GB2245724A - Software protection in a data processing network - Google Patents
Software protection in a data processing network Download PDFInfo
- Publication number
- GB2245724A GB2245724A GB9014400A GB9014400A GB2245724A GB 2245724 A GB2245724 A GB 2245724A GB 9014400 A GB9014400 A GB 9014400A GB 9014400 A GB9014400 A GB 9014400A GB 2245724 A GB2245724 A GB 2245724A
- Authority
- GB
- United Kingdom
- Prior art keywords
- workstation
- software
- file
- conditions
- data processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000012545 processing Methods 0.000 title claims abstract description 23
- 238000000034 method Methods 0.000 claims abstract description 10
- 238000004891 communication Methods 0.000 claims description 14
- 230000004044 response Effects 0.000 claims description 3
- 230000006870 function Effects 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 238000004590 computer program Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 239000000463 material Substances 0.000 description 1
- 238000003825 pressing Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G07—CHECKING-DEVICES
- G07F—COIN-FREED OR LIKE APPARATUS
- G07F17/00—Coin-freed apparatus for hiring articles; Coin-freed facilities or services
- G07F17/16—Coin-freed apparatus for hiring articles; Coin-freed facilities or services for devices exhibiting advertisements, announcements, pictures or the like
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
A technique of software asset protection is described in which software files are distributed over a data processing network to workstations. Before the software file is downloaded to a workstation a text file is sent, 26, to the workstation. This text file which is displayed, 28, on the workstation comprises the terms and conditions upon which the software file is being supplied. The user at the workstation is then prompted to supply a user input, 30, indicating whether the terms and conditions are accepted or rejected. Only if the terms and conditions are accepted, 32, is the software file downloaded, 36, to the workstation. The acceptance of the terms and conditions is logged, 34, within the data processing network and provides a means of auditing the distribution of software files throughout the network. Alternatively, the text file and software file are sent together to the workstation and the software file is deleted if the conditions are not accepted. <IMAGE>
Description
DATA PROCESSING NETWORK
This invention relates to the field of data processing networks.
More particularly, this invention relates to the protection and of data processing software as an asset.
Data processing software is expensive and time consuming to produce. Accordingly, software is a valuable asset to its owners. A particular problem with protecting software as an asset is that it is incorporeal, and by its very nature it may be readily copied at low cost. One of the way of protecting software as an asset is to enter into contractual arrangements with the person to whom the software is being supplied. In these contractual arrangements the person receiving the software will typically undertake not to copy the software more than is necessary for the legitimate intended use of the software.
When the person receiving the software is known to the supplier then a specific contract may be drawn up between them. This is what happens when a large scale item of software is supplied to a large customer. However, a trend in the data processing industry is the more widespread use of smaller computers and their associated software by persons not individually known to the supplier. Such users typically employ a 'personal computer' with a selection of software to perform functions such as word processing, spreadsheet activity or communications via a network. It is not possible for the supplier of software to such users to know the identity of each user, less still be able to enter into a specific contract with each customer. The same problem exists with software assets comprising collections of data rather than programs.Software files may be considered to be object code, source code for compilation, assembly code, code for interpretation or any other code intended for execution on a computer.
Faced with this problem, the solution adopted has been the so called 'shrink wrap license'. The software file is supplied to the user on a machine readable media such as a diskette, which is formed into a bundle with associated manuals and the like. A printed sheet is placed on the outside of the bundle which is then wrapped in clear plastic. The printed sheet may be read by the user and bears details of the terms and conditions upon which the software file is supplied, as well as a statement that by opening the plastic wrapper to gain access to the software file, the user has agreed to those terms and conditions. Such shrink wrap licenses are now very widely used and are particularly useful in the retail sale of program files.
Another trend the the data processing industry has been the increased use of data processing networks. Groups of physically remote computers are connected together over communication lines. This results in benefits through the sharing of resources and ease of information transfer. Such networks comprises a large number of small computers (personal computers) linked to one or more large computers (mainframes/hosts). Each small computer has a number of program and data files which it uses as if it were unconnected to other computers, as well as some that require the connection to other computers. The maintenance of such computer networks is a difficult and expensive task.
When it is decided to add a new small computer to the network it must be both physically connected to the network and have all the required software files installed upon it. Typically the installation of the software is carried out at each new small computer by reading the software from one or more diskettes into the storage of machine itself.
Similarly, if it is decided to update a version of a software file or install a new software file on one or more of the computers within a network, then this has been done by sending out the diskettes and having a person individually install the software file on each computer. In network comprising many thousands of computers this is an extremely expensive task.
