
US20130268559A1 (en) | 2011-07-13 | 2013-10-10 | Z124 | Virtual file system remote search |
US20130268703A1 (en) | 2011-09-27 | 2013-10-10 | Z124 | Rules based hierarchical data virtualization |
US10248293B2 (en) | 2011-09-30 | 2019-04-02 | Nokia Technologies Oy | Method, apparatus, computer program and user interface |
US20130086525A1 (en) * | 2011-09-30 | 2013-04-04 | Nokia Corporation | Method, Apparatus, Computer Program and User Interface |
US9929869B2 (en) * | 2011-10-26 | 2018-03-27 | Avaya Inc. | Methods, apparatuses, and computer-readable media for providing a collaboration license to an application for participant user device(s) participating in an on-line collaboration |
WO2013074795A1 (en) * | 2011-11-16 | 2013-05-23 | Nl Systems, Llc | System and method for secure software license distribution |
US20130167223A1 (en) * | 2011-12-27 | 2013-06-27 | Symbol Technologies, Inc. | Methods and apparatus for securing a software application on a mobile device |
US9165332B2 (en) | 2012-01-27 | 2015-10-20 | Microsoft Technology Licensing, Llc | Application licensing using multiple forms of licensing |
DE102012201431A1 (en) * | 2012-02-01 | 2013-08-01 | Robert Bosch Gmbh | System and method for licensing a variety of software components |
US9916342B2 (en) * | 2012-03-30 | 2018-03-13 | Branch Banking And Trust Company | System and method for license reclamation |
US8949401B2 (en) | 2012-06-14 | 2015-02-03 | Dell Products L.P. | Automated digital migration |
US9361433B2 (en) * | 2012-08-03 | 2016-06-07 | Synchronoss Technologies, Inc | Enterprise leasing license algorithm |
US9779219B2 (en) * | 2012-08-09 | 2017-10-03 | Dell Products L.P. | Method and system for late binding of option features associated with a device using at least in part license and unique ID information |
US10592887B2 (en) | 2012-08-15 | 2020-03-17 | International Business Machines Corporation | System and method for software allocation based on forecasts and calendars |
US20140109237A1 (en) * | 2012-10-17 | 2014-04-17 | Microsoft Corporation | Application modes determined from previous and current states of a license |
TWI494872B (en) * | 2012-11-06 | 2015-08-01 | Quanta Comp Inc | Automatic software audit system and automatic software audit method |
US9436814B2 (en) | 2013-01-22 | 2016-09-06 | Empire Technology Development Llc | Fail-safe licensing for software applications |
US9230069B2 (en) * | 2013-04-16 | 2016-01-05 | International Business Machines Corporation | Execution-based license discovery and optimization |
CN104217359A (en) * | 2013-05-30 | 2014-12-17 | 华为终端有限公司 | Software reselling method, device and system |
EP2843548B1 (en) | 2013-09-03 | 2018-04-04 | Fujitsu Limited | Method, system, and program for scheduling jobs in a computing system |
US20150095237A1 (en) * | 2013-09-30 | 2015-04-02 | Infinera Corp. | License Management System |
US10884991B1 (en) * | 2014-03-14 | 2021-01-05 | Jpmorgan Chase Bank, N.A. | Data request analysis and fulfillment system and method |
DE102014104227B4 (en) * | 2014-03-26 | 2016-08-18 | Lorch Schweißtechnik GmbH | PROCESS FOR EXTENDING THE FUNCTION OF AN ELECTRIC WELDING DEVICE AND WELDING DEVICE FOR CARRYING OUT SAID METHOD |
US10679151B2 (en) | 2014-04-28 | 2020-06-09 | Altair Engineering, Inc. | Unit-based licensing for third party access of digital content |
JP2016110346A (en) * | 2014-12-04 | 2016-06-20 | キヤノン株式会社 | License management system, client device, and license management method |
US20160170717A1 (en) * | 2014-12-11 | 2016-06-16 | Daniel Zoch | Association of program code and application features |
US10176306B2 (en) * | 2014-12-16 | 2019-01-08 | JVC Kenwood Corporation | Information processing apparatus, evaluation method, and storage medium for evaluating application program |
US10289814B2 (en) * | 2014-12-23 | 2019-05-14 | Intel Corporation | Licensing in the cloud |
US10075346B2 (en) * | 2015-05-28 | 2018-09-11 | International Business Machines Corporation | Computing resource license planning |
US20170322787A1 (en) * | 2015-05-29 | 2017-11-09 | Adobe Systems Incorporated | Providing enterprise product bundles as a cloud-based service |
US10685055B2 (en) | 2015-09-23 | 2020-06-16 | Altair Engineering, Inc. | Hashtag-playlist content sequence management |
JP6700815B2 (en) * | 2016-01-29 | 2020-05-27 | キヤノン株式会社 | License management system, client device, application program |
US10826875B1 (en) * | 2016-07-22 | 2020-11-03 | Servicenow, Inc. | System and method for securely communicating requests |
CN106657010B (en) * | 2016-11-16 | 2020-11-03 | 东软集团股份有限公司 | Method, device and system for accessing data |
CN106657137A (en) * | 2017-01-17 | 2017-05-10 | 腾讯科技(上海)有限公司 | Software product legitimacy verification method, apparatus and system |
US20180232529A1 (en) * | 2017-02-15 | 2018-08-16 | Microsoft Technology Licensing, Llc | Client-side exposure control |
US20180307812A1 (en) * | 2017-04-19 | 2018-10-25 | Ice Frog Technologies, LLC | Prevention of software privacy by end users |
US10133862B1 (en) | 2017-05-09 | 2018-11-20 | International Business Machines Corporation | Timer and content security |
JP6759169B2 (en) * | 2017-09-11 | 2020-09-23 | 株式会社東芝 | Information processing equipment, information processing methods, and information processing programs |
WO2020131045A1 (en) * | 2018-12-19 | 2020-06-25 | Unify Patente Gmbh & Co. Kg | Apparatus and method for license activation |
US11799864B2 (en) | 2019-02-07 | 2023-10-24 | Altair Engineering, Inc. | Computer systems for regulating access to electronic content using usage telemetry data |
US11409844B2 (en) * | 2019-02-11 | 2022-08-09 | Servicenow, Inc. | Systems and methods for license management in a domain-separated architecture |
CN111034151B (en) * | 2019-04-30 | 2022-01-28 | 创新先进技术有限公司 | Method and apparatus for managing access to accounts in a blockchain system |
CN111260304B (en) * | 2019-11-26 | 2024-03-08 | 上海赛连信息科技有限公司 | Trial account management and issuing method and device |
US20210223942A1 (en) * | 2020-01-17 | 2021-07-22 | Apple Inc. | Systems and methods for changing representations of applications based on application status |
CN110971622A (en) * | 2020-03-04 | 2020-04-07 | 信联科技(南京)有限公司 | Bidirectional access method and system between public network application system and intranet application system |
US10826924B1 (en) * | 2020-04-22 | 2020-11-03 | Quantum Information Security, LLC | Computer security and methods of use thereof |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4924378A (en) * | 1988-06-13 | 1990-05-08 | Prime Computer, Inc. | License mangagement system and license storage key |
US5023907A (en) * | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
US5222134A (en) * | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5260999A (en) * | 1991-06-28 | 1993-11-09 | Digital Equipment Corporation | Filters in license management system |
US5282186A (en) * | 1988-04-25 | 1994-01-25 | Pioneer Electronic Corporation | Method and apparatus for recording and reproducing picture information and recording medium |
US5390297A (en) * | 1987-11-10 | 1995-02-14 | Auto-Trol Technology Corporation | System for controlling the number of concurrent copies of a program in a network based on the number of available licenses |
US5426421A (en) * | 1986-04-21 | 1995-06-20 | Gray; William F. | Method of automatically managing a network or remote function-excecuting apparatus from a programable network control center |
