EP1815640A2 - Delicate metering of computer usage - Google Patents

Delicate metering of computer usage

Info

Publication number
EP1815640A2
EP1815640A2 EP05820090A EP05820090A EP1815640A2 EP 1815640 A2 EP1815640 A2 EP 1815640A2 EP 05820090 A EP05820090 A EP 05820090A EP 05820090 A EP05820090 A EP 05820090A EP 1815640 A2 EP1815640 A2 EP 1815640A2
Authority
EP
European Patent Office
Prior art keywords
computer
usage
activity level
metering
threshold
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
EP05820090A
Other languages
German (de)
French (fr)
Other versions
EP1815640A4 (en
Inventor
Alexander Frank
Thomas G. Phillips
George V. Reilly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Corp
Original Assignee
Microsoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US10/989,122 external-priority patent/US7610631B2/en
Priority claimed from US11/006,837 external-priority patent/US20060165005A1/en
Application filed by Microsoft Corp filed Critical Microsoft Corp
Publication of EP1815640A2 publication Critical patent/EP1815640A2/en
Publication of EP1815640A4 publication Critical patent/EP1815640A4/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/14Payment architectures specially adapted for billing systems
    • G06Q20/145Payments according to the detected use or quantity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/28Pre-payment schemes, e.g. "pay before"