To ease the problems of running such networks, computer programs have been developed for execution on such networks that distribute and install updates or new software files using the communication links already in place for the network. A new software file may be loaded once at the central computer and then distributed to each of the remote computers connected to the central computer. This produces a large increase in efficiency by removing the need to distribute diskettes to all the computers in a network. The manuals that accompany the software file may be put 'on line' (stored and read of the computer rather than being printed in on paper).
Thus, a user may be given access to a new or updated software file without receiving any tangible item. All the material is distributed electronically. It is not practical for the supplier of the software file to enter into a contract with each new user, and yet a 'shrink wrap license' is not possible because there is nothing tangible to which it may be attached. The present invention both recognises and solves this problem.
Viewed from one aspect the invention provides a data processing network having a central computer linked to one or more workstations via a communication system, said network having logic for
transmitting a conditions file containing data indicative of the conditions of use of an associated software file from said central computer to a workstation via said communication system,
displaying said conditions file at said workstation, and
responding to a predetermined user input at said workstation to produce an acceptance signal to allow access to said software file for execution on said workstation.
The invention recognises and solves the problem of providing a mechanism for asset protection in conjunction with electronic software file distribution within data processing network. No way had previously been available to achieve this. The text file may comprise the text previous provided on the shrink wrap license and may additiorally include information such as the hardware required at the workstation by that software file. The user sees the terms and conditions upon which the software file is being supplied before access to the software file is possible. The user must then make a predetermined user input at the workstation to generate the acceptance signal. The user input may be the use of a mouse to move the cursor on top of and then to select an accept button displayed at the workstation along side a corresponding reject button.The mechanism is also generic in that it may be applied to any or all of the software files being distributed by the distribution network.
In preferred embodiments said acceptance signal is transmitted to said central computer, and said central computer transmits said software file to said workstation in response to said acceptance signal. The feature has the result that until the acceptance signal is generated no copy of the software file is transferred thereby enhancing security and efficiency. The alternative would be to send the conditions file and software file together to the workstation and to delete the software file if the acceptance signal was not generated.
In preferred embodiments said acceptance signal is logged by said central computer. This provides a specific record of the terms and conditions having been accepted. With the prior art shrink wrap license no record of the opening is maintained, all that can be said is that at some time the bundle must have been opened by some person. The logging provides more information about the acceptance such as data indicative of the identity of the person providing the user input, and/or the time at which the user input was made. It was in no way possible to provide such additional information with the prior art shrink wrap licenses.
A further preferred feature of the invention is that a log is associated with a software file recording data concerning generation of acceptance signals for that software file. Alternatively, or in addition, a log is associated with a user of a workstation for recording data concerning generation of acceptance signal by that user. These logs provide for an easy way of auditing the distribution of software file throughout a network.
It will be appreciated that the conditions file and associated software themselves form a novel entity distributable via the network of and using the method of the invention.
Viewed from a second aspect the invention provides a method of distributing software files on a data processing network from a central computer to one or more workstations via a communication system comprising the steps of:
transmitting a conditions file containing data indicative of the conditions of use of an associated software file from said central computer to a workstation via said communication system,
displaying said conditions file at said workstation, and
responding to a predetermined user input at said workstation to produce an acceptance signal to allow access to said software file for execution on said workstation.
An embodiment of the invention will now be described, by way of example only, with reference to the accompanying drawings in which:
Figure 1 illustrates a data processing network in accordance with one embodiment of the invention.
Figure 2 schematically illustrates the process steps and flow of control between the host and workstation in accordance with one embodiment of the invention.
Figure 3 illustrates a display on a workstation prior to the downloading of a software file in accordance with one embodiment of the invention.
Figure 1 illustrates a data processing network having a host computer 2 connected via communication links 3 to a plurality of workstations 18, 20. The host computer 2 includes a central processor unit 4 coupled by a bus 2 data storage 6, 8, 10, 12, 16 and communication logic 14. More specifically, the storage 16 comprises program storage. The program stored by program storage 16 controls the operation of the central processor unit 4 so as to perform the functions required by the host 2. Storage 6 comprises software file storage containing the software files for distribution to the workstations 18, 20. Storage 8 is text file storage for storing text files comprising the terms and conditions associated with the various software files stored in software file storage 6.Storage 10 comprises software log storage for storing records indicative of each user to which a copy of a particular software file has been downloaded. Storage 12 comprises user log storage for storing all the software files downloaded to a particular user.
