GB2245724A - Software protection in a data processing network - Google Patents

Software protection in a data processing network Download PDF

Info

Publication number
GB2245724A
GB2245724A GB9014400A GB9014400A GB2245724A GB 2245724 A GB2245724 A GB 2245724A GB 9014400 A GB9014400 A GB 9014400A GB 9014400 A GB9014400 A GB 9014400A GB 2245724 A GB2245724 A GB 2245724A
Authority
GB
United Kingdom
Prior art keywords
workstation
software
file
conditions
data processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB9014400A
Other versions
GB9014400D0 (en
Inventor
Keith Holmes
Connel Gerard Cunningham
Fiona Gleeson
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to GB9014400A priority Critical patent/GB2245724A/en
Publication of GB9014400D0 publication Critical patent/GB9014400D0/en
Publication of GB2245724A publication Critical patent/GB2245724A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F17/00Coin-freed apparatus for hiring articles; Coin-freed facilities or services
    • G07F17/16Coin-freed apparatus for hiring articles; Coin-freed facilities or services for devices exhibiting advertisements, announcements, pictures or the like
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2101Auditing as a secondary aspect

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

A technique of software asset protection is described in which software files are distributed over a data processing network to workstations. Before the software file is downloaded to a workstation a text file is sent, 26, to the workstation. This text file which is displayed, 28, on the workstation comprises the terms and conditions upon which the software file is being supplied. The user at the workstation is then prompted to supply a user input, 30, indicating whether the terms and conditions are accepted or rejected. Only if the terms and conditions are accepted, 32, is the software file downloaded, 36, to the workstation. The acceptance of the terms and conditions is logged, 34, within the data processing network and provides a means of auditing the distribution of software files throughout the network. Alternatively, the text file and software file are sent together to the workstation and the software file is deleted if the conditions are not accepted. <IMAGE>