Definitions

  • Pay-as-you-go or pay-per-use business models have been used in many areas of commerce, from cellular telephones to commercial laundromats.
  • a provider for example, a cellular telephone provider, offers the use of hardware (a cellular telephone) at a lower- than-market cost in exchange for a commitment to remain a subscriber to their network.
  • the customer receives a cellular phone for little or no money in exchange for signing a contract to become a subscriber for a given period of time. Over the course of the contract, the service provider recovers the cost of the hardware by charging the consumer for using the cellular phone.
  • the pay-as-you-go business model is built on metering usage. In the case of a cellular telephone provide the metered use is minutes or megabytes of data transported. In a pay-as-you-go business model for computers, where a service provider or underwriter subsidizes the cost of the hardware anticipating future revenue, there are many aspects of usage that can be monitored or metered. However, not all sources of metering data can be uniformly relied on. When data suggests the computer is in use, but is not, the subscriber may not get full value from his or her subscription. Conversely, when the computer is being used but not metered, the service provider does not receive fair compensation.
  • the ability to accurately track usage, especially usage related to a metered contract, may be a significant part of a business model that allows subscribers to purchase and use a computer at a lower-than-market price in exchange for subscription payments.
  • tracking computer usage can lead to some situations where ambiguity exists as to whether a metered condition exists or not.
  • a service provider selling time by minutes of processor usage may require periodic virus scans, which are programmed to run at midnight on Sundays. The hypothetical scan takes 1.5 hours. It is not clear that the subscriber should be charged for CPU usage when a required task is performed with no direct benefit to the subscriber. Similarly, the subscriber may be viewing a long document with almost no processor activity.
  • the subscriber has a direct benefit but according to strict processor activity, the computer may appear inactive.
  • So called "delicate metering" uses a variety of inputs and business rules to reach a decision as to whether to meter the computer or not.
  • a metering program may assess display state, communications, hard disk activity and even the programs being executed by the processor to determine whether usage should be accrued. Some activities may be sufficient by themselves, for example, mouse movement, to activate metering. Others, such as disk access, may need to be evaluated in light of other conditions, such as a virus checker running, before determining whether to meter the computer or not.
  • FIG. 1 is a simplified and representative block diagram of a computer network
  • FIG. 2 is a block diagram of a computer that may be connected to the network of Fig. 1;
  • Fig. 3 is a block diagram of a license provisioning module of the computer of Fig. 2;
  • Fig. 4 is a flow chart depicting a method of metering usage of the computer of Fig. 2;
  • Fig. 5 is a graph depicting a usage profile of the computer of Fig. 2.
  • Fig. 1 illustrates a network 10 that may be used to implement a pay-per ⁇ use computer system.
  • the network 10 may be the Internet, a virtual private network (VPN), or any other network that allows one or more computers, communication devices, databases, etc., to be communicatively connected to each other.
  • the network 10 may be connected to a personal computer 12 and a computer terminal 14 via an Ethernet 16 and a router 18, and a landline 20.
  • the network 10 may be wirelessly connected to a laptop computer 22 and a personal data assistant 24 via a wireless communication station 26 and a wireless link 28.
  • a server 30 may be connected to the network 10 using a communication link 32 and a mainframe 34 may be connected to the network 10 using another communication link 36.
  • Fig. 2 illustrates a computing device in the form of a computer 110 that may be connected to the network 10 and used to implement one or more components of the dynamic software provisioning system.
  • Components of the computer 110 may include, but are not limited to a processing unit 120, a system memory 130, and a system bus 121 that couples various system components including the system memory to the processing unit 120.
  • the system bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures.
  • such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus.
  • ISA Industry Standard Architecture
  • MCA Micro Channel Architecture
  • EISA Enhanced ISA
  • VESA Video Electronics Standards Association
  • PCI Peripheral Component Interconnect
  • the computer 110 may also include a license provisioning module (LPM) 125.
  • LPM license provisioning module
  • the LPM 125 is discussed in greater detail in Fig. 3. Briefly, the LPM 125 facilitates pay-as-you-go or pay-per-use operation of the computer 110.
  • the LPM 125 manages metering usage, imposing sanctions when metered use is expired, and manages the request, receipt, and processing of data for replenishing the computer 110 for additional use.
  • the computer 110 typically includes a variety of computer readable media.
  • Computer readable media can be any available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media.
  • Computer readable media may comprise computer storage media and communication media.
  • Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 110.
  • Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
  • modulated data signal means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
  • communication media includes wired media such as a wired network or direct- wired connection, and wireless media such as acoustic, radio frequency, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
  • the system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132.
  • ROM read only memory
  • RAM random access memory
  • BIOS basic input/output system
  • RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 120.
  • Figure 2 illustrates operating system 134, application programs 135, other program modules 136, and program data 137.
  • the computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media.
  • Figure 2 illustrates a hard disk drive 140 that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive 151 that reads from or writes to a removable, nonvolatile magnetic disk 152, and an optical disk drive 155 that reads from or writes to a removable, nonvolatile optical disk 156 such as a CD ROM or other optical media.
  • removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like.
  • the hard disk drive 141 is typically connected to the system bus 121 through a non-removable memory interface such as interface 140, and magnetic disk drive 151 and optical disk drive 155 are typically connected to the system bus 121 by a removable memory interface, such as interface 150.
  • hard disk drive 141 is illustrated as storing operating system 144, application programs 145, other program modules 146, and program data 147. Note that these components can either be the same as or different from operating system 134, application programs 135, other program modules 136, and program data 137. Operating system 144, application programs 145, other program modules 146, and program data 147 are given different numbers here to illustrate that, at a minimum, they are different copies.
  • a user may enter commands and information into the computer 20 through input devices such as a keyboard 162 and pointing device 161, commonly referred to as a mouse, trackball or touch pad.
  • Another input device may be a camera for sending images over the Internet, known as a web cam 163.
  • Other input devices may include a microphone, joystick, game pad, satellite dish, scanner, or the like.
  • a monitor 191 or other type of display device is also connected to the system bus 121 via an interface, such as a video interface 190.
  • computers may also include other peripheral output devices such as speakers 197 and printer 196, which may be connected through an output peripheral interface 190.
  • the computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180.
  • the remote computer 180 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110, although only a memory storage device 181 has been illustrated in Figure 2.
  • the logical connections depicted in Figure 2 include a local area network (LAN) 171 and a wide area network (WAN) 173, but may also include other networks.
  • LAN local area network
  • WAN wide area network
  • Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet.
  • the computer 110 When used in a LAN networking environment, the computer 110 is connected to the LAN 171 through a network interface or adapter 170. When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173, such as the Internet.
  • the modem 172 which may be internal or external, may be connected to the system bus 121 via the user input interface 160, or other appropriate mechanism.
  • program modules depicted relative to the computer 110, or portions thereof may be stored in the remote memory storage device.
  • Figure 2 illustrates remote application programs 185 as residing on memory device 181. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
  • Fig. 3 illustrates a further detailed block diagram of the license provisioning module (LPM) 125.
  • the LPM 125 may include an enforcement add-on module 252 to enforce the computer 110 to operate in a particular state, a metering module 254 to meter usage of a resource provisioned on the computer 110, a transaction engine 256 to process provisioning packets received from a service provider (not depicted), a secure storage manager 258 to provide secure storage for the provisioning packets, a communication module 260 to communicate with the service provider, and a user experience module 262 to interact with a user.
  • an enforcement add-on module 252 to enforce the computer 110 to operate in a particular state
  • a metering module 254 to meter usage of a resource provisioned on the computer 110
  • a transaction engine 256 to process provisioning packets received from a service provider (not depicted)
  • a secure storage manager 258 to provide secure storage for the provisioning packets
  • a communication module 260 to communicate with the service
