Information security – Prevention of unauthorized use of data including prevention...
Reexamination Certificate
2002-10-10
2008-05-20
Barron, Jr., Gilberto (Department: 2132)
Information security
Prevention of unauthorized use of data including prevention...
C726S027000, C726S028000, C726S029000, C726S030000, C713S164000, C713S165000, C705S059000
Reexamination Certificate
active
07376971
ABSTRACT:
A method (300) and system for controlling use of software programs on multiple workstations of a network. An agent running on each workstation detects (306) any new process (using a kernel hooking technique), which is started in response to the request of execution of a program (397). The process is suspended (308) and an authorisation to run the program is requested (334) to an associated metering server. The metering server compares (380) the current usage of the product with the respective authorised conditions of use, and answers (382) the agent granting or denying the authorisation to run. The process is accordingly resumed (312), in order to enable the program to start, or aborted (315), so as to prevent execution of the program. In any case, the program is not stopped (but it is prevented from starting); this avoids killing the program while it is performing potentially risky operations.
REFERENCES:
patent: 5671412 (1997-09-01), Christiano
patent: 5673315 (1997-09-01), Wolf
patent: 5758069 (1998-05-01), Olsen
patent: 5790664 (1998-08-01), Coley et al.
patent: 5974549 (1999-10-01), Golan
patent: 6021438 (2000-02-01), Duvvoori et al.
patent: 6411941 (2002-06-01), Mullor et al.
patent: 6574612 (2003-06-01), Baratti et al.
patent: 7120429 (2006-10-01), Minear et al.
patent: 0852349 (1998-08-01), None
patent: PUPA 09-237189 (1997-09-01), None
patent: PUPA 10-171649 (1998-06-01), None
patent: PUPA 2000-057035 (2000-02-01), None
patent: PUPA 2000-305776 (2000-02-01), None
patent: PUPA 2001-142689 (2001-05-01), None
patent: PUPA 2001-222424 (2001-08-01), None
patent: PUPA 2001-236219 (2001-08-01), None
patent: PUPA 06-223040 (2006-08-01), None
Fields, “License Manager Design Document”, Apr. 1992, Retrieved from the Internet on May 25, 2007: <URL: stuff.mit.edu/afs/athena/system/slw/attic/doc/lm.doc>.
Hauser, “Does Licensing Require New Access Control Techniques?”, Nov. 1994, Retrieved from the Internet on May 25, 2007: <URL:http://portal.acm.org/citation.cfm?id=188295>.
“Systems Management Software License Use Management (XSLM)”, The Open Group, Mar. 1999, pp. 1-24, Retrieved from the Internet on May 25, 2007: <URL: http://www.opengroup.org/onlinepubs/009619399/toc.pdf>.
Olsen et al, “Concurrent Access Licensing”, USENIX, Jun. 1988, pp. 287-294.
“Security, License Management and Application Metering Process for Controlling Applications in the DOS Environment”, IBM Technical Disclosure Bulletin, Nov. 1994, pp. 195-199.
Di Giulio Domenico
Pastorelli Bernardo
Rossi Riccardo
Barron Jr. Gilberto
Dinh Minh
Glanzman Gerald H.
LaBaw Jeffrey S.
Yee Duke W.
LandOfFree
Computer implemented method and system for controlling use... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Computer implemented method and system for controlling use..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Computer implemented method and system for controlling use... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3983163