Description

DATA PROCESSING NETWORK This invention relates to the field of data processing networks.
More particularly, this invention relates to the protection and of data processing software as an asset.
Data processing software is expensive and time consuming to produce. Accordingly, software is a valuable asset to its owners. A particular problem with protecting software as an asset is that it is incorporeal, and by its very nature it may be readily copied at low cost. One of the way of protecting software as an asset is to enter into contractual arrangements with the person to whom the software is being supplied. In these contractual arrangements the person receiving the software will typically undertake not to copy the software more than is necessary for the legitimate intended use of the software.
When the person receiving the software is known to the supplier then a specific contract may be drawn up between them. This is what happens when a large scale item of software is supplied to a large customer. However, a trend in the data processing industry is the more widespread use of smaller computers and their associated software by persons not individually known to the supplier. Such users typically employ a 'personal computer' with a selection of software to perform functions such as word processing, spreadsheet activity or communications via a network. It is not possible for the supplier of software to such users to know the identity of each user, less still be able to enter into a specific contract with each customer. The same problem exists with software assets comprising collections of data rather than programs.Software files may be considered to be object code, source code for compilation, assembly code, code for interpretation or any other code intended for execution on a computer.
Faced with this problem, the solution adopted has been the so called 'shrink wrap license'. The software file is supplied to the user on a machine readable media such as a diskette, which is formed into a bundle with associated manuals and the like. A printed sheet is placed on the outside of the bundle which is then wrapped in clear plastic. The printed sheet may be read by the user and bears details of the terms and conditions upon which the software file is supplied, as well as a statement that by opening the plastic wrapper to gain access to the software file, the user has agreed to those terms and conditions. Such shrink wrap licenses are now very widely used and are particularly useful in the retail sale of program files.
Another trend the the data processing industry has been the increased use of data processing networks. Groups of physically remote computers are connected together over communication lines. This results in benefits through the sharing of resources and ease of information transfer. Such networks comprises a large number of small computers (personal computers) linked to one or more large computers (mainframes/hosts). Each small computer has a number of program and data files which it uses as if it were unconnected to other computers, as well as some that require the connection to other computers. The maintenance of such computer networks is a difficult and expensive task.
When it is decided to add a new small computer to the network it must be both physically connected to the network and have all the required software files installed upon it. Typically the installation of the software is carried out at each new small computer by reading the software from one or more diskettes into the storage of machine itself.
Similarly, if it is decided to update a version of a software file or install a new software file on one or more of the computers within a network, then this has been done by sending out the diskettes and having a person individually install the software file on each computer. In network comprising many thousands of computers this is an extremely expensive task.
To ease the problems of running such networks, computer programs have been developed for execution on such networks that distribute and install updates or new software files using the communication links already in place for the network. A new software file may be loaded once at the central computer and then distributed to each of the remote computers connected to the central computer. This produces a large increase in efficiency by removing the need to distribute diskettes to all the computers in a network. The manuals that accompany the software file may be put 'on line' (stored and read of the computer rather than being printed in on paper).
Thus, a user may be given access to a new or updated software file without receiving any tangible item. All the material is distributed electronically. It is not practical for the supplier of the software file to enter into a contract with each new user, and yet a 'shrink wrap license' is not possible because there is nothing tangible to which it may be attached. The present invention both recognises and solves this problem.
Viewed from one aspect the invention provides a data processing network having a central computer linked to one or more workstations via a communication system, said network having logic for transmitting a conditions file containing data indicative of the conditions of use of an associated software file from said central computer to a workstation via said communication system, displaying said conditions file at said workstation, and responding to a predetermined user input at said workstation to produce an acceptance signal to allow access to said software file for execution on said workstation.
The invention recognises and solves the problem of providing a mechanism for asset protection in conjunction with electronic software file distribution within data processing network. No way had previously been available to achieve this. The text file may comprise the text previous provided on the shrink wrap license and may additiorally include information such as the hardware required at the workstation by that software file. The user sees the terms and conditions upon which the software file is being supplied before access to the software file is possible. The user must then make a predetermined user input at the workstation to generate the acceptance signal. The user input may be the use of a mouse to move the cursor on top of and then to select an accept button displayed at the workstation along side a corresponding reject button.The mechanism is also generic in that it may be applied to any or all of the software files being distributed by the distribution network.
In preferred embodiments said acceptance signal is transmitted to said central computer, and said central computer transmits said software file to said workstation in response to said acceptance signal. The feature has the result that until the acceptance signal is generated no copy of the software file is transferred thereby enhancing security and efficiency. The alternative would be to send the conditions file and software file together to the workstation and to delete the software file if the acceptance signal was not generated.
In preferred embodiments said acceptance signal is logged by said central computer. This provides a specific record of the terms and conditions having been accepted. With the prior art shrink wrap license no record of the opening is maintained, all that can be said is that at some time the bundle must have been opened by some person. The logging provides more information about the acceptance such as data indicative of the identity of the person providing the user input, and/or the time at which the user input was made. It was in no way possible to provide such additional information with the prior art shrink wrap licenses.
A further preferred feature of the invention is that a log is associated with a software file recording data concerning generation of acceptance signals for that software file. Alternatively, or in addition, a log is associated with a user of a workstation for recording data concerning generation of acceptance signal by that user. These logs provide for an easy way of auditing the distribution of software file throughout a network.
It will be appreciated that the conditions file and associated software themselves form a novel entity distributable via the network of and using the method of the invention.
Viewed from a second aspect the invention provides a method of distributing software files on a data processing network from a central computer to one or more workstations via a communication system comprising the steps of: transmitting a conditions file containing data indicative of the conditions of use of an associated software file from said central computer to a workstation via said communication system, displaying said conditions file at said workstation, and responding to a predetermined user input at said workstation to produce an acceptance signal to allow access to said software file for execution on said workstation.
An embodiment of the invention will now be described, by way of example only, with reference to the accompanying drawings in which: Figure 1 illustrates a data processing network in accordance with one embodiment of the invention.
Figure 2 schematically illustrates the process steps and flow of control between the host and workstation in accordance with one embodiment of the invention.
Figure 3 illustrates a display on a workstation prior to the downloading of a software file in accordance with one embodiment of the invention.
Figure 1 illustrates a data processing network having a host computer 2 connected via communication links 3 to a plurality of workstations 18, 20. The host computer 2 includes a central processor unit 4 coupled by a bus 2 data storage 6, 8, 10, 12, 16 and communication logic 14. More specifically, the storage 16 comprises program storage. The program stored by program storage 16 controls the operation of the central processor unit 4 so as to perform the functions required by the host 2. Storage 6 comprises software file storage containing the software files for distribution to the workstations 18, 20. Storage 8 is text file storage for storing text files comprising the terms and conditions associated with the various software files stored in software file storage 6.Storage 10 comprises software log storage for storing records indicative of each user to which a copy of a particular software file has been downloaded. Storage 12 comprises user log storage for storing all the software files downloaded to a particular user.
Figure 2 illustrates the process steps and flow of control between the host 2 and workstation 18, 20 when carrying out the invention. At step 22 the host 2 receives the instruction to send a particular software file to a particular workstation. At step 24 the host 2 accesses the text file associated with the software file to be downloaded to the workstation. The software file storage 6 contains the data by which this association is made, i.e. each software file has associated with it a pointer to the text file for that software file.
At step 26 the host 2 transmits the text file to the workstation 18, 20.
This takes place under the control of the programmed central processor unit 4 directing transfer of said text file by said bus 16 to the communication logic 14 and thence to the workstation 18, 20.
At step 28 control passes to the workstation 18, 20. The workstation 18, 20 displays the text file transmitted from the host 2.
The form this display may take is illustrated in Figure 3 which follows.
At step 30 the workstation 18, 20 waits for a user input to indicate whether the user accepts or rejects the terms and conditions displayed using the text file. If the user rejects the terms and conditions by making an appropriate user input then the attempted downloading of the software file proceeds no longer. If the user makes the appropriate user input to accept the terms and conditions upon which the software file is being supplied then the workstation 18, 20 proceeds to step 32.
At step 32 the workstation transmits an acceptance signal to the host.
At step 34 the host 2 logs the acceptance signal in the software file log 10 and the user log 12. The software file log includes data specifying the identity of the user accepting the software file and the time that acceptance was made. The identity of the user accepting the file will be known to the data processing network since the user will have had to log on to the data processing network before any of this downloading procedure could have taken place. In addition, or alternatively, the screen address of the workstation to which the software file is being sent could be recorded. The screen address would indirectly refer to the user responsible for that workstation. In the user log the record of the software file accepted by the user in question would be made together with the time that software file was accepted.
With the software file log 10 and the user log 12 of the forms discussed above auditing of the distribution of the software files around the data processing network is simplified as an appropriate search may be run through either or both of the software file log and user log to determine which users have accepted the terms and conditions associated with which software files. The system could also be used to directly generate the appropriate billing both for the network and individual users within the network. The system could also be used to directly generate cheques for payment to the appropriate software file owners.
At step 36 the host computer transmits the software file to the workstation 18, 20. Control then is passed to the workstation 18, 20 which receives and stores the software file at step 38 ready for use.
The new process then terminates.
Figure 3 illustrates the display produced at step 28 in Figure 2.
The display includes a body of text 40 setting out the terms and conditions upon which the software file being downloaded is being supplied. Buttons 42, 44 are displayed beneath the text 40. By manipulating the data input device the user can position the cursor either over the accept button 42 or the reject button 44. By pressing the button on the mouse the user can then register either acceptance or rejection of the terms and conditions.
It will be appreciated that whilst the present embodiment has been described in the form of a programmed computer, with the central processor unit 4 under the control of the programme stored, the invention could be embodied in special purpose hardware (although in practice this would be difficult and expensive). Similarly, it will be appreciated that any computer language could be used to implement the invention described herein.