  • the enforcement module 252 may be inserted into the login logic 264 of the computer 110. When a user logs onto the computer 110 using the login logic 264, or requests use of a chargeable provisioned resource, the enforcement module 252 may query the metering module 254 for balance information. If the enforcement module 252 determines that the computer 110 has enough value for the requested activity, it may allow the computer 110 to operate in its normal manner and allow the user to log onto the computer 110, or use the requested resource. However, if the enforcement module 252 determines that the computer 110 does not have enough value available, it may deny the login or access to the requested resource and may invoke a user interface to prompt the user to add value to the available balance.
  • the enforcement module 252 may be able to disable or otherwise sanction resources under the direct influence or control of the computer 110. Sanctions related to external peripherals may be enforced by action on an appropriate controller, for example, input or output controllers 170 190 195, but in some cases, the sanction may need to be carried out at the peripheral itself.
  • the metering module 254 may include a balance manager 266 for reading and verifying a current balance available for usage of provisioned resource and for updating the current balance.
  • the metering module 254 may also include a configuration manager 268 for determining valid system configuration information, such as authorized, i.e. chargeable, peripherals.
  • the metering module 254 may also include a reliable clock manager 270 for maintaining an always increasing timer.
  • the metering module 254 may provide the mechanism for monitoring how often, how much, or over what period the computer 110, or components thereof, are used.
  • the metering module 254 may utilize hooks in the operating system to count application starts when usage is metered by application.
  • the metering module 254 may monitor the processing unit 120 cycles or usage to determine how much the computer 110 or an individual application has actually been in operation.
  • the reliable clock manager 270 may be monitored to determine when a given period for authorized use has expired, for example, a calendar month or 30 days.
  • the reliable clock manager 270 may use a reliable hardware clock 272 to accomplish the task of maintaining the monotonically changing timer.
  • the reliable clock manager 270 may be used to provide system time, or may be used to provide time service only for usage metering.
  • the balance manager 266 and the reliable clock manager 270 may be very sensitive and important to the secure operation of the LPM 125, and therefore they are likely to be under various security attacks during the operation of the LPM 125.
  • the enforcement add-on module 252 and the metering module 254 may work together to implement activation and de-activation of the provisioned resource on the computer 110.
  • the enforcement add-on module 252 may function as an event dispatcher that invokes the balance manager 266 based upon certain events, while the balance manager 266 may determine what action to take when it is invoked in response to an event.
  • Examples of various events that may cause the enforcement add-on module 252 to invoke the balance manager 266 are (1) a logon event, (2) a system unlock event, (3) a restore from hibernation event, (4) a wake up from standby event, (5) a user triggered event, such as a request to use a peripheral (6) a logoff event, (7) a packet download, (8) a timer tick, etc.
  • the balance manager 266 may accept the event as an input and return a result action to the enforcement add-on module 252.
  • the transaction engine 256 may process a provisioning packet in order to update a balance in the balance manager 266.
  • the transaction engine 256 may ensure that any provisioning packet is consumed only once to update the balance.
  • the transaction engine 256 may be designed so that it performs atomic update and reconciliation transactions, thus either both the balance and the resource provider accounts are updated or neither the balance and resource provider accounts are updated.
  • the transaction engine 256 may include a digital signature verification circuit 267.
  • the digital signature verification circuit 267 may have circuitry and/or software for decrypting the provisioning packet, whether the provisioning packet is received electronically over the Internet, locally from a local area network, from removable media, entered manually, or another method of transport.
  • PKI public key infrastructure
  • the message may be decrypted, if encrypted, and the hash may be generated and checked against the digital signature to validate the integrity and authenticity of the provisioning packet.
  • the particular encryption algorithm employed, for example, RSATM or elliptic curve, is not significant.
  • Digital signature technology including sender verification and content verification is well known and not covered in detail here.
  • the secured storage manager 258 may allow the LPM 125 to store balance data in a secured manner so that it cannot be tampered with by a user and so that it is accessible only by the LPM 125. After a provisioning packet is downloaded by the LPM 125, it may be stored in the secured storage manager 258. Similarly, the balance counter and the packet consumption counter may also be stored in the secured storage manager 258. The secured storage manager 258 may also store data that is used in the set-up and operation of the local provisioning module 125. Additionally, software for determination of activity levels, the rules or algorithms associated with usage schedules, and their corresponding thresholds may be stored in the secured storage manager 258.
  • this is data that, if compromised, may be used to circumvent the controls for pay-per-use or pre-pay operation.
  • data may be a unique identifier, that may be a number or code that can be used to identify one computer 110 from another.
  • the unique identifier may be used to prepare digitally signed provisioning packets that can only be used with a single machine. Provisioning packets may be data received that add value to the balance manager 266, new or updated usage schedules, or new rules and thresholds for activity evaluation.
  • Some of the data associated with the authentication of provisioning packets may be stored in the secure storage manager 258.
  • a transaction sequence number may be used to discourage or prevent replay attacks.
  • a "no-earlier-than" date may be extracted from the provisioning packet and stored to discourage or prevent clock tampering attacks.
  • the no-earlier-than date may be the date/time that the provisioning packet was created. Because the use of the provisioning packet may not take place before the provisioning packet was created, neither may the clock of the computer 110 be set to a date or time prior to the latest date of the last provisioning packet, after accounting for time zones.
  • State data stored by the secure memory manager 258, may be used to indicate whether the computer 110 is in a fully operational mode or if the computer 110 or an application is under some restriction or sanction. While most software may be stored or executed from general system memory 130 there may some executable code, for example, applications, routines, or drivers that are ideally tamper resistant. For example, a routine that sets the reliable hardware clock 272 may itself need to be protected to prevent tampering and fraud.
  • Metering or usage data created or used by the metering module 254 may need more protection than that offered by system memory 130 and may therefore be stored in the secure storage manager 258.
  • Metering or usage data may include, for example, the number of usage units remaining, the maximum number allowable usage units, a list of metered applications, or a stop time/date. Closely related to metering or subscription data may be the subscription plans. To provide flexibility, users may be allowed to select from a number of subscription plans, as mentioned above. These subscription plans may include use by period, use for a number of hours, use by application using either number of activations or usage, use by input/output (network connectivity), as well as others including combinations of the above.
  • Protection of the subscription plans may be important because it is not desirable for a user to be able to alter or create new plans that could result in fraudulent use.
  • the appropriate business rules may be securely downloaded and stored in the secure storage manager 258.
  • a certificate revocation list (“CRL”) may be used to determine if the current root certificate is valid.
  • the CRL may be securely stored locally to prevent tampering that may allow fraudulent use by presenting a provisioning packet signed by a compromised or non-authorized private key.
  • the public keys of a root certificate are in the public domain and technically do not need protection, in the interest of the integrity of provisioning packet verification, the root certificate may be stored in the secure storage manager 258.
  • the secured storage manager 258 is implemented as a dynamic link library (dll) so that the user experience module 262 can access the secured storage manager 258.
  • a data encryption key may be used to store the data in the secured storage manager 258 and only a module having the data encryption key is able to read the data from the secured storage manager 258.
  • the secured storage manager 258 may communicate with a local security authority (LSA) subsystem 274 to communicate with an LSA database 276, a storage driver 278 to communicate with secure hardware storage 280, and a file system driver 282 to communicate with a file 284 on the computer 110.
  • LSA local security authority
  • an alternate implementation of the secured storage manager 258 may also use multiple copies of the data stored in the secured storage manager 258 so that each copy can be cross-referenced to ensure that there is no tampering with any single copy of the data. While the implementation of the LPM 125 discussed here has the secured storage manager 258 implemented in software, in an alternate implementation, the secured storage manager 258 may be implemented in hardware.
  • the communication module 260 may include a packet/certificate request manager 286 to request provisioning packets and/or certificates or to purchase additional provisioning packets from the service provider, and a web service communication manager 290 that allows the LPM 125 to communicate with the network 10.