US5495411A (en) * | 1993-12-22 | 1996-02-27 | Ananda; Mohan | Secure software rental system using continuous asynchronous password verification |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US5740549A (en) * | 1995-06-12 | 1998-04-14 | Pointcast, Inc. | Information and advertising distribution system and method |
US6466209B1 (en) * | 1995-12-07 | 2002-10-15 | Ncr Corporation | Method for transparent marking of digital images for storage, retrieval and processing within a computer database |
US6893910B1 (en) * | 2003-06-17 | 2005-05-17 | Advanced Micro Devices, Inc. | One step deposition method for high-k dielectric and metal gate electrode |
Family Cites Families (316)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US560609A (en) * | 1896-05-19 | Swing | ||
US3609697A (en) * | 1968-10-21 | 1971-09-28 | Ibm | Program security device |
US3573747A (en) * | 1969-02-24 | 1971-04-06 | Institutional Networks Corp | Instinet communication system for effectuating the sale or exchange of fungible properties between subscribers |
US3798359A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Block cipher cryptographic system |
US3798605A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Centralized verification system |
US3798360A (en) * | 1971-06-30 | 1974-03-19 | Ibm | Step code ciphering system |
US3796830A (en) * | 1971-11-02 | 1974-03-12 | Ibm | Recirculating block cipher cryptographic system |
GB1414126A (en) * | 1971-11-22 | 1975-11-19 | Key Tronic Ltd | Secutity for computer systems |
US3931504A (en) * | 1972-02-07 | 1976-01-06 | Basic Computing Arts, Inc. | Electronic data processing security system and method |
US3829833A (en) * | 1972-10-24 | 1974-08-13 | Information Identification Co | Code element identification method and apparatus |
US3911397A (en) * | 1972-10-24 | 1975-10-07 | Information Identification Inc | Access control assembly |
US3924065A (en) * | 1974-04-05 | 1975-12-02 | Information Identification Inc | Coherent, fixed BAUD rate FSK communication method and apparatus |
US3946220A (en) * | 1974-06-10 | 1976-03-23 | Transactron, Inc. | Point-of-sale system and apparatus |
US3970992A (en) * | 1974-06-25 | 1976-07-20 | Ibm Corporation | Transaction terminal with unlimited range of functions |
US3956615A (en) * | 1974-06-25 | 1976-05-11 | Ibm Corporation | Transaction execution system with secure data storage and communications |
US3906448A (en) * | 1974-08-01 | 1975-09-16 | Rca Corp | Fault detection facilitating means for card reader of identification card reading system |
US4270182A (en) * | 1974-12-30 | 1981-05-26 | Asija Satya P | Automated information input, storage, and retrieval system |
US3958081A (en) * | 1975-02-24 | 1976-05-18 | International Business Machines Corporation | Block cipher system for data security |
US4112421A (en) * | 1975-04-16 | 1978-09-05 | Information Identification Company, Inc. | Method and apparatus for automatically monitoring objects |
US4209787A (en) * | 1975-04-16 | 1980-06-24 | Gould Inc. | Method for monitoring the location of monitored objects |
US4217588A (en) * | 1975-04-16 | 1980-08-12 | Information Identification Company, Inc. | Object monitoring method and apparatus |
US4071911A (en) * | 1975-04-22 | 1978-01-31 | Continental Can Co. Inc. | Machine control system with machine serializing and safety circuits |
US4196310A (en) * | 1976-04-09 | 1980-04-01 | Digital Data, Inc. | Secure SCA broadcasting system including subscriber actuated portable receiving terminals |
JPS533029A (en) * | 1976-06-30 | 1978-01-12 | Toshiba Corp | Electronic computer |
US4048619A (en) * | 1976-09-07 | 1977-09-13 | Digital Data Inc. | Secure two channel sca broadcasting system |
US4120030A (en) * | 1977-03-11 | 1978-10-10 | Kearney & Trecker Corporation | Computer software security system |
US4200913A (en) * | 1977-04-13 | 1980-04-29 | International Business Machines Corporation | Operator controlled programmable keyboard apparatus |
GB1553027A (en) * | 1977-05-12 | 1979-09-19 | Marconi Co Ltd | Message signal scrambling apparatus |
US4220991A (en) * | 1977-10-08 | 1980-09-02 | Tokyo Electric Co., Ltd. | Electronic cash register with removable memory packs for cashier identification |
US4278837A (en) * | 1977-10-31 | 1981-07-14 | Best Robert M | Crypto microprocessor for executing enciphered programs |
US4168396A (en) * | 1977-10-31 | 1979-09-18 | Best Robert M | Microprocessor for executing enciphered programs |
US4262329A (en) * | 1978-03-27 | 1981-04-14 | Computation Planning, Inc. | Security system for data processing |
US4253157A (en) * | 1978-09-29 | 1981-02-24 | Alpex Computer Corp. | Data access system wherein subscriber terminals gain access to a data bank by telephone lines |
US4265371A (en) * | 1978-10-06 | 1981-05-05 | Trafalgar Industries Inc. | Foodstuff vending apparatus employing improved solid-state type control apparatus |
US4232317A (en) * | 1978-11-01 | 1980-11-04 | Freeny Jr Charles C | Quantized hyperbolic and inverse hyperbolic object location system |
US4305131A (en) * | 1979-02-05 | 1981-12-08 | Best Robert M | Dialog between TV movies and human viewers |
FR2448824A1 (en) * | 1979-02-06 | 1980-09-05 | Telediffusion Fse | VIDEOTEX SYSTEM PROVIDED WITH INFORMATION ACCESS CONTROL MEANS |
US4236217A (en) * | 1979-04-20 | 1980-11-25 | Kennedy Stanley P | Energy utilization or consumption recording arrangement |
US4465901A (en) * | 1979-06-04 | 1984-08-14 | Best Robert M | Crypto microprocessor that executes enciphered programs |
US4309569A (en) * | 1979-09-05 | 1982-01-05 | The Board Of Trustees Of The Leland Stanford Junior University | Method of providing digital signatures |
US4319079A (en) * | 1979-09-13 | 1982-03-09 | Best Robert M | Crypto microprocessor using block cipher |
US4328544A (en) * | 1980-01-04 | 1982-05-04 | International Business Machines Corporation | Electronic point-of-sale system using direct-access storage |
US4375579A (en) * | 1980-01-30 | 1983-03-01 | Wisconsin Alumni Research Foundation | Database encryption and decryption circuit and method using subkeys |
US4306289A (en) * | 1980-02-04 | 1981-12-15 | Western Electric Company, Inc. | Digital computer having code conversion apparatus for an encrypted program |
US4361877A (en) * | 1980-02-05 | 1982-11-30 | Sangamo Weston, Inc. | Billing recorder with non-volatile solid state memory |
JPS56140452A (en) * | 1980-04-01 | 1981-11-02 | Hitachi Ltd | Memory protection system |
AU547877B2 (en) * | 1980-09-26 | 1985-11-07 | B. Lofberg | Method for processing an information signal and means for carrying out the method |
US4513174A (en) * | 1981-03-19 | 1985-04-23 | Standard Microsystems Corporation | Software security method using partial fabrication of proprietary control word decoders and microinstruction memories |
US4446519A (en) * | 1981-05-26 | 1984-05-01 | Corban International, Ltd. | Method and apparatus for providing security for computer software |
US4433207A (en) * | 1981-09-10 | 1984-02-21 | Best Robert M | Cryptographic decoder for computer programs |
US4471163A (en) * | 1981-10-05 | 1984-09-11 | Donald Thomas C | Software protection system |
US4670857A (en) * | 1981-10-26 | 1987-06-02 | Rackman Michael I | Cartridge-controlled system whose use is limited to authorized cartridges |
US4593353A (en) * | 1981-10-26 | 1986-06-03 | Telecommunications Associates, Inc. | Software protection method and apparatus |