Figure 2 illustrates the process steps and flow of control between the host 2 and workstation 18, 20 when carrying out the invention. At step 22 the host 2 receives the instruction to send a particular software file to a particular workstation. At step 24 the host 2 accesses the text file associated with the software file to be downloaded to the workstation. The software file storage 6 contains the data by which this association is made, i.e. each software file has associated with it a pointer to the text file for that software file.
At step 26 the host 2 transmits the text file to the workstation 18, 20.
This takes place under the control of the programmed central processor unit 4 directing transfer of said text file by said bus 16 to the communication logic 14 and thence to the workstation 18, 20.
At step 28 control passes to the workstation 18, 20. The workstation 18, 20 displays the text file transmitted from the host 2.
The form this display may take is illustrated in Figure 3 which follows.
At step 30 the workstation 18, 20 waits for a user input to indicate whether the user accepts or rejects the terms and conditions displayed using the text file. If the user rejects the terms and conditions by making an appropriate user input then the attempted downloading of the software file proceeds no longer. If the user makes the appropriate user input to accept the terms and conditions upon which the software file is being supplied then the workstation 18, 20 proceeds to step 32.
At step 32 the workstation transmits an acceptance signal to the host.
At step 34 the host 2 logs the acceptance signal in the software file log 10 and the user log 12. The software file log includes data specifying the identity of the user accepting the software file and the time that acceptance was made. The identity of the user accepting the file will be known to the data processing network since the user will have had to log on to the data processing network before any of this downloading procedure could have taken place. In addition, or alternatively, the screen address of the workstation to which the software file is being sent could be recorded. The screen address would indirectly refer to the user responsible for that workstation. In the user log the record of the software file accepted by the user in question would be made together with the time that software file was accepted.
With the software file log 10 and the user log 12 of the forms discussed above auditing of the distribution of the software files around the data processing network is simplified as an appropriate search may be run through either or both of the software file log and user log to determine which users have accepted the terms and conditions associated with which software files. The system could also be used to directly generate the appropriate billing both for the network and individual users within the network. The system could also be used to directly generate cheques for payment to the appropriate software file owners.
At step 36 the host computer transmits the software file to the workstation 18, 20. Control then is passed to the workstation 18, 20 which receives and stores the software file at step 38 ready for use.
The new process then terminates.
Figure 3 illustrates the display produced at step 28 in Figure 2.
The display includes a body of text 40 setting out the terms and conditions upon which the software file being downloaded is being supplied. Buttons 42, 44 are displayed beneath the text 40. By manipulating the data input device the user can position the cursor either over the accept button 42 or the reject button 44. By pressing the button on the mouse the user can then register either acceptance or rejection of the terms and conditions.
It will be appreciated that whilst the present embodiment has been described in the form of a programmed computer, with the central processor unit 4 under the control of the programme stored, the invention could be embodied in special purpose hardware (although in practice this would be difficult and expensive). Similarly, it will be appreciated that any computer language could be used to implement the invention described herein.
Claims (8)
1. A data processing network having a central computer linked to one or more workstations via a communication system, said network having logic for
transmitting a conditions file containing data indicative of the conditions of use of an associated software file from said central computer to a workstation via said communication system,
displaying said conditions file at said workstation, and
responding to a predetermined user input at said workstation to produce an acceptance signal to allow access to said software file for execution on said workstation.
2. A data processing network as claimed in claim 1, wherein said acceptance signal is transmitted to said central computer, and said central computer transmits said software file to said workstation in response to said acceptance signal.
3. A data processing network as claimed in any of claims 1 or 2, wherein said acceptance signal is logged by said central computer.
4. A data processing network as claimed in claim 3, wherein a log is associated with a software file for recording data concerning generation of acceptance signals for that software file.
5. A data processing network as claimed in any of claims 3 or 4, wherein a log is associated with a user of a workstation for recording data concerning generation of acceptance signal by that user.
6. A method of distributing software files on a data processing network from a central computer to one or more workstations via a communication system comprising the steps of:
transmitting a conditions file containing data indicative of the conditions of use of an associated software file from said central computer to a workstation via said communication system,
displaying said conditions file at said workstation, and
responding to a predetermined user input at said workstation to produce an acceptance signal to allow access to said software file for execution on said workstation.
7. A method of distributing software files as claimed in claim 6, wherein said acceptance signal is transmitted to said central computer, and said central computer transmits said software file to said workstation in response to said acceptance signal.