  • the packet/certificate request manager 286 may receive a request to download a packet or a certificate.
  • the packet/certificate request manager 286 may also be responsible to acknowledge to the service provider (not depicted) upon successful download of a certificate or a provisioning packet.
  • the packet/certificate request manager 286 may use a provisioning protocol for communication.
  • a packet downloaded by the packet/certificate request manager 286 may be stored in the secured storage manager 258.
  • the purchase manager 288 may allow a user of the computer 110 to add value to the local balance by purchasing provisioning packets by receiving payment information from the user and communicating the payment information to the service provider or a funding account (not depicted).
  • the purchase of a scratch card at a local outlet can be used to add value to the funding account that is then used to create a provisioning packet that is downloaded, verified and used to update the balance.
  • Both the packet/certificate request manager 286 and the purchase manager 288 may communicate with the network 10 using the web service communication manager 290.
  • the web service communication manager may use a network services manager 292 and a network interface card (NIC) 294 to communicate with the network 10.
  • NIC network interface card
  • the web service communication manager 290 is used to communicate with the network 10
  • other communication tools such as file transfer protocol (FTP), etc., may be used to communicate with the network 10.
  • FTP file transfer protocol
  • the user experience module 262 may include an activation user interface (UI) 296 to ask a user to enter an InitKey that allows the packet/certificate request manager 286 to download the certificate from the service provider (not depicted), and a notification UI 298 that allows the LPM 125 to interact with the user.
  • the activation UI 296 may also invoke the purchase manager 288 to allow a user to purchase additional provisioning packets for balance recharging.
  • the notification UI 298 may include various user interfaces that allow the user to query current balance information, usage history, etc.
  • the notification UI 298 may be invoked by the user or by the login logic 264. In a situation where the balance available for using a provisioned resource is low, the login logic 264 may invoke the notification UI 298 to inform the user that an additional purchase may be necessary.
  • the notification UI may be constantly active and it may provide notification service to the user via a taskbar icon, a control panel applet, a balloon pop-up, or by using any other commonly known UI method.
  • the computer 110 measures pay-per-use or other metered use by any of several mechanisms, for example, elapsed usage time, calendar time, application starts, etc.
  • the easiest to measure at least on the surface, may be simple time of operation. For example, 10 hours of pre-paid use may be purchased and provisioned in the balance manager 266. The time of use may be measured and subtracted from the total accumulated balance. When the 10 hours of use is consumed, the enforcement module 252 may cause the computer 110 to cease operation, or enforce another sanction as discussed above.
  • the accuracy of the measurement may be a major point of customer satisfaction. If the measurement favors the service provider, customers may become disgruntled and open to competitive offerings. On the other hand, if the measurement favors the customer, the service provider may not realize its financial goals.
  • Fig. 4 is a flow chart depicting a method of metering usage of the computer 110.
  • the computer 110 or more specifically, the balance manager 266, may measure 302 usage of the computer according to a first usage schedule.
  • the usage schedule may be equal to straight usage, for example, one minute of paid time is deducted for each minute of measured use. Alternatively, the usage schedule may convert between currency and time, such as one cent per minute.
  • the first usage schedule may represent multiple rates and special terms, for example, in yet another embodiment the usage schedule may accommodate discounts, e.g. one cent per minute for the first 60 minutes and 0.5 cents per minute after the first 60 minutes. As may be obvious, other operations are associated with measuring 302 usage.
  • Usage may be recorded 304 as well as related information that may be useful in recovering data during an unexpected interruption in service, such as power outage. Such related information may include the time between measurements.
  • Activity level may also be monitored 306. If activity level is above a threshold, the yes branch may be taken and usage measurement continued at block 302. Monitoring the activity level may include monitoring the state of more than one component in the computer 110 to attempt to gain a more complete picture of the overall state of the computer 100.
  • the activity level of the computer 110 may correspond the activity level of one or a combination of devices such as an input device 161 162, a printer 196, a web camera 163, a hard disk drive 141, a communications device 170 172, and a processing unit 120.
  • Each component may have separate levels of activity, or individual thresholds that contribute to an overall threshold level, for use in the final metering decision.
  • input from a mouse 161 may always be interpreted as activity above a usage threshold.
  • activity from a set of primary devices, such as input devices 161 162 is sensed below a threshold of activity the no branch from block 306 may be taken.
  • Activity may be further evaluated 308 to determine if secondary activity indicates the overall activity is below the threshold.
  • all the monitored activity levels must be below their respective thresholds for the balance manager 266 to cease deductions from the usage balance.
  • the rules for this determination may be more complex, as illustrated below.
  • the activity level of another component such as the processing unit 120
  • the rules may cause the yes branch at block 308 to be taken.
  • the balance manager 266 may meter according to a second usage schedule. That is, the balance manager 266 may deduct from the usage balance at a second rate, for example, 10% of the first rate or the balance manager 266 could stop deducting from the usage balance altogether.
  • the actual usage schedule in use at any given moment may be selected any of a number of usage schedules according to various rules and/or contractual stipulations.
  • the activity level of another component may be below the threshold for activity, but an analysis of the processing unit 120 activity at block 308 shows an image capture program is running that is periodically processing pictures from a camera and posting them to a web site.
  • Operating a web-cam may be an example of a low activity use of the computer that, perhaps by contract, is counted as active use and therefore the no branch from block 308 may be taken andthe balance manager 266 may continue to deduct from the usage balance even though no user may be physically using the computer 110.
  • the rules may allow web-cam usage to be metered according to a second or third usage schedule, in this example, lower than the rate of the first usage schedule but above not deducting at all. It is apparent that multiple usage schedules and corresponding metering rates may be developed based on the rules and analysis of usage activity.
  • a graph depicting an activity profile illustrates analysis of the activity level of the computer 110.
  • An exemplary profile 402 of overall activity level of the computer 110 vs. time shows activity level falling below a threshold level 404 for a period of time and then rising again above the activity threshold.
  • the rules require that the activity level remain below the threshold for a period of time "A" 406 before the usage switches from metering using the first usage schedule, as depicted by graph segment 408, before switching to the second usage schedule, depicted by graph segment 410.
  • the delay may allow determination that the user has left the computer 110 rather than being present and reading a page of text.
  • the duration of the period "A" 406 may be used by the balance manager 266 to adjust the usage balance after switching to the second usage schedule.
  • the delay period "A" 406 may be credited to the user's usage balance. Thereby, the user is given credit for the time utilized to satisfy inactivity requirements before switching to the second usage schedule.
  • the balance manager 266 may subtract or debit the usage balance, for example, when a lag occurs when transitioning from non-metered to metered rates.
  • the balance manager 266 may return to metering according to the first usage schedule when the activity level returns above the threshold 404, as depicted by graph segment 412.
  • the usage profile of Fig. 5 may be representative of the overall activity level of the computer. Similarly, as discussed above, the usage profile of Fig. 5 may represent one of many usage profiles. For example, usage profiles may be maintained for a hard disk drive 141, a communications device 170 172, or the processing unit 120, to name a few component-level devices. To make even finer grain evaluations, usage profiles may be made at the subcomponent level, for example, a range of system memory 132 or a sector of hard disk drive 141 storage . The usage profiles may be evaluated singly, as discussed above, or may use a straight or weighted sum to arrive at an overall decision regarding metering.
  • the length of time a component or resource must be idle may be varied, e.g. period "A" 406 may be shorter or longer depending on the component.
  • the vertical axis of the usage profile represent a simple two-value on/off scale, or may have a discrete measurement values such as percent change per unit time, for example, percent change of contents of a range of memory, such as memory 132.
  • the balance manager 266 may adjust 310 the balance according to any delay that may be imposed by the rules for determining the activity level. When all the criteria have been met, the balance manager 266 may then measure usage 312 according to the second usage schedule, that is, deduct value from the balance at a different rate, or not at all. When an event occurs 314 that moves the activity level above the threshold again, measurement may be returned to the rate according to the first usage schedule at block 302.