US4454594A (en) * | 1981-11-25 | 1984-06-12 | U.S. Philips Corporation | Method and apparatus to secure proprietary operation of computer equipment |
US4442486A (en) * | 1981-11-25 | 1984-04-10 | U.S. Philips Corporation | Protected programmable apparatus |
US4553252A (en) * | 1981-12-21 | 1985-11-12 | Egendorf Harris H | Counting computer software cartridge |
EP0084441A3 (en) | 1982-01-19 | 1984-08-22 | Tabs Limited | Method and apparatus for the protection of proprietary computer software |
US4458315A (en) * | 1982-02-25 | 1984-07-03 | Penta, Inc. | Apparatus and method for preventing unauthorized use of computer programs |
AU542447B2 (en) * | 1982-02-27 | 1985-02-21 | Fujitsu Limited | System for controlling key storage unit |
FR2523745B1 (en) * | 1982-03-18 | 1987-06-26 | Bull Sa | METHOD AND DEVICE FOR PROTECTING SOFTWARE DELIVERED BY A SUPPLIER TO A USER |
US4484217A (en) * | 1982-05-11 | 1984-11-20 | Telease, Inc. | Method and system for remote reporting, particularly for pay television billing |
US4494156A (en) * | 1982-05-14 | 1985-01-15 | Media Systems Technology | Selectable format computer disk copier machine |
US4462076A (en) * | 1982-06-04 | 1984-07-24 | Smith Engineering | Video game cartridge recognition and security system |
US4462078A (en) * | 1982-08-02 | 1984-07-24 | Ron Ross | Computer program protection method |
US4558176A (en) * | 1982-09-20 | 1985-12-10 | Arnold Mark G | Computer systems to inhibit unauthorized copying, unauthorized usage, and automated cracking of protected software |
FR2536880B1 (en) * | 1982-11-30 | 1987-05-07 | Bull Sa | MICROPROCESSOR DESIGNED IN PARTICULAR FOR EXECUTING THE CALCULATION ALGORITHMS OF A PUBLIC KEY ENCRYPTION SYSTEM |
US4528643A (en) * | 1983-01-10 | 1985-07-09 | Fpdc, Inc. | System for reproducing information in material objects at a point of sale location |
US4588991A (en) * | 1983-03-07 | 1986-05-13 | Atalla Corporation | File access security method and means |
US4680731A (en) * | 1983-03-17 | 1987-07-14 | Romox Incorporated | Reprogrammable cartridge memory with built-in identification circuitry and programming method |
US4593376A (en) * | 1983-04-21 | 1986-06-03 | Volk Larry N | System for vending program cartridges which have circuitry for inhibiting program usage after preset time interval expires |
US4597058A (en) * | 1983-05-09 | 1986-06-24 | Romox, Inc. | Cartridge programming system |
WO1984004614A1 (en) | 1983-05-13 | 1984-11-22 | Ira Dennis Gale | Data security device |
US4658093A (en) * | 1983-07-11 | 1987-04-14 | Hellman Martin E | Software distribution system |
US4584641A (en) * | 1983-08-29 | 1986-04-22 | Paul Guglielmino | Copyprotecting system for software protection |
US4562306A (en) * | 1983-09-14 | 1985-12-31 | Chou Wayne W | Method and apparatus for protecting computer software utilizing an active coded hardware device |
FR2552078B1 (en) | 1983-09-19 | 1986-05-02 | Inst Francais Du Petrole | PROCESS FOR SELECTIVE HYDROGENATION OF ACETYLENE CONTAINED IN A MIXTURE OF ACETYLENE AND ETHYLENE |
US5103392A (en) * | 1983-10-05 | 1992-04-07 | Fujitsu Limited | System for storing history of use of programs including user credit data and having access by the proprietor |
US4768087A (en) * | 1983-10-07 | 1988-08-30 | National Information Utilities Corporation | Education utility |
US4652990A (en) * | 1983-10-27 | 1987-03-24 | Remote Systems, Inc. | Protected software access control apparatus and method |
GB2149944A (en) | 1983-11-14 | 1985-06-19 | Softnet Inc | Software distribution |
US4558413A (en) * | 1983-11-21 | 1985-12-10 | Xerox Corporation | Software version management system |
US4740890A (en) * | 1983-12-22 | 1988-04-26 | Software Concepts, Inc. | Software protection system with trial period usage code and unlimited use unlocking code both recorded on program storage media |
US4577289A (en) * | 1983-12-30 | 1986-03-18 | International Business Machines Corporation | Hardware key-on-disk system for copy-protecting magnetic storage media |
WO1985003584A1 (en) | 1984-02-03 | 1985-08-15 | Paul Guignard | Security and usage monitoring |
US4646234A (en) * | 1984-02-29 | 1987-02-24 | Brigham Young University | Anti-piracy system using separate storage and alternate execution of selected proprietary and public portions of computer programs |
US4672572A (en) * | 1984-05-21 | 1987-06-09 | Gould Inc. | Protector system for computer access and use |
US4712238A (en) * | 1984-06-08 | 1987-12-08 | M/A-Com Government Systems, Inc. | Selective-subscription descrambling |
US4791565A (en) * | 1984-06-20 | 1988-12-13 | Effective Security Systems, Inc. | Apparatus for controlling the use of computer software |
US4562495A (en) * | 1984-07-02 | 1985-12-31 | Verbatim Corporation | Multiple system disk |
EP0175487A3 (en) * | 1984-08-23 | 1989-03-08 | Btg International Limited | Software protection device |
US4747139A (en) * | 1984-08-27 | 1988-05-24 | Taaffe James L | Software security method and systems |
BE900479A (en) | 1984-08-31 | 1984-12-17 | Smets Raph | Magnetic recording disc for computer data - has sector subjected to different treatment to prevent unauthorised copying |
US4644493A (en) * | 1984-09-14 | 1987-02-17 | International Business Machines Corporation | Implementing a shared higher level of privilege on personal computers for copy protection of software |
US4696034A (en) * | 1984-10-12 | 1987-09-22 | Signal Security Technologies | High security pay television system |
US4677434A (en) * | 1984-10-17 | 1987-06-30 | Lotus Information Network Corp. | Access control system for transmitting data from a central station to a plurality of receiving stations and method therefor |
EP0180460B1 (en) | 1984-10-31 | 1990-09-19 | Sony Corporation | Decoders for pay television systems |
JPS61166652A (en) * | 1985-01-19 | 1986-07-28 | Panafacom Ltd | Interruption generating system using exceptional memory protection |
US4713753A (en) * | 1985-02-21 | 1987-12-15 | Honeywell Inc. | Secure data processing system architecture with format control |
US4888798A (en) * | 1985-04-19 | 1989-12-19 | Oms, Inc. | Modular software security |
US4688169A (en) * | 1985-05-30 | 1987-08-18 | Joshi Bhagirath S | Computer software security system |
US4685056A (en) * | 1985-06-11 | 1987-08-04 | Pueblo Technologies, Inc. | Computer security device |
GB2182467B (en) * | 1985-10-30 | 1989-10-18 | Ncr Co | Security device for stored sensitive data |
US5208748A (en) | 1985-11-18 | 1993-05-04 | Action Technologies, Inc. | Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants |
US5216603A (en) | 1985-11-18 | 1993-06-01 | Action Technologies, Inc. | Method and apparatus for structuring and managing human communications by explicitly defining the types of communications permitted between participants |
US4864494A (en) | 1986-03-21 | 1989-09-05 | Computerized Data Ssytems For Mfg., Inc. | Software usage authorization system with key for decrypting/re-encrypting/re-transmitting moving target security codes from protected software |
US4823264A (en) * | 1986-05-27 | 1989-04-18 | Deming Gilbert R | Electronic funds transfer system |
US5010571A (en) * | 1986-09-10 | 1991-04-23 | Titan Linkabit Corporation | Metering retrieval of encrypted data stored in customer data retrieval terminal |
US4799156A (en) | 1986-10-01 | 1989-01-17 | Strategic Processing Corporation | Interactive market management system |