8. A method of distributing software files as claimed in any of claims 6 or 7, wherein said acceptance signal is logged by said central computer.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9014400A GB2245724A (en) | 1990-06-28 | 1990-06-28 | Software protection in a data processing network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GB9014400A GB2245724A (en) | 1990-06-28 | 1990-06-28 | Software protection in a data processing network |
Publications (2)
Publication Number | Publication Date |
---|---|
GB9014400D0 GB9014400D0 (en) | 1990-08-22 |
GB2245724A true GB2245724A (en) | 1992-01-08 |
Family
ID=10678358
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
GB9014400A Withdrawn GB2245724A (en) | 1990-06-28 | 1990-06-28 | Software protection in a data processing network |
Country Status (1)
Country | Link |
---|---|
GB (1) | GB2245724A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0766165A2 (en) * | 1995-08-31 | 1997-04-02 | Fujitsu Limited | Licensee notification system |
EP0852440A2 (en) * | 1997-01-07 | 1998-07-08 | Fujitsu Limited | Network data transmission systems |
WO1998030964A2 (en) * | 1997-01-09 | 1998-07-16 | Buyonet International Ab | A system for secure data transmission over an electronic link |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1987001835A1 (en) * | 1985-09-12 | 1987-03-26 | Basil Eliseus Philipsz | Secure computer system |
-
1990
- 1990-06-28 GB GB9014400A patent/GB2245724A/en not_active Withdrawn
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO1987001835A1 (en) * | 1985-09-12 | 1987-03-26 | Basil Eliseus Philipsz | Secure computer system |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0766165A2 (en) * | 1995-08-31 | 1997-04-02 | Fujitsu Limited | Licensee notification system |
EP0766165A3 (en) * | 1995-08-31 | 1997-11-19 | Fujitsu Limited | Licensee notification system |
US5935243A (en) * | 1995-08-31 | 1999-08-10 | Fujitsu Ltd. | Licensee notification system |
EP0852440A2 (en) * | 1997-01-07 | 1998-07-08 | Fujitsu Limited | Network data transmission systems |
EP0852440A3 (en) * | 1997-01-07 | 2002-02-13 | Fujitsu Limited | Network data transmission systems |
WO1998030964A2 (en) * | 1997-01-09 | 1998-07-16 | Buyonet International Ab | A system for secure data transmission over an electronic link |
WO1998030964A3 (en) * | 1997-01-09 | 1998-08-13 | Buyonet Internat | A system for secure data transmission over an electronic link |
Also Published As
Publication number | Publication date |
---|---|
GB9014400D0 (en) | 1990-08-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6014651A (en) | Commercial online software distribution systems and methods using encryption for security | |
US6141006A (en) | Methods for executing commercial transactions in a network system using visual link objects | |
US6061057A (en) | Network commercial system using visual link objects | |
CA2145925C (en) | Method and apparatus for enabling trial period use of software products: method and apparatus for allowing a try-and-buy user interaction | |
EP0082225B1 (en) | Business system | |
US6016484A (en) | System, method and article of manufacture for network electronic payment instrument and certification of payment and credit collection utilizing a payment | |
US5815657A (en) | System, method and article of manufacture for network electronic authorization utilizing an authorization instrument | |
US6029145A (en) | Software license verification process and apparatus | |
AU2003271590B2 (en) | Method for the automatic integrated filing of records during recording of business events | |
US8543982B2 (en) | Delivering financial services to remote devices | |
JP3877188B2 (en) | Electronic currency system | |
US7487129B2 (en) | Method and apparatus for the distribution of digitised information on demand | |
JPH0934841A (en) | On-line ciphering releasing system of storage medium and its method | |
WO2003034286A1 (en) | System and methods providing secure delivery of licenses and content | |
KR20010085576A (en) | Fee settlement mediation processing device, recording medium for storing a program for processing a fee settlement mediation, computer program for fee settlement mediation, online shop device and method, and system thereof | |
US6067527A (en) | Point of sale system, method of operation thereof and programming for control thereof | |
US20020052791A1 (en) | Remote transaction tracking and financial package link | |
EP0901672B1 (en) | A system, method and article of manufacture for network electronic authorization utilizing an authorization instrument | |
Wigand et al. | Introduction to business information systems | |
GB2245724A (en) | Software protection in a data processing network | |
US20070265939A1 (en) | Method for selling items using a network | |
CA2824514A1 (en) | Sales recording module compatible pos system | |
Whittington | Wiley CPAexcel Exam Review 2015 Study Guide (January): Business Environment and Concepts | |
JPH11249892A (en) | Software license management by smart card | |
KR20210068655A (en) | Open market system with enhanced security by applying blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WAP | Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1) |