Abstract

A pay-per-use or metered-use computer uses a balance manager to monitor usage and update a value balance according to a first usage schedule when the computer is in active use. When the activity level of the computer is reduced below a threshold, the balance manager may update the value balance according to a second usage schedule. Activity level of the computer is determined by monitoring the activity level of a one or more components of the computer including input devices, communication controllers, and the processing unit. Rules can be applied to determine when to switch between usage schedules and if credits to the value balance should be made.

Description

DELICATE METERING OF COMPUTER USAGE
[0001] This patent is a continuation-in-part of United States Patent Application No. 11/006,837, filed December 8, 2004, which is a continuation-in-part of United States Patent Application No. 10/989,122, filed November 15, 2004.
BACKGROUND
[0002] Pay-as-you-go or pay-per-use business models have been used in many areas of commerce, from cellular telephones to commercial laundromats. In developing a pay-as-you go business, a provider, for example, a cellular telephone provider, offers the use of hardware (a cellular telephone) at a lower- than-market cost in exchange for a commitment to remain a subscriber to their network. In this specific example, the customer receives a cellular phone for little or no money in exchange for signing a contract to become a subscriber for a given period of time. Over the course of the contract, the service provider recovers the cost of the hardware by charging the consumer for using the cellular phone.
[0003] The pay-as-you-go business model is built on metering usage. In the case of a cellular telephone provide the metered use is minutes or megabytes of data transported. In a pay-as-you-go business model for computers, where a service provider or underwriter subsidizes the cost of the hardware anticipating future revenue, there are many aspects of usage that can be monitored or metered. However, not all sources of metering data can be uniformly relied on. When data suggests the computer is in use, but is not, the subscriber may not get full value from his or her subscription. Conversely, when the computer is being used but not metered, the service provider does not receive fair compensation.
SUMMARY
[0004] The ability to accurately track usage, especially usage related to a metered contract, may be a significant part of a business model that allows subscribers to purchase and use a computer at a lower-than-market price in exchange for subscription payments. However, tracking computer usage can lead to some situations where ambiguity exists as to whether a metered condition exists or not. For example, a service provider selling time by minutes of processor usage may require periodic virus scans, which are programmed to run at midnight on Sundays. The hypothetical scan takes 1.5 hours. It is not clear that the subscriber should be charged for CPU usage when a required task is performed with no direct benefit to the subscriber. Similarly, the subscriber may be viewing a long document with almost no processor activity. Here, the subscriber has a direct benefit but according to strict processor activity, the computer may appear inactive. So called "delicate metering" uses a variety of inputs and business rules to reach a decision as to whether to meter the computer or not. A metering program may assess display state, communications, hard disk activity and even the programs being executed by the processor to determine whether usage should be accrued. Some activities may be sufficient by themselves, for example, mouse movement, to activate metering. Others, such as disk access, may need to be evaluated in light of other conditions, such as a virus checker running, before determining whether to meter the computer or not.
BRIEF DESCRIPTION OF THE DRAWINGS
[0005] Fig. 1 is a simplified and representative block diagram of a computer network;
[0006] Fig. 2 is a block diagram of a computer that may be connected to the network of Fig. 1;
[0007] Fig. 3 is a block diagram of a license provisioning module of the computer of Fig. 2;
[0008] Fig. 4 is a flow chart depicting a method of metering usage of the computer of Fig. 2; and
[0009] Fig. 5 is a graph depicting a usage profile of the computer of Fig. 2. [0010] DETAILED DESCRIPTION OF VARIOUS EMBODIMENTS
[0011] Although the following text sets forth a detailed description of numerous different embodiments, it should be understood that the legal scope of the description is defined by the words of the claims set forth at the end of this disclosure. The detailed description is to be construed as exemplary only and does not describe every possible embodiment since describing every possible embodiment would be impractical, if not impossible. Numerous alternative embodiments could be implemented, using either current technology or technology developed after the filing date of this patent, which would still fall within the scope of the claims.
[0012] It should also be understood that, unless a term is expressly defined in this patent using the sentence "As used herein, the term ' ' is hereby defined to mean..." or a similar sentence, there is no intent to limit the meaning of that term, either expressly or by implication, beyond its plain or ordinary meaning, and such term should not be interpreted to be limited in scope based on any statement made in any section of this patent (other than the language of the claims). To the extent that any term recited in the claims at the end of this patent is referred to in this patent in a manner consistent with a single meaning, that is done for sake of clarity only so as to not confuse the reader, and it is not intended that such claim term by limited, by implication or otherwise, to that single meaning. Finally, unless a claim element is defined by reciting the word "means" and a function without the recital of any structure, it is not intended that the scope of any claim element be interpreted based on the application of 35 U.S. C. § 112, sixth paragraph.
[0013] Much of the inventive functionality and many of the inventive principles are best implemented with or in software programs or instructions and integrated circuits (ICs) such as application specific ICs. It is expected that one of ordinary skill, notwithstanding possibly significant effort and many design choices motivated by, for example, available time, current technology, and economic considerations, when guided by the concepts and principles disclosed herein will be readily capable of generating such software instructions and programs and ICs with minimal experimentation. Therefore, in the interest of brevity and minimization of any risk of obscuring the principles and concepts in accordance to the present invention, further discussion of such software and ICs, if any, will be limited to the essentials with respect to the principles and concepts of the preferred embodiments.
[0014] Fig. 1 illustrates a network 10 that may be used to implement a pay-per¬ use computer system. The network 10 may be the Internet, a virtual private network (VPN), or any other network that allows one or more computers, communication devices, databases, etc., to be communicatively connected to each other. The network 10 may be connected to a personal computer 12 and a computer terminal 14 via an Ethernet 16 and a router 18, and a landline 20. On the other hand, the network 10 may be wirelessly connected to a laptop computer 22 and a personal data assistant 24 via a wireless communication station 26 and a wireless link 28. Similarly, a server 30 may be connected to the network 10 using a communication link 32 and a mainframe 34 may be connected to the network 10 using another communication link 36.
[0015] Fig. 2 illustrates a computing device in the form of a computer 110 that may be connected to the network 10 and used to implement one or more components of the dynamic software provisioning system. Components of the computer 110 may include, but are not limited to a processing unit 120, a system memory 130, and a system bus 121 that couples various system components including the system memory to the processing unit 120. The system bus 121 may be any of several types of bus structures including a memory bus or memory controller, a peripheral bus, and a local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus also known as Mezzanine bus.
[0016] The computer 110 may also include a license provisioning module (LPM) 125. The LPM 125 is discussed in greater detail in Fig. 3. Briefly, the LPM 125 facilitates pay-as-you-go or pay-per-use operation of the computer 110. The LPM 125 manages metering usage, imposing sanctions when metered use is expired, and manages the request, receipt, and processing of data for replenishing the computer 110 for additional use.
[0017] The computer 110 typically includes a variety of computer readable media. Computer readable media can be any available media that can be accessed by computer 110 and includes both volatile and nonvolatile media, removable and non-removable media. By way of example, and not limitation, computer readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital versatile disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by computer 110. Communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media includes wired media such as a wired network or direct- wired connection, and wireless media such as acoustic, radio frequency, infrared and other wireless media. Combinations of the any of the above should also be included within the scope of computer readable media.
[0018] The system memory 130 includes computer storage media in the form of volatile and/or nonvolatile memory such as read only memory (ROM) 131 and random access memory (RAM) 132. A basic input/output system 133 (BIOS), containing the basic routines that help to transfer information between elements within computer 110, such as during start-up, is typically stored in ROM 131. RAM 132 typically contains data and/or program modules that are immediately accessible to and/or presently being operated on by processing unit 120. By way of example, and not limitation, Figure 2 illustrates operating system 134, application programs 135, other program modules 136, and program data 137.
[0019] The computer 110 may also include other removable/non-removable, volatile/nonvolatile computer storage media. By way of example only, Figure 2 illustrates a hard disk drive 140 that reads from or writes to non-removable, nonvolatile magnetic media, a magnetic disk drive 151 that reads from or writes to a removable, nonvolatile magnetic disk 152, and an optical disk drive 155 that reads from or writes to a removable, nonvolatile optical disk 156 such as a CD ROM or other optical media. Other removable/non-removable, volatile/nonvolatile computer storage media that can be used in the exemplary operating environment include, but are not limited to, magnetic tape cassettes, flash memory cards, digital versatile disks, digital video tape, solid state RAM, solid state ROM, and the like. The hard disk drive 141 is typically connected to the system bus 121 through a non-removable memory interface such as interface 140, and magnetic disk drive 151 and optical disk drive 155 are typically connected to the system bus 121 by a removable memory interface, such as interface 150.
[0020] The drives and their associated computer storage media discussed above and illustrated in Figure 2, provide storage of computer readable instructions, data structures, program modules and other data for the computer 110. In Figure 2, for example, hard disk drive 141 is illustrated as storing operating system 144, application programs 145, other program modules 146, and program data 147. Note that these components can either be the same as or different from operating system 134, application programs 135, other program modules 136, and program data 137. Operating system 144, application programs 145, other program modules 146, and program data 147 are given different numbers here to illustrate that, at a minimum, they are different copies. A user may enter commands and information into the computer 20 through input devices such as a keyboard 162 and pointing device 161, commonly referred to as a mouse, trackball or touch pad. Another input device may be a camera for sending images over the Internet, known as a web cam 163. Other input devices (not shown) may include a microphone, joystick, game pad, satellite dish, scanner, or the like. These and other input devices are often connected to the processing unit 120 through a user input interface 160 that is coupled to the system bus, but may be connected by other interface and bus structures, such as a parallel port, game port or a universal serial bus (USB). A monitor 191 or other type of display device is also connected to the system bus 121 via an interface, such as a video interface 190. In addition to the monitor, computers may also include other peripheral output devices such as speakers 197 and printer 196, which may be connected through an output peripheral interface 190.