US5050213A (en) * | 1986-10-14 | 1991-09-17 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4827508A (en) | 1986-10-14 | 1989-05-02 | Personal Library Software, Inc. | Database usage metering and protection system and method |
US4977594A (en) | 1986-10-14 | 1990-12-11 | Electronic Publishing Resources, Inc. | Database usage metering and protection system and method |
US4796181A (en) * | 1986-10-24 | 1989-01-03 | Wiedemer John D | Billing system for computer software |
US5155680A (en) | 1986-10-24 | 1992-10-13 | Signal Security Technologies | Billing system for computing software |
US5047928A (en) | 1986-10-24 | 1991-09-10 | Wiedemer John D | Billing system for computer software |
US5146575A (en) | 1986-11-05 | 1992-09-08 | International Business Machines Corp. | Implementing privilege on microprocessor systems for use in software asset protection |
US4817140A (en) * | 1986-11-05 | 1989-03-28 | International Business Machines Corp. | Software protection system using a single-key cryptosystem, a hardware-based authorization system and a secure coprocessor |
US4858121A (en) | 1986-12-12 | 1989-08-15 | Medical Payment Systems, Incorporated | Medical payment system |
US5224160A (en) | 1987-02-23 | 1993-06-29 | Siemens Nixdorf Informationssysteme Ag | Process for securing and for checking the integrity of the secured programs |
US4930073A (en) | 1987-06-26 | 1990-05-29 | International Business Machines Corporation | Method to prevent use of incorrect program version in a computer system |
DE3876617T2 (en) * | 1987-09-04 | 1993-04-08 | Digital Equipment Corp | CONNECTION CONTROL IN A NETWORK FOR A DIGITAL DATA PROCESSING SYSTEM THAT SUPPLIES MULTIPLE TRANSMISSION PROTOCOLS. |
US4999806A (en) * | 1987-09-04 | 1991-03-12 | Fred Chernow | Software distribution system |
US5005122A (en) * | 1987-09-08 | 1991-04-02 | Digital Equipment Corporation | Arrangement with cooperating management server node and network service node |
DE3803982A1 (en) | 1988-02-10 | 1990-01-25 | Igor Groza | Data carrier with duplication prevention |
US5214702A (en) | 1988-02-12 | 1993-05-25 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4868877A (en) | 1988-02-12 | 1989-09-19 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US5005200A (en) * | 1988-02-12 | 1991-04-02 | Fischer Addison M | Public key/signature cryptosystem with enhanced digital signature certification |
US4937863A (en) * | 1988-03-07 | 1990-06-26 | Digital Equipment Corporation | Software licensing management system |
US5185717A (en) * | 1988-08-05 | 1993-02-09 | Ryoichi Mori | Tamper resistant module having logical elements arranged in multiple layers on the outer surface of a substrate to protect stored information |
ATE166986T1 (en) | 1988-08-16 | 1998-06-15 | Cryptologics International Inc | INFORMATION DISTRIBUTION SYSTEM |
US5111390A (en) | 1988-08-22 | 1992-05-05 | Unisys Corporation | Software security system for maintaining integrity of compiled object code by restricting users ability to define compilers |
US4949187A (en) | 1988-12-16 | 1990-08-14 | Cohen Jason M | Video communications system having a remotely controlled central source of video and audio data |
WO1990013865A1 (en) * | 1989-04-28 | 1990-11-15 | Softel, Inc. | Method and apparatus for remotely controlling and monitoring the use of computer software |
US5075847A (en) | 1989-05-26 | 1991-12-24 | Hewlett-Packard Company | Method and apparatus for computer program encapsulation |
US5442645A (en) | 1989-06-06 | 1995-08-15 | Bull Cp8 | Method for checking the integrity of a program or data, and apparatus for implementing this method |
US5347579A (en) | 1989-07-05 | 1994-09-13 | Blandford Robert R | Personal computer diary |
US5138712A (en) * | 1989-10-02 | 1992-08-11 | Sun Microsystems, Inc. | Apparatus and method for licensing software on a network of computers |
US5148481A (en) | 1989-10-06 | 1992-09-15 | International Business Machines Corporation | Transaction system security method and apparatus |
US5048085A (en) | 1989-10-06 | 1991-09-10 | International Business Machines Corporation | Transaction system security method and apparatus |
US5001752A (en) * | 1989-10-13 | 1991-03-19 | Fischer Addison M | Public/key date-time notary facility |
US5136643A (en) | 1989-10-13 | 1992-08-04 | Fischer Addison M | Public/key date-time notary facility |
US5201047A (en) * | 1989-12-21 | 1993-04-06 | International Business Machines Corporation | Attribute-based classification and retrieval system |
US5263158A (en) | 1990-02-15 | 1993-11-16 | International Business Machines Corporation | Method and system for variable authority level user access control in a distributed data processing system having multiple resource manager |
US5119493A (en) | 1990-02-23 | 1992-06-02 | International Business Machines Corporation | System for recording at least one selected activity from a selected resource object within a distributed data processing system |
DE69031758T2 (en) * | 1990-04-13 | 1998-05-28 | Koninkl Philips Electronics Nv | Process for organizing and accessing product descriptive data in connection with a technical process |
DE69130461T2 (en) | 1990-05-11 | 1999-06-10 | International Computers Ltd., Putney, London | Access control in a distributed computer system |
US5201046A (en) * | 1990-06-22 | 1993-04-06 | Xidak, Inc. | Relational database management system and method for storing, retrieving and modifying directed graph data structures |
US5128525A (en) | 1990-07-31 | 1992-07-07 | Xerox Corporation | Convolution filtering for decoding self-clocking glyph shape codes |
US5091966A (en) * | 1990-07-31 | 1992-02-25 | Xerox Corporation | Adaptive scaling for decoding spatially periodic self-clocking glyph shape codes |
CA2044404C (en) | 1990-07-31 | 1998-06-23 | Dan S. Bloomberg | Self-clocking glyph shape codes |
US5168147A (en) | 1990-07-31 | 1992-12-01 | Xerox Corporation | Binary image processing for decoding self-clocking glyph shape codes |
US5136646A (en) | 1991-03-08 | 1992-08-04 | Bell Communications Research, Inc. | Digital document time-stamping with catenate certificate |
US5136647A (en) * | 1990-08-02 | 1992-08-04 | Bell Communications Research, Inc. | Method for secure time-stamping of digital documents |
US5224163A (en) | 1990-09-28 | 1993-06-29 | Digital Equipment Corporation | Method for delegating authorization from one entity to another through the use of session encryption keys |
WO1992006438A1 (en) | 1990-10-01 | 1992-04-16 | Bush Thomas A | Transactional processing system |
US5103476A (en) * | 1990-11-07 | 1992-04-07 | Waite David P | Secure system for activating personal computer software at remote locations |
US5758152A (en) * | 1990-12-06 | 1998-05-26 | Prime Arithmetics, Inc. | Method and apparatus for the generation and manipulation of data structures |
JP3270102B2 (en) * | 1991-03-11 | 2002-04-02 | ヒューレット・パッカード・カンパニー | Licensing method and system |
US5504818A (en) * | 1991-04-19 | 1996-04-02 | Okano; Hirokazu | Information processing system using error-correcting codes and cryptography |
SE513182C2 (en) | 1991-06-12 | 2000-07-24 | Icl Systems Ab | Procedure and system for auditing data in a distributed computer system |
FR2678121B1 (en) * | 1991-06-18 | 1994-04-29 | Matra Communication | DEVICE FOR INSERTING DIGITAL PACKETS IN A TRANSMISSION CHANNEL. |
US5438508A (en) * | 1991-06-28 | 1995-08-01 | Digital Equipment Corporation | License document interchange format for license management system |
US5204897A (en) * | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