Claims (8)

1. A data processing network having a central computer linked to one or more workstations via a communication system, said network having logic for transmitting a conditions file containing data indicative of the conditions of use of an associated software file from said central computer to a workstation via said communication system, displaying said conditions file at said workstation, and responding to a predetermined user input at said workstation to produce an acceptance signal to allow access to said software file for execution on said workstation.
2. A data processing network as claimed in claim 1, wherein said acceptance signal is transmitted to said central computer, and said central computer transmits said software file to said workstation in response to said acceptance signal.
3. A data processing network as claimed in any of claims 1 or 2, wherein said acceptance signal is logged by said central computer.
4. A data processing network as claimed in claim 3, wherein a log is associated with a software file for recording data concerning generation of acceptance signals for that software file.
5. A data processing network as claimed in any of claims 3 or 4, wherein a log is associated with a user of a workstation for recording data concerning generation of acceptance signal by that user.
6. A method of distributing software files on a data processing network from a central computer to one or more workstations via a communication system comprising the steps of: transmitting a conditions file containing data indicative of the conditions of use of an associated software file from said central computer to a workstation via said communication system, displaying said conditions file at said workstation, and responding to a predetermined user input at said workstation to produce an acceptance signal to allow access to said software file for execution on said workstation.
7. A method of distributing software files as claimed in claim 6, wherein said acceptance signal is transmitted to said central computer, and said central computer transmits said software file to said workstation in response to said acceptance signal.
8. A method of distributing software files as claimed in any of claims 6 or 7, wherein said acceptance signal is logged by said central computer.
GB9014400A 1990-06-28 1990-06-28 Software protection in a data processing network Withdrawn GB2245724A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB9014400A GB2245724A (en) 1990-06-28 1990-06-28 Software protection in a data processing network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB9014400A GB2245724A (en) 1990-06-28 1990-06-28 Software protection in a data processing network