[0021] The computer 110 may operate in a networked environment using logical connections to one or more remote computers, such as a remote computer 180. The remote computer 180 may be a personal computer, a server, a router, a network PC, a peer device or other common network node, and typically includes many or all of the elements described above relative to the computer 110, although only a memory storage device 181 has been illustrated in Figure 2. The logical connections depicted in Figure 2 include a local area network (LAN) 171 and a wide area network (WAN) 173, but may also include other networks. Such networking environments are commonplace in offices, enterprise-wide computer networks, intranets and the Internet. [0022] When used in a LAN networking environment, the computer 110 is connected to the LAN 171 through a network interface or adapter 170. When used in a WAN networking environment, the computer 110 typically includes a modem 172 or other means for establishing communications over the WAN 173, such as the Internet. The modem 172, which may be internal or external, may be connected to the system bus 121 via the user input interface 160, or other appropriate mechanism. In a networked environment, program modules depicted relative to the computer 110, or portions thereof, may be stored in the remote memory storage device. By way of example, and not limitation, Figure 2 illustrates remote application programs 185 as residing on memory device 181. It will be appreciated that the network connections shown are exemplary and other means of establishing a communications link between the computers may be used.
[0023] Fig. 3 illustrates a further detailed block diagram of the license provisioning module (LPM) 125. Specifically, the LPM 125 may include an enforcement add-on module 252 to enforce the computer 110 to operate in a particular state, a metering module 254 to meter usage of a resource provisioned on the computer 110, a transaction engine 256 to process provisioning packets received from a service provider (not depicted), a secure storage manager 258 to provide secure storage for the provisioning packets, a communication module 260 to communicate with the service provider, and a user experience module 262 to interact with a user.
[0024] The enforcement module 252 may be inserted into the login logic 264 of the computer 110. When a user logs onto the computer 110 using the login logic 264, or requests use of a chargeable provisioned resource, the enforcement module 252 may query the metering module 254 for balance information. If the enforcement module 252 determines that the computer 110 has enough value for the requested activity, it may allow the computer 110 to operate in its normal manner and allow the user to log onto the computer 110, or use the requested resource. However, if the enforcement module 252 determines that the computer 110 does not have enough value available, it may deny the login or access to the requested resource and may invoke a user interface to prompt the user to add value to the available balance.
[0025] To carry out the enforcement task, the enforcement module 252 may be able to disable or otherwise sanction resources under the direct influence or control of the computer 110. Sanctions related to external peripherals may be enforced by action on an appropriate controller, for example, input or output controllers 170 190 195, but in some cases, the sanction may need to be carried out at the peripheral itself.
[0026] The metering module 254 may include a balance manager 266 for reading and verifying a current balance available for usage of provisioned resource and for updating the current balance. The metering module 254 may also include a configuration manager 268 for determining valid system configuration information, such as authorized, i.e. chargeable, peripherals. The metering module 254 may also include a reliable clock manager 270 for maintaining an always increasing timer. The metering module 254 may provide the mechanism for monitoring how often, how much, or over what period the computer 110, or components thereof, are used. The metering module 254 may utilize hooks in the operating system to count application starts when usage is metered by application. Alternately, the metering module 254 may monitor the processing unit 120 cycles or usage to determine how much the computer 110 or an individual application has actually been in operation. In another alternate embodiment, the reliable clock manager 270 may be monitored to determine when a given period for authorized use has expired, for example, a calendar month or 30 days.
[0027] The reliable clock manager 270 may use a reliable hardware clock 272 to accomplish the task of maintaining the monotonically changing timer. The reliable clock manager 270 may be used to provide system time, or may be used to provide time service only for usage metering. The balance manager 266 and the reliable clock manager 270 may be very sensitive and important to the secure operation of the LPM 125, and therefore they are likely to be under various security attacks during the operation of the LPM 125.
[0028] The enforcement add-on module 252 and the metering module 254 may work together to implement activation and de-activation of the provisioned resource on the computer 110. The enforcement add-on module 252 may function as an event dispatcher that invokes the balance manager 266 based upon certain events, while the balance manager 266 may determine what action to take when it is invoked in response to an event. Examples of various events that may cause the enforcement add-on module 252 to invoke the balance manager 266 are (1) a logon event, (2) a system unlock event, (3) a restore from hibernation event, (4) a wake up from standby event, (5) a user triggered event, such as a request to use a peripheral (6) a logoff event, (7) a packet download, (8) a timer tick, etc. The balance manager 266 may accept the event as an input and return a result action to the enforcement add-on module 252.
[0029] The transaction engine 256 may process a provisioning packet in order to update a balance in the balance manager 266. The transaction engine 256 may ensure that any provisioning packet is consumed only once to update the balance. The transaction engine 256 may be designed so that it performs atomic update and reconciliation transactions, thus either both the balance and the resource provider accounts are updated or neither the balance and resource provider accounts are updated.
[0030] To process provisioning packets, the transaction engine 256 may include a digital signature verification circuit 267. The digital signature verification circuit 267 may have circuitry and/or software for decrypting the provisioning packet, whether the provisioning packet is received electronically over the Internet, locally from a local area network, from removable media, entered manually, or another method of transport. When using traditional public key infrastructure ("PKI") the message may be decrypted, if encrypted, and the hash may be generated and checked against the digital signature to validate the integrity and authenticity of the provisioning packet. The particular encryption algorithm employed, for example, RSA™ or elliptic curve, is not significant. Digital signature technology including sender verification and content verification is well known and not covered in detail here.
[0031] The secured storage manager 258 may allow the LPM 125 to store balance data in a secured manner so that it cannot be tampered with by a user and so that it is accessible only by the LPM 125. After a provisioning packet is downloaded by the LPM 125, it may be stored in the secured storage manager 258. Similarly, the balance counter and the packet consumption counter may also be stored in the secured storage manager 258. The secured storage manager 258 may also store data that is used in the set-up and operation of the local provisioning module 125. Additionally, software for determination of activity levels, the rules or algorithms associated with usage schedules, and their corresponding thresholds may be stored in the secured storage manager 258. In general, this is data that, if compromised, may be used to circumvent the controls for pay-per-use or pre-pay operation. Among such data may be a unique identifier, that may be a number or code that can be used to identify one computer 110 from another. The unique identifier may be used to prepare digitally signed provisioning packets that can only be used with a single machine. Provisioning packets may be data received that add value to the balance manager 266, new or updated usage schedules, or new rules and thresholds for activity evaluation.
[0032] Some of the data associated with the authentication of provisioning packets may be stored in the secure storage manager 258. For example, a transaction sequence number may be used to discourage or prevent replay attacks. In addition, a "no-earlier-than" date may be extracted from the provisioning packet and stored to discourage or prevent clock tampering attacks. In one embodiment, the no-earlier-than date may be the date/time that the provisioning packet was created. Because the use of the provisioning packet may not take place before the provisioning packet was created, neither may the clock of the computer 110 be set to a date or time prior to the latest date of the last provisioning packet, after accounting for time zones.
[0033] State data, stored by the secure memory manager 258, may be used to indicate whether the computer 110 is in a fully operational mode or if the computer 110 or an application is under some restriction or sanction. While most software may be stored or executed from general system memory 130 there may some executable code, for example, applications, routines, or drivers that are ideally tamper resistant. For example, a routine that sets the reliable hardware clock 272 may itself need to be protected to prevent tampering and fraud.
[0034] Metering or usage data created or used by the metering module 254 may need more protection than that offered by system memory 130 and may therefore be stored in the secure storage manager 258. Metering or usage data may include, for example, the number of usage units remaining, the maximum number allowable usage units, a list of metered applications, or a stop time/date. Closely related to metering or subscription data may be the subscription plans. To provide flexibility, users may be allowed to select from a number of subscription plans, as mentioned above. These subscription plans may include use by period, use for a number of hours, use by application using either number of activations or usage, use by input/output (network connectivity), as well as others including combinations of the above. Protection of the subscription plans may be important because it is not desirable for a user to be able to alter or create new plans that could result in fraudulent use. When a subscription plan calls for pay-per-use or metered-use, the appropriate business rules, if not present, may be securely downloaded and stored in the secure storage manager 258.
[0035] A certificate revocation list ("CRL") may be used to determine if the current root certificate is valid. When not retrieved real-time from a host, the CRL may be securely stored locally to prevent tampering that may allow fraudulent use by presenting a provisioning packet signed by a compromised or non-authorized private key. While the public keys of a root certificate are in the public domain and technically do not need protection, in the interest of the integrity of provisioning packet verification, the root certificate may be stored in the secure storage manager 258. In the illustrated implementation, the secured storage manager 258 is implemented as a dynamic link library (dll) so that the user experience module 262 can access the secured storage manager 258.
[0036] To ensure that the data stored in the secured storage manager 258 is secure, a data encryption key may be used to store the data in the secured storage manager 258 and only a module having the data encryption key is able to read the data from the secured storage manager 258. The secured storage manager 258 may communicate with a local security authority (LSA) subsystem 274 to communicate with an LSA database 276, a storage driver 278 to communicate with secure hardware storage 280, and a file system driver 282 to communicate with a file 284 on the computer 110. For added security, an alternate implementation of the secured storage manager 258 may also use multiple copies of the data stored in the secured storage manager 258 so that each copy can be cross-referenced to ensure that there is no tampering with any single copy of the data. While the implementation of the LPM 125 discussed here has the secured storage manager 258 implemented in software, in an alternate implementation, the secured storage manager 258 may be implemented in hardware.
[0037] The communication module 260 may include a packet/certificate request manager 286 to request provisioning packets and/or certificates or to purchase additional provisioning packets from the service provider, and a web service communication manager 290 that allows the LPM 125 to communicate with the network 10.