US5940504A (en) | 1991-07-01 | 1999-08-17 | Infologic Software, Inc. | Licensing management system and method in which datagrams including an address of a licensee and indicative of use of a licensed product are sent from the licensee's site |
US5367635A (en) * | 1991-08-29 | 1994-11-22 | Hewlett-Packard Company | Network management agent with user created objects providing additional functionality |
US5355474A (en) | 1991-09-27 | 1994-10-11 | Thuraisngham Bhavani M | System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification |
JP3065738B2 (en) * | 1991-10-11 | 2000-07-17 | 株式会社東芝 | Computer system |
US5265164A (en) | 1991-10-31 | 1993-11-23 | International Business Machines Corporation | Cryptographic facility environment backup/restore and replication in a public key cryptosystem |
US5453601A (en) | 1991-11-15 | 1995-09-26 | Citibank, N.A. | Electronic-monetary system |
US5557518A (en) * | 1994-04-28 | 1996-09-17 | Citibank, N.A. | Trusted agents for open electronic commerce |
WO1993011480A1 (en) * | 1991-11-27 | 1993-06-10 | Intergraph Corporation | System and method for network license administration |
US5455861A (en) | 1991-12-09 | 1995-10-03 | At&T Corp. | Secure telecommunications |
US5221833A (en) | 1991-12-27 | 1993-06-22 | Xerox Corporation | Methods and means for reducing bit error rates in reading self-clocking glyph codes |
US5245165A (en) | 1991-12-27 | 1993-09-14 | Xerox Corporation | Self-clocking glyph code for encoding dual bit digital values robustly |
US5375055A (en) * | 1992-02-03 | 1994-12-20 | Foreign Exchange Transaction Services, Inc. | Credit management for electronic brokerage system |
US5301231A (en) * | 1992-02-12 | 1994-04-05 | International Business Machines Corporation | User defined function facility |
GB2264796A (en) | 1992-03-02 | 1993-09-08 | Ibm | Distributed transaction processing |
CA2093094C (en) * | 1992-04-06 | 2000-07-11 | Addison M. Fischer | Method and apparatus for creating, supporting, and using travelling programs |
US5392390A (en) * | 1992-04-10 | 1995-02-21 | Intellilink Corp. | Method for mapping, translating, and dynamically reconciling data between disparate computer platforms |
US5276735A (en) * | 1992-04-17 | 1994-01-04 | Secure Computing Corporation | Data enclave and trusted path system |
US5421006A (en) | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software |
US5432907A (en) * | 1992-05-12 | 1995-07-11 | Network Resources Corporation | Network hub with integrated bridge |
US5412717A (en) | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
US5596718A (en) | 1992-07-10 | 1997-01-21 | Secure Computing Corporation | Secure computer network using trusted path subsystem which encrypts/decrypts and communicates with user through local workstation user I/O devices without utilizing workstation processor |
US5235642A (en) | 1992-07-21 | 1993-08-10 | Digital Equipment Corporation | Access control subsystem and method for distributed computer system using locally cached authentication credentials |
US5285494A (en) * | 1992-07-31 | 1994-02-08 | Pactel Corporation | Network management system |
CA2118940A1 (en) | 1992-07-31 | 1994-02-17 | David W. Snow | Apparatus and method for providing network security |
US5555388A (en) * | 1992-08-20 | 1996-09-10 | Borland International, Inc. | Multi-user system and methods providing improved file management by reading |
US5819226A (en) | 1992-09-08 | 1998-10-06 | Hnc Software Inc. | Fraud detection using predictive modeling |
JP3084969B2 (en) | 1992-10-16 | 2000-09-04 | 松下電器産業株式会社 | Playback device, recording device, cased recording medium, and recording medium initialization device |
US5319705A (en) | 1992-10-21 | 1994-06-07 | International Business Machines Corporation | Method and system for multimedia access control enablement |
GB2295947B (en) | 1992-10-27 | 1997-08-13 | Mitsubishi Corp | Pay broadcasting system |
US5341429A (en) | 1992-12-04 | 1994-08-23 | Testdrive Corporation | Transformation of ephemeral material |
US5373561A (en) | 1992-12-21 | 1994-12-13 | Bell Communications Research, Inc. | Method of extending the validity of a cryptographic certificate |
US5630069A (en) | 1993-01-15 | 1997-05-13 | Action Technologies, Inc. | Method and apparatus for creating workflow maps of business processes |
US5497491A (en) * | 1993-01-26 | 1996-03-05 | International Business Machines Corporation | System and method for importing and exporting data between an object oriented computing environment and an external computing environment |
US5351293A (en) | 1993-02-01 | 1994-09-27 | Wave Systems Corp. | System method and apparatus for authenticating an encrypted signal |
US5551018A (en) * | 1993-02-02 | 1996-08-27 | Borland International, Inc. | Method of storing national language support text by presorting followed by insertion sorting |
JPH09501517A (en) | 1993-02-08 | 1997-02-10 | アクション・テクノロジーズ・インコーポレーテッド | Method and apparatus for managing business processes |
US5390330A (en) * | 1993-02-11 | 1995-02-14 | Talati; Kirit K. | Control system and method for direct execution of software application information models without code generation |
US5640546A (en) * | 1993-02-23 | 1997-06-17 | Network Programs, Inc. | Composition of systems of objects by interlocking coordination, projection, and distribution |
US5483658A (en) * | 1993-02-26 | 1996-01-09 | Grube; Gary W. | Detection of unauthorized use of software applications in processing devices |
FR2703800B1 (en) | 1993-04-06 | 1995-05-24 | Bull Cp8 | Method for signing a computer file, and device for implementing it. |
JP3255754B2 (en) * | 1993-04-23 | 2002-02-12 | 富士通株式会社 | Electronic trading system |
US5422953A (en) | 1993-05-05 | 1995-06-06 | Fischer; Addison M. | Personal date/time notary device |
US5504837A (en) * | 1993-05-10 | 1996-04-02 | Bell Communications Research, Inc. | Method for resolving conflicts among distributed entities through the generation of counter proposals by transversing a goal hierarchy with acceptable, unacceptable, and indeterminate nodes |
US5583936A (en) | 1993-05-17 | 1996-12-10 | Macrovision Corporation | Video copy protection process enhancement to introduce horizontal and vertical picture distortions |
US5550971A (en) | 1993-06-30 | 1996-08-27 | U S West Technologies, Inc. | Method and system for generating a user interface adaptable to various database management systems |
US5428606A (en) | 1993-06-30 | 1995-06-27 | Moskowitz; Scott A. | Digital information commodities exchange |
US5698504A (en) * | 1993-07-01 | 1997-12-16 | The Procter & Gamble Company | Machine dishwashing composition containing oxygen bleach and paraffin oil and benzotriazole compound silver tarnishing inhibitors |
AU683038B2 (en) * | 1993-08-10 | 1997-10-30 | Addison M. Fischer | A method for operating computers and for processing information among computers |
IL110891A (en) | 1993-09-14 | 1999-03-12 | Spyrus | System and method for data access control |
CA2129075C (en) | 1993-10-18 | 1999-04-20 | Joseph J. Daniele | Electronic copyright royalty accounting system using glyphs |
US5343527A (en) | 1993-10-27 | 1994-08-30 | International Business Machines Corporation | Hybrid encryption method and system for protecting reusable software components |
JPH07212712A (en) | 1993-10-29 | 1995-08-11 | Eastman Kodak Co | Method and equipment for adding and deleting digital watermark in hierarchical picture memory and fetch system |
