Computer implemented method and system for controlling use...

Information security – Prevention of unauthorized use of data including prevention...

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S027000, C726S028000, C726S029000, C726S030000, C713S164000, C713S165000, C705S059000

Reexamination Certificate

active

07376971

ABSTRACT:
A method (300) and system for controlling use of software programs on multiple workstations of a network. An agent running on each workstation detects (306) any new process (using a kernel hooking technique), which is started in response to the request of execution of a program (397). The process is suspended (308) and an authorisation to run the program is requested (334) to an associated metering server. The metering server compares (380) the current usage of the product with the respective authorised conditions of use, and answers (382) the agent granting or denying the authorisation to run. The process is accordingly resumed (312), in order to enable the program to start, or aborted (315), so as to prevent execution of the program. In any case, the program is not stopped (but it is prevented from starting); this avoids killing the program while it is performing potentially risky operations.

REFERENCES:
patent: 5671412 (1997-09-01), Christiano
patent: 5673315 (1997-09-01), Wolf
patent: 5758069 (1998-05-01), Olsen
patent: 5790664 (1998-08-01), Coley et al.
patent: 5974549 (1999-10-01), Golan
patent: 6021438 (2000-02-01), Duvvoori et al.
patent: 6411941 (2002-06-01), Mullor et al.
patent: 6574612 (2003-06-01), Baratti et al.
patent: 7120429 (2006-10-01), Minear et al.
patent: 0852349 (1998-08-01), None
patent: PUPA 09-237189 (1997-09-01), None
patent: PUPA 10-171649 (1998-06-01), None
patent: PUPA 2000-057035 (2000-02-01), None
patent: PUPA 2000-305776 (2000-02-01), None
patent: PUPA 2001-142689 (2001-05-01), None
patent: PUPA 2001-222424 (2001-08-01), None
patent: PUPA 2001-236219 (2001-08-01), None
patent: PUPA 06-223040 (2006-08-01), None
Fields, “License Manager Design Document”, Apr. 1992, Retrieved from the Internet on May 25, 2007: <URL: stuff.mit.edu/afs/athena/system/slw/attic/doc/lm.doc>.
Hauser, “Does Licensing Require New Access Control Techniques?”, Nov. 1994, Retrieved from the Internet on May 25, 2007: <URL:http://portal.acm.org/citation.cfm?id=188295>.
“Systems Management Software License Use Management (XSLM)”, The Open Group, Mar. 1999, pp. 1-24, Retrieved from the Internet on May 25, 2007: <URL: http://www.opengroup.org/onlinepubs/009619399/toc.pdf>.
Olsen et al, “Concurrent Access Licensing”, USENIX, Jun. 1988, pp. 287-294.
“Security, License Management and Application Metering Process for Controlling Applications in the DOS Environment”, IBM Technical Disclosure Bulletin, Nov. 1994, pp. 195-199.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Computer implemented method and system for controlling use... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Computer implemented method and system for controlling use..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer implemented method and system for controlling use... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-3983163

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.