[0038] The packet/certificate request manager 286 may receive a request to download a packet or a certificate. The packet/certificate request manager 286 may also be responsible to acknowledge to the service provider (not depicted) upon successful download of a certificate or a provisioning packet. The packet/certificate request manager 286 may use a provisioning protocol for communication. A packet downloaded by the packet/certificate request manager 286 may be stored in the secured storage manager 258. [0039] The purchase manager 288 may allow a user of the computer 110 to add value to the local balance by purchasing provisioning packets by receiving payment information from the user and communicating the payment information to the service provider or a funding account (not depicted). For example, the purchase of a scratch card at a local outlet can be used to add value to the funding account that is then used to create a provisioning packet that is downloaded, verified and used to update the balance. Both the packet/certificate request manager 286 and the purchase manager 288 may communicate with the network 10 using the web service communication manager 290. The web service communication manager may use a network services manager 292 and a network interface card (NIC) 294 to communicate with the network 10. Note that in one implementation, the web service communication manager 290 is used to communicate with the network 10, in another implementation, other communication tools, such as file transfer protocol (FTP), etc., may be used to communicate with the network 10.
[0040] The user experience module 262 may include an activation user interface (UI) 296 to ask a user to enter an InitKey that allows the packet/certificate request manager 286 to download the certificate from the service provider (not depicted), and a notification UI 298 that allows the LPM 125 to interact with the user. The activation UI 296 may also invoke the purchase manager 288 to allow a user to purchase additional provisioning packets for balance recharging.
[0041] The notification UI 298 may include various user interfaces that allow the user to query current balance information, usage history, etc. The notification UI 298 may be invoked by the user or by the login logic 264. In a situation where the balance available for using a provisioned resource is low, the login logic 264 may invoke the notification UI 298 to inform the user that an additional purchase may be necessary. The notification UI may be constantly active and it may provide notification service to the user via a taskbar icon, a control panel applet, a balloon pop-up, or by using any other commonly known UI method. [0042] In operation, the computer 110 measures pay-per-use or other metered use by any of several mechanisms, for example, elapsed usage time, calendar time, application starts, etc. Perhaps the easiest to measure, at least on the surface, may be simple time of operation. For example, 10 hours of pre-paid use may be purchased and provisioned in the balance manager 266. The time of use may be measured and subtracted from the total accumulated balance. When the 10 hours of use is consumed, the enforcement module 252 may cause the computer 110 to cease operation, or enforce another sanction as discussed above.
[0043] When tracking and recording any metric for determining pay-per-use, the accuracy of the measurement may be a major point of customer satisfaction. If the measurement favors the service provider, customers may become disgruntled and open to competitive offerings. On the other hand, if the measurement favors the customer, the service provider may not realize its financial goals.
[0044] As discussed above, the use of the most obvious techniques, particularly for measuring time, may be subject to errors due to interpretation of the conditions monitored. To help ensure fair metering that attempts to accurately meter computer usage, particularly time, a number of criteria may be analyzed to determine whether usage should be measured or not.
[0045] Fig. 4 is a flow chart depicting a method of metering usage of the computer 110. The computer 110 or more specifically, the balance manager 266, may measure 302 usage of the computer according to a first usage schedule. The usage schedule may be equal to straight usage, for example, one minute of paid time is deducted for each minute of measured use. Alternatively, the usage schedule may convert between currency and time, such as one cent per minute. The first usage schedule may represent multiple rates and special terms, for example, in yet another embodiment the usage schedule may accommodate discounts, e.g. one cent per minute for the first 60 minutes and 0.5 cents per minute after the first 60 minutes. As may be obvious, other operations are associated with measuring 302 usage. For example, as measurements are taken, comparisons to allowed usage may be made and warnings or sanctions related to the consumption of pre-paid use may be carried out in parallel with the steps outlined herein. Such activities are discussed at length in related application 11/006,837, referenced above, and are not discussed herein to allow a clear description of the present concepts.
[0046] Usage may be recorded 304 as well as related information that may be useful in recovering data during an unexpected interruption in service, such as power outage. Such related information may include the time between measurements. Activity level may also be monitored 306. If activity level is above a threshold, the yes branch may be taken and usage measurement continued at block 302. Monitoring the activity level may include monitoring the state of more than one component in the computer 110 to attempt to gain a more complete picture of the overall state of the computer 100. The activity level of the computer 110 may correspond the activity level of one or a combination of devices such as an input device 161 162, a printer 196, a web camera 163, a hard disk drive 141, a communications device 170 172, and a processing unit 120. Each component may have separate levels of activity, or individual thresholds that contribute to an overall threshold level, for use in the final metering decision. For the sake of illustration, input from a mouse 161 may always be interpreted as activity above a usage threshold. When activity from a set of primary devices, such as input devices 161 162, is sensed below a threshold of activity the no branch from block 306 may be taken. Activity may be further evaluated 308 to determine if secondary activity indicates the overall activity is below the threshold. In the simplest case, all the monitored activity levels must be below their respective thresholds for the balance manager 266 to cease deductions from the usage balance. However, the rules for this determination may be more complex, as illustrated below.
[0047] When performing the further evaluation at block 308, the activity level of another component, such as the processing unit 120, may be above the typical threshold, but if the bulk of its activity is attributed to a known background process, such as a screen saver, a virus checker, a software update process, housekeeping utilities, etc., the rules may cause the yes branch at block 308 to be taken. Ultimately then, the balance manager 266 may meter according to a second usage schedule. That is, the balance manager 266 may deduct from the usage balance at a second rate, for example, 10% of the first rate or the balance manager 266 could stop deducting from the usage balance altogether. The actual usage schedule in use at any given moment may be selected any of a number of usage schedules according to various rules and/or contractual stipulations.
[0048] In contrast, after other indicators of inactivity are observed at block 306, the activity level of another component, for example again, the processing unit 120, may be below the threshold for activity, but an analysis of the processing unit 120 activity at block 308 shows an image capture program is running that is periodically processing pictures from a camera and posting them to a web site. Operating a web-cam may be an example of a low activity use of the computer that, perhaps by contract, is counted as active use and therefore the no branch from block 308 may be taken andthe balance manager 266 may continue to deduct from the usage balance even though no user may be physically using the computer 110. Alternately, the rules may allow web-cam usage to be metered according to a second or third usage schedule, in this example, lower than the rate of the first usage schedule but above not deducting at all. It is apparent that multiple usage schedules and corresponding metering rates may be developed based on the rules and analysis of usage activity.
[0049] Referring briefly to Fig. 5, a graph depicting an activity profile illustrates analysis of the activity level of the computer 110. An exemplary profile 402 of overall activity level of the computer 110 vs. time shows activity level falling below a threshold level 404 for a period of time and then rising again above the activity threshold. In this example, the rules require that the activity level remain below the threshold for a period of time "A" 406 before the usage switches from metering using the first usage schedule, as depicted by graph segment 408, before switching to the second usage schedule, depicted by graph segment 410. The delay may allow determination that the user has left the computer 110 rather than being present and reading a page of text. The duration of the period "A" 406 may be used by the balance manager 266 to adjust the usage balance after switching to the second usage schedule. The delay period "A" 406 may be credited to the user's usage balance. Thereby, the user is given credit for the time utilized to satisfy inactivity requirements before switching to the second usage schedule. Under other circumstances the balance manager 266 may subtract or debit the usage balance, for example, when a lag occurs when transitioning from non-metered to metered rates. The balance manager 266 may return to metering according to the first usage schedule when the activity level returns above the threshold 404, as depicted by graph segment 412. Some hysteresis may be built into the rules so that the threshold level may vary according to the direction (more-to-less or less-to-more) of activity level.
[0050] The usage profile of Fig. 5 may be representative of the overall activity level of the computer. Similarly, as discussed above, the usage profile of Fig. 5 may represent one of many usage profiles. For example, usage profiles may be maintained for a hard disk drive 141, a communications device 170 172, or the processing unit 120, to name a few component-level devices. To make even finer grain evaluations, usage profiles may be made at the subcomponent level, for example, a range of system memory 132 or a sector of hard disk drive 141 storage . The usage profiles may be evaluated singly, as discussed above, or may use a straight or weighted sum to arrive at an overall decision regarding metering. In another example, the length of time a component or resource must be idle may be varied, e.g. period "A" 406 may be shorter or longer depending on the component. At the same time, the vertical axis of the usage profile represent a simple two-value on/off scale, or may have a discrete measurement values such as percent change per unit time, for example, percent change of contents of a range of memory, such as memory 132.
[0051] Returning to Fig. 4, as discussed above, the balance manager 266 may adjust 310 the balance according to any delay that may be imposed by the rules for determining the activity level. When all the criteria have been met, the balance manager 266 may then measure usage 312 according to the second usage schedule, that is, deduct value from the balance at a different rate, or not at all. When an event occurs 314 that moves the activity level above the threshold again, measurement may be returned to the rate according to the first usage schedule at block 302.
[0052] Described above are several specific embodiments including hardware and software embodiments for delicate metering of computer usage. A more fair and accurate method of determining and measuring beneficial usage is disclosed by monitoring and evaluating activity levels of one or more components of the computer 110 and applying appropriate business rules. This benefits a broad range of home, office and enterprise pay-per-use or metered-use applications. However, one of ordinary skill in the art will appreciate that various modifications and changes can be made to these embodiments, including but not limited to the use of different combinations of hardware or software for activity monitoring, multiple rate schedules, as well as more or less complex rules associated with determining an appropriate usage schedule. Accordingly, the specification and drawings are to be regarded in an illustrative rather than restrictive sense, and all such modifications are intended to be included within the scope of the present patent.