US5463565A (en) | 1993-10-29 | 1995-10-31 | Time Warner Entertainment Co., L.P. | Data block format for software carrier and player therefor |
US5455953A (en) | 1993-11-03 | 1995-10-03 | Wang Laboratories, Inc. | Authorization system for obtaining in single step both identification and access rights of client to server directly from encrypted authorization ticket |
US5537526A (en) | 1993-11-12 | 1996-07-16 | Taugent, Inc. | Method and apparatus for processing a display document utilizing a system level document framework |
US5748783A (en) * | 1995-05-08 | 1998-05-05 | Digimarc Corporation | Method and apparatus for robust information coding |
US5710834A (en) * | 1995-05-08 | 1998-01-20 | Digimarc Corporation | Method and apparatus responsive to a code signal conveyed through a graphic image |
US5636292C1 (en) * | 1995-05-08 | 2002-06-18 | Digimarc Corp | Steganography methods employing embedded calibration data |
US5748763A (en) * | 1993-11-18 | 1998-05-05 | Digimarc Corporation | Image steganography system featuring perceptually adaptive and globally scalable signal embedding |
US5768426A (en) * | 1993-11-18 | 1998-06-16 | Digimarc Corporation | Graphics processing system employing embedded code signals |
EP0959621B1 (en) | 1993-11-18 | 2001-02-28 | Digimarc Corporation | Video copy control with plural embedded signals |
US5572673A (en) * | 1993-12-01 | 1996-11-05 | Sybase, Inc. | Secure multi-level system for executing stored procedures |
US5491800A (en) * | 1993-12-20 | 1996-02-13 | Taligent, Inc. | Object-oriented remote procedure call networking system |
US5449895A (en) | 1993-12-22 | 1995-09-12 | Xerox Corporation | Explicit synchronization for self-clocking glyph codes |
US5449896A (en) | 1993-12-22 | 1995-09-12 | Xerox Corporation | Random access techniques for use with self-clocking glyph codes |
US5453605A (en) | 1993-12-22 | 1995-09-26 | Xerox Corporation | Global addressability for self-clocking glyph codes |
US5450493A (en) | 1993-12-29 | 1995-09-12 | At&T Corp. | Secure communication method and apparatus |
US5473687A (en) | 1993-12-29 | 1995-12-05 | Infosafe Systems, Inc. | Method for retrieving secure information from a database |
US5513261A (en) * | 1993-12-29 | 1996-04-30 | At&T Corp. | Key management scheme for use with electronic cards |
US5491750A (en) * | 1993-12-30 | 1996-02-13 | International Business Machines Corporation | Method and apparatus for three-party entity authentication and key distribution using message authentication codes |
US5394469A (en) * | 1994-02-18 | 1995-02-28 | Infosafe Systems, Inc. | Method and apparatus for retrieving secure information from mass storage media |
JP2853727B2 (en) | 1994-02-22 | 1999-02-03 | 日本ビクター株式会社 | Reproduction protection method and protection reproduction device |
US5530752A (en) | 1994-02-22 | 1996-06-25 | Convex Computer Corporation | Systems and methods for protecting software from unlicensed copying and use |
US5560005A (en) * | 1994-02-25 | 1996-09-24 | Actamed Corp. | Methods and systems for object-based relational distributed databases |
KR100342120B1 (en) | 1994-02-28 | 2002-11-30 | 소니 가부시끼 가이샤 | Data recording method and apparatus, data recording medium, and data reproducing method and apparatus |
US5499298A (en) * | 1994-03-17 | 1996-03-12 | National University Of Singapore | Controlled dissemination of digital information |
US5533108A (en) * | 1994-03-18 | 1996-07-02 | At&T Corp. | Method and system for routing phone calls based on voice and data transport capability |
DE69500885T2 (en) | 1994-03-21 | 1998-05-20 | Object Technology Licensing Corp., Cupertino, Calif. | METHOD AND DEVICE FOR PROCESSING A DOCUMENT |
US5457736A (en) | 1994-04-12 | 1995-10-10 | U S West Technologies, Inc. | System and method for providing microcellular personal communications services (PCS) utilizing embedded switches |
US5563946A (en) * | 1994-04-25 | 1996-10-08 | International Business Machines Corporation | Method and apparatus for enabling trial period use of software products: method and apparatus for passing encrypted files between data processing systems |
US5539828A (en) | 1994-05-31 | 1996-07-23 | Intel Corporation | Apparatus and method for providing secured communications |
US5473692A (en) | 1994-09-07 | 1995-12-05 | Intel Corporation | Roving software license for a hardware agent |
US5416842A (en) * | 1994-06-10 | 1995-05-16 | Sun Microsystems, Inc. | Method and apparatus for key-management scheme for use with internet protocols at site firewalls |
US5596723A (en) * | 1994-06-23 | 1997-01-21 | Dell Usa, Lp | Method and apparatus for automatically detecting the available network services in a network system |
US5533123A (en) | 1994-06-28 | 1996-07-02 | National Semiconductor Corporation | Programmable distributed personal security |
US5513260A (en) | 1994-06-29 | 1996-04-30 | Macrovision Corporation | Method and apparatus for copy protection for various recording media |
US5739864A (en) | 1994-08-24 | 1998-04-14 | Macrovision Corporation | Apparatus for inserting blanked formatted fingerprint data (source ID, time/date) in to a video signal |
US5999711A (en) | 1994-07-18 | 1999-12-07 | Microsoft Corporation | Method and system for providing certificates holding authentication and authorization information for users/machines |
US5590194A (en) | 1994-08-09 | 1996-12-31 | Macrovision Corporation | Method of and apparatus for scrambling a video signal with full network transmission and recording capability |
US5606609A (en) * | 1994-09-19 | 1997-02-25 | Scientific-Atlanta | Electronic document verification system and method |
US5504757A (en) | 1994-09-27 | 1996-04-02 | International Business Machines Corporation | Method for selecting transmission speeds for transmitting data packets over a serial bus |
ZA958446B (en) | 1994-10-19 | 1996-05-27 | Intergame | A method and system for cashless gaming machine operation |
US5715314A (en) | 1994-10-24 | 1998-02-03 | Open Market, Inc. | Network sales system |
US5572221A (en) * | 1994-10-26 | 1996-11-05 | Telefonaktiebolaget Lm Ericsson | Method and apparatus for detecting and predicting motion of mobile terminals |
US5845065A (en) * | 1994-11-15 | 1998-12-01 | Wrq, Inc. | Network license compliance apparatus and method |
US5638443A (en) * | 1994-11-23 | 1997-06-10 | Xerox Corporation | System for controlling the distribution and use of composite digital works |
US5715403A (en) | 1994-11-23 | 1998-02-03 | Xerox Corporation | System for controlling the distribution and use of digital works having attached usage rights where the usage rights are defined by a usage rights grammar |
US5634012A (en) * | 1994-11-23 | 1997-05-27 | Xerox Corporation | System for controlling the distribution and use of digital works having a fee reporting mechanism |
US5629980A (en) | 1994-11-23 | 1997-05-13 | Xerox Corporation | System for controlling the distribution and use of digital works |
JPH08263438A (en) | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work |
US5553282A (en) * | 1994-12-09 | 1996-09-03 | Taligent, Inc. | Software project history database and method of operation |
US5655077A (en) * | 1994-12-13 | 1997-08-05 | Microsoft Corporation | Method and system for authenticating access to heterogeneous computing services |
US5732400A (en) | 1995-01-04 | 1998-03-24 | Citibank N.A. | System and method for a risk-based purchase of goods |