Publications (2)

Publication Number Publication Date
GB9014400D0 GB9014400D0 (en) 1990-08-22
GB2245724A true GB2245724A (en) 1992-01-08

Family

ID=10678358

Family Applications (1)

Application Number Title Priority Date Filing Date
GB9014400A Withdrawn GB2245724A (en) 1990-06-28 1990-06-28 Software protection in a data processing network

Country Status (1)

Country Link
GB (1) GB2245724A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0766165A2 (en) * 1995-08-31 1997-04-02 Fujitsu Limited Licensee notification system
EP0852440A2 (en) * 1997-01-07 1998-07-08 Fujitsu Limited Network data transmission systems
WO1998030964A2 (en) * 1997-01-09 1998-07-16 Buyonet International Ab A system for secure data transmission over an electronic link

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987001835A1 (en) * 1985-09-12 1987-03-26 Basil Eliseus Philipsz Secure computer system

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1987001835A1 (en) * 1985-09-12 1987-03-26 Basil Eliseus Philipsz Secure computer system

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0766165A2 (en) * 1995-08-31 1997-04-02 Fujitsu Limited Licensee notification system
EP0766165A3 (en) * 1995-08-31 1997-11-19 Fujitsu Limited Licensee notification system
US5935243A (en) * 1995-08-31 1999-08-10 Fujitsu Ltd. Licensee notification system
EP0852440A2 (en) * 1997-01-07 1998-07-08 Fujitsu Limited Network data transmission systems
EP0852440A3 (en) * 1997-01-07 2002-02-13 Fujitsu Limited Network data transmission systems
WO1998030964A2 (en) * 1997-01-09 1998-07-16 Buyonet International Ab A system for secure data transmission over an electronic link
WO1998030964A3 (en) * 1997-01-09 1998-08-13 Buyonet Internat A system for secure data transmission over an electronic link

Also Published As

Publication number Publication date
GB9014400D0 (en) 1990-08-22

Similar Documents

Publication Publication Date Title
US6014651A (en) Commercial online software distribution systems and methods using encryption for security
US6141006A (en) Methods for executing commercial transactions in a network system using visual link objects
US6061057A (en) Network commercial system using visual link objects
CA2145925C (en) Method and apparatus for enabling trial period use of software products: method and apparatus for allowing a try-and-buy user interaction
EP0082225B1 (en) Business system
US6016484A (en) System, method and article of manufacture for network electronic payment instrument and certification of payment and credit collection utilizing a payment
US5815657A (en) System, method and article of manufacture for network electronic authorization utilizing an authorization instrument
US6029145A (en) Software license verification process and apparatus
AU2003271590B2 (en) Method for the automatic integrated filing of records during recording of business events
US8543982B2 (en) Delivering financial services to remote devices
JP3877188B2 (en) Electronic currency system
US7487129B2 (en) Method and apparatus for the distribution of digitised information on demand
JPH0934841A (en) On-line ciphering releasing system of storage medium and its method
WO2003034286A1 (en) System and methods providing secure delivery of licenses and content
KR20010085576A (en) Fee settlement mediation processing device, recording medium for storing a program for processing a fee settlement mediation, computer program for fee settlement mediation, online shop device and method, and system thereof
US6067527A (en) Point of sale system, method of operation thereof and programming for control thereof
US20020052791A1 (en) Remote transaction tracking and financial package link
EP0901672B1 (en) A system, method and article of manufacture for network electronic authorization utilizing an authorization instrument
Wigand et al. Introduction to business information systems
GB2245724A (en) Software protection in a data processing network
US20070265939A1 (en) Method for selling items using a network
CA2824514A1 (en) Sales recording module compatible pos system
Whittington Wiley CPAexcel Exam Review 2015 Study Guide (January): Business Environment and Concepts
JPH11249892A (en) Software license management by smart card
KR20210068655A (en) Open market system with enhanced security by applying blockchain

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)