Claims

Claims:
1. A method of metering usage in a computer comprising: measuring usage of the computer according to a first usage schedule; monitoring an activity level of the computer; and measuring usage of the computer according to a second usage schedule when the activity level of the computer reaches a threshold.
2. The method of claim 1 , wherein the second usage schedule measures usage at a lower rate than the first usage schedule.
3. The method of claim 1 , wherein the monitoring the activity level of the computer further comprises monitoring an activity level of multiple components of the computer, wherein the threshold corresponds to the activity level of at least one of the multiple components.
4. The method of claim 1, further comprising recording the usage of the computer according to one of the first and second usage schedules.
5. The method of claim 1, wherein the activity level of the computer reaches the threshold of activity level after the activity level of the computer at least maintains a predetermined level for a period of time.
6. The method of claim 5, further comprising adjusting a usage value corresponding to the period of time after the activity level of the computer at least maintains the pre-determined level.
7. The method of claim 1, wherein the activity level of the computer corresponds to an activity level of one of an input device, a printer, a web camera, a hard disk drive, a communications device, and a processing unit.
8. The method of claim 1, wherein the activity level of the computer reaches the threshold corresponding to an application running on the computer.
9. The method of claim 8, wherein the activity level of the computer reaches the threshold corresponding to the application running on the computer except when the application is one of a screen saver, a virus checker, a utility, and an update.
10. A computer adapted for metering of usage comprising: a memory for storing data and program code; and a processor coupled to the memory wherein the processor executes a metering program for sensing an activity level of the computer and for metering usage responsive to the activity level of the computer.
11. The computer of claim 10, wherein the metering program determines the activity level of at least one of an input device, a printer, a web camera, a hard disk drive, a communications device, a display driver and a processor.
12. The computer of claim 10, wherein the metering program evaluates metering usage corresponding to the processor activity level being one of below an idle threshold and attributed to at least one of a utility, a screen saver, a virus checker, an update, and the metering program.
13. The computer of claim 10, wherein the metering program pauses metering computer usage corresponding to the activity level of the computer below a threshold.
14. The computer of claim 10, wherein the memory stores metering data associated with the computer usage and the program adjusts the usage data according to a profile of the activity data.
15. A computer-readable media storing computer executable instructions for use in a computer, the computer executable instructions for executing a method of metering, comprising: assessing an activity level of a component of a computer; determining when metering of computer usage is active in response to the activity level of the component of the computer.
16. The computer-readable media of claim 15, wherein the metering of computer usage measures time-of-use and is one of on and off in response to the activity level of the component of the computer.
17. The computer-readable media of claim 15, wherein the assessing the activity level of a component of the computer further comprises computer executable instructions for assessing the activity level of at least one of an input device, a printer, a web camera, a storage device, a communications device and a processor.
18. The computer-readable media of claim 17, wherein assessing the activity level of the processor further comprises computer executable instructions assessing the execution of at least one of a screen saver, a virus checker, a utility, and an update.
19. The computer-readable media of claim 15, wherein the metering of computer usage is determined in response to the activity level of the component of the computer when the activity level at least maintains a threshold for a period of time.
20. The computer-readable media of claim 19, wherein the metering of computer usage is adjusted corresponding to the period of time.
EP05820090A 2004-11-15 2005-11-12 Delicate metering of computer usage Withdrawn EP1815640A4 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
US10/989,122 US7610631B2 (en) 2004-11-15 2004-11-15 Method and apparatus for provisioning software
US11/006,837 US20060165005A1 (en) 2004-11-15 2004-12-08 Business method for pay-as-you-go computer and dynamic differential pricing
US11/074,558 US7421413B2 (en) 2004-11-15 2005-03-08 Delicate metering of computer usage
PCT/US2005/040965 WO2006055427A2 (en) 2004-11-15 2005-11-12 Delicate metering of computer usage

Publications (2)

Publication Number Publication Date
EP1815640A2 true EP1815640A2 (en) 2007-08-08
EP1815640A4 EP1815640A4 (en) 2008-02-13

Family

ID=36407652

Family Applications (1)

Application Number Title Priority Date Filing Date
EP05820090A Withdrawn EP1815640A4 (en) 2004-11-15 2005-11-12 Delicate metering of computer usage

Country Status (3)

Country Link
EP (1) EP1815640A4 (en)
KR (1) KR20070088633A (en)
WO (1) WO2006055427A2 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009053905A (en) * 2007-08-27 2009-03-12 Chugoku Electric Power Co Inc:The Device management system, device management method, and device management program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5530846A (en) * 1993-12-29 1996-06-25 International Business Machines Corporation System for decoupling clock amortization from clock synchronization
US20010056413A1 (en) * 2000-03-24 2001-12-27 Satoru Suzuki Electronic apparatus, charging system and method, charge processing device, storage medium and prepaid card
US20020141451A1 (en) * 2000-12-14 2002-10-03 Gates Matthijs A. Clock slaving methods and arrangements

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8271400B2 (en) * 2002-01-15 2012-09-18 Hewlett-Packard Development Company, L.P. Hardware pay-per-use

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5530846A (en) * 1993-12-29 1996-06-25 International Business Machines Corporation System for decoupling clock amortization from clock synchronization
US20010056413A1 (en) * 2000-03-24 2001-12-27 Satoru Suzuki Electronic apparatus, charging system and method, charge processing device, storage medium and prepaid card
US20020141451A1 (en) * 2000-12-14 2002-10-03 Gates Matthijs A. Clock slaving methods and arrangements

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of WO2006055427A2 *

Also Published As

Publication number Publication date
WO2006055427A2 (en) 2006-05-26
EP1815640A4 (en) 2008-02-13
KR20070088633A (en) 2007-08-29
WO2006055427A3 (en) 2007-07-12

Similar Documents

Publication Publication Date Title
US7421413B2 (en) Delicate metering of computer usage
US20060106845A1 (en) System and method for computer-based local generic commerce and management of stored value
CN101069215A (en) Delicate metering of computer usage
US20080319910A1 (en) Metered Pay-As-You-Go Computing Experience
US8244640B2 (en) Packet schema for pay-as-you-go service provisioning
US20070192824A1 (en) Computer hosting multiple secure execution environments
KR20080043344A (en) Prepaid or pay-as-you-go software, content and services delivered in a secure manner
US8073442B2 (en) Binding a device to a provider
US20080319925A1 (en) Computer Hardware Metering
US20080183623A1 (en) Secure Provisioning with Time Synchronization
WO2007094946A1 (en) Disaggregated secure execution environment
KR20060042383A (en) Method and system for a service provider to control exposure to non-payment by a service consumer
US20070192826A1 (en) I/O-based enforcement of multi-level computer operating modes
EP1815640A2 (en) Delicate metering of computer usage
US7539647B2 (en) Using power state to enforce software metering state
KR20060042210A (en) Method and system for a service consumer to control applications that behave incorrectly when requesting services
MXPA05012285A (en) Business method for pay-as-you-go computer and dynamic differential pricing
US20090094455A1 (en) Frequency Managed Performance

Legal Events

Date Code Title Description
PUAI Public reference made under article 153(3) epc to a published international application that has entered the european phase

Free format text: ORIGINAL CODE: 0009012

17P Request for examination filed

Effective date: 20070426

AK Designated contracting states

Kind code of ref document: A2

Designated state(s): AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LI LT LU LV MC NL PL PT RO SE SI SK TR

AX Request for extension of the european patent

Extension state: AL BA HR MK YU

R17D Deferred search report published (corrected)

Effective date: 20070712

RIC1 Information provided on ipc code assigned before grant

Ipc: G07B 15/02 20060101AFI20070813BHEP

RIN1 Information on inventor provided before grant (corrected)

Inventor name: REILLY, GEORGE V.

Inventor name: PHILLIPS, THOMAS G.

Inventor name: FRANK, ALEXANDER

A4 Supplementary search report drawn up and despatched

Effective date: 20080111

RIC1 Information provided on ipc code assigned before grant

Ipc: G06Q 30/00 20060101ALI20080107BHEP

Ipc: G06Q 20/00 20060101AFI20080107BHEP

DAX Request for extension of the european patent (deleted)
17Q First examination report despatched

Effective date: 20080305

STAA Information on the status of an ep patent application or granted ep patent

Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN

18D Application deemed to be withdrawn

Effective date: 20080916