US5692180A (en) * | 1995-01-31 | 1997-11-25 | International Business Machines Corporation | Object-oriented cell directory database for a distributed computing environment |
JPH08214281A (en) | 1995-02-06 | 1996-08-20 | Sony Corp | Charging method and system |
EP1526472A3 (en) * | 1995-02-13 | 2006-07-26 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US5892900A (en) * | 1996-08-30 | 1999-04-06 | Intertrust Technologies Corp. | Systems and methods for secure transaction management and electronic rights protection |
US6658568B1 (en) * | 1995-02-13 | 2003-12-02 | Intertrust Technologies Corporation | Trusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management |
US7133846B1 (en) | 1995-02-13 | 2006-11-07 | Intertrust Technologies Corp. | Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management |
US5530235A (en) | 1995-02-16 | 1996-06-25 | Xerox Corporation | Interactive contents revealing storage device |
US5732219A (en) * | 1995-03-17 | 1998-03-24 | Vermeer Technologies, Inc. | Computer system and computer-implemented process for remote editing of computer files |
US5870552A (en) * | 1995-03-28 | 1999-02-09 | America Online, Inc. | Method and apparatus for publishing hypermedia documents over wide area networks |
WO1996032685A1 (en) * | 1995-04-11 | 1996-10-17 | Kinetech, Inc. | Identifying data in a data processing system |
US5717604A (en) * | 1995-05-25 | 1998-02-10 | Wiggins; Christopher | Network monitoring system for tracking, billing and recovering licenses |
US5534975A (en) | 1995-05-26 | 1996-07-09 | Xerox Corporation | Document processing system utilizing document service cards to provide document processing services |
US5613004A (en) * | 1995-06-07 | 1997-03-18 | The Dice Company | Steganographic method and device |
US6181867B1 (en) * | 1995-06-07 | 2001-01-30 | Intervu, Inc. | Video storage and retrieval system |
US5664109A (en) * | 1995-06-07 | 1997-09-02 | E-Systems, Inc. | Method for extracting pre-defined data items from medical service records generated by health care providers |
US5592549A (en) * | 1995-06-15 | 1997-01-07 | Infosafe Systems, Inc. | Method and apparatus for retrieving selected information from a secure information source |
US5802497A (en) | 1995-07-10 | 1998-09-01 | Digital Equipment Corporation | Method and apparatus for conducting computerized commerce |
US5671412A (en) * | 1995-07-28 | 1997-09-23 | Globetrotter Software, Incorporated | License management system for software applications |
US5913040A (en) | 1995-08-22 | 1999-06-15 | Backweb Ltd. | Method and apparatus for transmitting and displaying information between a remote network and a local computer |
US6249291B1 (en) * | 1995-09-22 | 2001-06-19 | Next Software, Inc. | Method and apparatus for managing internet transactions |
US5765152A (en) * | 1995-10-13 | 1998-06-09 | Trustees Of Dartmouth College | System and method for managing copyrighted electronic media |
US7047241B1 (en) * | 1995-10-13 | 2006-05-16 | Digimarc Corporation | System and methods for managing digital creative works |
US5742598A (en) * | 1995-10-19 | 1998-04-21 | International Business Machines Corp. | Network for efficiently locating resources and routing service requests received from individual node connections |
US5757914A (en) * | 1995-10-26 | 1998-05-26 | Sun Microsystems, Inc. | System and method for protecting use of dynamically linked executable modules |
US5699528A (en) * | 1995-10-31 | 1997-12-16 | Mastercard International, Inc. | System and method for bill delivery and payment over a communications network |
US5884309A (en) * | 1995-12-06 | 1999-03-16 | Dynamic Web Transaction Systems, Inc. | Order entry system for internet |
JPH09160899A (en) | 1995-12-06 | 1997-06-20 | Matsushita Electric Ind Co Ltd | Information service processor |
US5752041A (en) * | 1995-12-15 | 1998-05-12 | International Business Machines Corporation | Method and system for licensing program management within a distributed data processing system |
US5633932A (en) * | 1995-12-19 | 1997-05-27 | Intel Corporation | Apparatus and method for preventing disclosure through user-authentication at a printing node |
US5765153A (en) * | 1996-01-03 | 1998-06-09 | International Business Machines Corporation | Information handling system, method, and article of manufacture including object system authorization and registration |
US5893910A (en) * | 1996-01-04 | 1999-04-13 | Softguard Enterprises Inc. | Method and apparatus for establishing the legitimacy of use of a block of digitally represented information |
US5754849A (en) * | 1996-01-30 | 1998-05-19 | Wayfarer Communications, Inc. | Self-describing object providing dynamic manipulation of heterogeneous data values and semantic identity between memory and transmission representations |
US5870550A (en) * | 1996-02-26 | 1999-02-09 | Network Engineering Software | Web server employing multi-homed, moldular framework |
US5898830A (en) * | 1996-10-17 | 1999-04-27 | Network Engineering Software | Firewall providing enhanced network security and user transparency |
US5689587A (en) * | 1996-02-09 | 1997-11-18 | Massachusetts Institute Of Technology | Method and apparatus for data hiding in images |
US20060265337A1 (en) * | 1996-02-26 | 2006-11-23 | Graphon Corporation | Automated system for management of licensed digital assets |
US20010011253A1 (en) * | 1998-08-04 | 2001-08-02 | Christopher D. Coley | Automated system for management of licensed software |
US5790664A (en) * | 1996-02-26 | 1998-08-04 | Network Engineering Software, Inc. | Automated system for management of licensed software |
US5862325A (en) | 1996-02-29 | 1999-01-19 | Intermind Corporation | Computer-based communication system and method using metadata defining a control structure |
JP3816571B2 (en) | 1996-03-15 | 2006-08-30 | パイオニア株式会社 | Information recording apparatus, information recording method, information reproducing apparatus, and information reproducing method |
US5758069A (en) * | 1996-03-15 | 1998-05-26 | Novell, Inc. | Electronic licensing system |
US5892899A (en) | 1996-06-13 | 1999-04-06 | Intel Corporation | Tamper resistant methods and apparatus |
US5796941A (en) * | 1996-09-06 | 1998-08-18 | Catalyst Semiconductor, Inc. | Method for supervising software execution in a license restricted environment |
US5925127A (en) * | 1997-04-09 | 1999-07-20 | Microsoft Corporation | Method and system for monitoring the use of rented software |
US6056786A (en) * | 1997-07-11 | 2000-05-02 | International Business Machines Corp. | Technique for monitoring for license compliance for client-server software |
US6289452B1 (en) | 1997-11-07 | 2001-09-11 | Cybersource Corporation | Method and system for delivering digital products electronically |
US6385596B1 (en) * | 1998-02-06 | 2002-05-07 | Liquid Audio, Inc. | Secure online music distribution system |
US6189146B1 (en) * | 1998-03-18 | 2001-02-13 | Microsoft Corporation | System and method for software licensing |
US6009401A (en) * | 1998-04-06 | 1999-12-28 | Preview Systems, Inc. | Relicensing of electronically purchased software |
US6049789A (en) * | 1998-06-24 | 2000-04-11 | Mentor Graphics Corporation | Software pay per use licensing system |
US20020154157A1 (en) | 2000-04-07 | 2002-10-24 | Sherr Scott Jeffrey | Website system and process for selection and delivery of electronic information on a network |
-
1998
- 1998-08-04 US US09/128,652 patent/US20010011253A1/en not_active Abandoned
-
2002
- 2002-02-19 US US10/079,221 patent/US20020161718A1/en not_active Abandoned
-
2005
- 2005-04-19 US US11/109,973 patent/US20050251490A1/en not_active Abandoned
- 2005-04-19 US US11/109,972 patent/US20050251489A1/en not_active Abandoned
- 2005-04-21 US US11/113,360 patent/US20050273436A1/en not_active Abandoned
- 2005-04-22 US US11/113,313 patent/US20050273435A1/en not_active Abandoned
- 2005-04-29 US US11/119,373 patent/US20050273437A1/en not_active Abandoned
- 2005-06-07 US US11/148,005 patent/US20050289074A1/en not_active Abandoned
- 2005-12-07 US US11/297,206 patent/US20060085355A1/en not_active Abandoned
- 2005-12-07 US US11/297,208 patent/US20060085356A1/en not_active Abandoned
- 2005-12-28 US US11/321,835 patent/US20060106731A1/en not_active Abandoned
- 2005-12-28 US US11/321,845 patent/US20060136343A1/en not_active Abandoned
- 2005-12-28 US US11/321,844 patent/US20060122941A1/en not_active Abandoned
- 2005-12-28 US US11/321,843 patent/US20060106732A1/en not_active Abandoned
- 2005-12-28 US US11/321,834 patent/US20060106730A1/en not_active Abandoned
- 2005-12-28 US US11/321,788 patent/US20060122940A1/en not_active Abandoned
- 2005-12-29 US US11/323,846 patent/US20060106733A1/en not_active Abandoned
-
2007
- 2007-01-10 US US11/621,701 patent/US20070112684A1/en not_active Abandoned
- 2007-01-10 US US11/621,734 patent/US8510226B2/en not_active Expired - Fee Related
- 2007-01-17 US US11/623,895 patent/US20070130081A1/en not_active Abandoned
- 2007-01-17 US US11/624,131 patent/US20070130082A1/en not_active Abandoned
-
2013
- 2013-04-04 US US13/857,086 patent/US20130227282A1/en not_active Abandoned
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5426421A (en) * | 1986-04-21 | 1995-06-20 | Gray; William F. | Method of automatically managing a network or remote function-excecuting apparatus from a programable network control center |
US5390297A (en) * | 1987-11-10 | 1995-02-14 | Auto-Trol Technology Corporation | System for controlling the number of concurrent copies of a program in a network based on the number of available licenses |
US5282186A (en) * | 1988-04-25 | 1994-01-25 | Pioneer Electronic Corporation | Method and apparatus for recording and reproducing picture information and recording medium |
US4924378A (en) * | 1988-06-13 | 1990-05-08 | Prime Computer, Inc. | License mangagement system and license storage key |
US5023907A (en) * | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
US5222134A (en) * | 1990-11-07 | 1993-06-22 | Tau Systems Corporation | Secure system for activating personal computer software at remote locations |
US5260999A (en) * | 1991-06-28 | 1993-11-09 | Digital Equipment Corporation | Filters in license management system |
US5509070A (en) * | 1992-12-15 | 1996-04-16 | Softlock Services Inc. | Method for encouraging purchase of executable and non-executable software |
US5495411A (en) * | 1993-12-22 | 1996-02-27 | Ananda; Mohan | Secure software rental system using continuous asynchronous password verification |
US5740549A (en) * | 1995-06-12 | 1998-04-14 | Pointcast, Inc. | Information and advertising distribution system and method |
US6466209B1 (en) * | 1995-12-07 | 2002-10-15 | Ncr Corporation | Method for transparent marking of digital images for storage, retrieval and processing within a computer database |
US5708709A (en) * | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs |
US6893910B1 (en) * | 2003-06-17 | 2005-05-17 | Advanced Micro Devices, Inc. | One step deposition method for high-k dielectric and metal gate electrode |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070198429A1 (en) * | 1996-02-26 | 2007-08-23 | Graphon Nes Sub Llc. | Method for synchronous encryption between a client and a licensing agent |
US8510226B2 (en) | 1996-02-26 | 2013-08-13 | Graphon Corporation | Method for synchronous encryption between a client and a licensing agent |
US20020161718A1 (en) * | 1998-08-04 | 2002-10-31 | Coley Christopher D. | Automated system for management of licensed software |
US20050107898A1 (en) * | 2003-10-31 | 2005-05-19 | Gannon Julie A. | Software enhabled attachments |
US7761921B2 (en) * | 2003-10-31 | 2010-07-20 | Caterpillar Inc | Method and system of enabling a software option on a remote machine |
US20060020555A1 (en) * | 2004-07-26 | 2006-01-26 | Septon Daven W | Monitoring a license proxy |
US20070299779A1 (en) * | 2006-06-27 | 2007-12-27 | Edmund Yu Liang Sung | Method and apparatus for authorizing a software product to be used on a computer system |
US20080270310A1 (en) * | 2006-06-27 | 2008-10-30 | Intuit Inc. | Facilitating dynamic configuration of software products |
US9471756B2 (en) | 2006-06-27 | 2016-10-18 | Intuit Inc. | Method and apparatus for authorizing a software product to be used on a computer system |
US20080027742A1 (en) * | 2006-07-27 | 2008-01-31 | Canon Kabushiki Kaisha | Information processing method, information processing apparatus, computer program and storage medium |
US20090119218A1 (en) * | 2007-11-01 | 2009-05-07 | Nec Infrontia Corporation | License management apparatus, license management method, and license authentication program |
Also Published As
Publication number | Publication date |
---|---|
US20060106730A1 (en) | 2006-05-18 |
US20060106732A1 (en) | 2006-05-18 |
US20050273437A1 (en) | 2005-12-08 |
US20070198429A1 (en) | 2007-08-23 |
US20050289074A1 (en) | 2005-12-29 |
US20060106731A1 (en) | 2006-05-18 |
US20060085356A1 (en) | 2006-04-20 |
US20050251490A1 (en) | 2005-11-10 |
US20060136343A1 (en) | 2006-06-22 |
US20050273435A1 (en) | 2005-12-08 |
US20130227282A1 (en) | 2013-08-29 |
US20020161718A1 (en) | 2002-10-31 |
US20060122940A1 (en) | 2006-06-08 |
US20070112684A1 (en) | 2007-05-17 |
US20070130081A1 (en) | 2007-06-07 |
US20060122941A1 (en) | 2006-06-08 |
US20070130082A1 (en) | 2007-06-07 |
US8510226B2 (en) | 2013-08-13 |
US20010011253A1 (en) | 2001-08-02 |
US20050251489A1 (en) | 2005-11-10 |
US20060085355A1 (en) | 2006-04-20 |
US20050273436A1 (en) | 2005-12-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US8510226B2 (en) | Method for synchronous encryption between a client and a licensing agent | |
US5790664A (en) | Automated system for management of licensed software | |
US20060265337A1 (en) | Automated system for management of licensed digital assets | |
US7809648B2 (en) | System and method for software licensing | |
US7073197B2 (en) | Methods and apparatus for protecting information | |
US7039615B1 (en) | Retail transactions involving digital content in a digital rights management (DRM) system | |
US6189146B1 (en) | System and method for software licensing | |
US7680743B2 (en) | Software application protection by way of a digital rights management (DRM) system | |
US7149722B1 (en) | Retail transactions involving distributed and super-distributed digital content in a digital rights management (DRM) system | |
CA2562725C (en) | Geographic location based licensing system | |
JP3928561B2 (en) | Content distribution system, information processing apparatus or information processing method, and computer program | |
US20050149759A1 (en) | User/product authentication and piracy management system | |
US20040039705A1 (en) | Distributing a software product activation key | |
JP2001067135A (en) | Prevention against illegal usage of function work in electric communication system | |
WO2003040869A2 (en) | User/product authentication and piracy management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |