GB2378529A - Pay per use software - Google Patents

Pay per use software Download PDF

Info

Publication number
GB2378529A
GB2378529A GB0111291A GB0111291A GB2378529A GB 2378529 A GB2378529 A GB 2378529A GB 0111291 A GB0111291 A GB 0111291A GB 0111291 A GB0111291 A GB 0111291A GB 2378529 A GB2378529 A GB 2378529A
Authority
GB
United Kingdom
Prior art keywords
computer
application software
user
credit
tasks
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB0111291A
Other versions
GB0111291D0 (en
Inventor
Alex French
Martin Iggulden
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
SYSMEDIA Ltd
Original Assignee
SYSMEDIA Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SYSMEDIA Ltd filed Critical SYSMEDIA Ltd
Priority to GB0111291A priority Critical patent/GB2378529A/en
Publication of GB0111291D0 publication Critical patent/GB0111291D0/en
Publication of GB2378529A publication Critical patent/GB2378529A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Abstract

A computer software application is activated by an encrypted code which includes credit information to define the amount of access the user has payed for. The amount of credit available is decremented each time a chargeable task is used and once the credit has expired the system will prevent the software from being used until such time as a new encrypted code is entered. The encrypted code is generated and sent to the user from an external computer, such as a vendors computer, via a data transmission once the user has applied to use the software. The system can prompt the user to buy more credit when a predetermined level of credit is reached. There is also a monitoring of the tasks used and once the amount payed for have been performed the application is prevented from running. Additional security against piracy can be provided by a hardware key without which the application will not operate. The program may additionally be provided with an expiry date after which the application will not work and this may also be updated from the external computer after a prompt from the system. Finally the system may be set up to enable to computer to implement all or only some of the functions available in the software.

Description

<Desc/Clms Page number 1>
Controlling system for subtitling software, and a method of using the system This invention relates to a system for controlling and managing subtitling software and a method of using the system.
Computer software for adding subtitles or captions to television and film pictures as well as digital pictures for DVD and the internet, (hereinafter referred to as subtitling software), and the accompanying licence to use the software, can be expensive for individuals and small companies to purchase. An example is the SysMedia WinCAPS Multimedia package. The present invention is intended to provide a less expensive way to use the software.
A controlling system is therefore built into the subtitling software package which will only run the application when specific authorisation codes are inputted. The codes can be generated by an external code-generating program of known type, and can carry commands for the controlling system instructing it how to run the application.
In a method of using this controlling system the subtitling software can be supplied for a low cost, and registered users can be provided with codes which carry"credits"to use the software. The cost of the codes is determined by the amount of credits they carry.
The credits are then decremented when chargeable operations are carried out within the software. The controlling system can monitor the use made of the software and stop running it when the credits expire. The controlling system can also provide current information on usage so that the user can order more codes from the supplier before the need arises.
According to a first aspect of the present invention a computer comprises a controlling section, and a subtitling or captioning application software section, wherein the controlling section is adapted to allow a pre-determined number of tasks to be performed in the application software section when it is supplied with a specific
<Desc/Clms Page number 2>
externally generated and encrypted code, which carries commands to determine the number of tasks which can be performed in the application software section, and in which the controlling section is further adapted to run no tasks in the application software unless a code is supplied.
According to a second aspect of the present invention a computer program and/or data enables a computer to implement all or part of the functions of the first aspect of the present invention.
According to a third aspect of the present invention a medium is provided which holds thereon a program and/or data for enabling a computer to implement all or part of the functions of the first aspect of the present invention, and in which said medium is computer processable.
According to another aspect of the present invention a method or operating the computer set forth above comprises the steps of: 1) Registering end users of the controlling section and the application software section onto a database.
2) Loading the controlling section and the application software section onto the computer.
3) Selling encrypted codes to said registered end users for loading onto the computer so the controlling section will allow tasks to be performed in the application software section.
4) Selling further encrypted codes to registered end users for loading onto the computer so the controlling section will allow further tasks to be performed in the application software section.
The present invention can be performed in various ways but one embodiment will now be described by way of example and with reference to the accompanying drawings, in which: Figure 1 is a box diagram of a computer according to
the present invention connected to an internet site ; 0
<Desc/Clms Page number 3>
Figure 2 is a box diagram of a computer program according to the present invention; and, Figure 3 is a box diagram of a CD ROM with the computer program according to the present invention loaded onto it.
In Figure 1 a PC 1 has an operating system platform 2, a CD ROM drive 3, which is linked to the operating platform 2, a screen 4, a hardware security key 5 attached to a parallel port on the computer (not shown) and which includes a credit meter 6 and an authentication function 7, and a web browser and an internet connection 8. WinCAPS Multimedia 9 and the controlling program 10 have been loaded onto the operating system 2. WinCAPS Multimedia 9 has subtitling and captioning functions 11 and is linked to the controlling program by an interface 12. The controlling program 10 has a security module 13 which includes a link to an internet browser 14, which is linked to a decryption and code authentication function 15, which is itself linked to a credit meter with a warning function 16. The credit meter 6 in the hardware security key 5 is linked to the credit meter 16 in the security module 13. The security module 13 also has the capacity through the credit meter warning function 16 to send warning dialog boxes through the operating system 2 to the screen 4 to provide credit information. The controlling program also has monitoring and recording functions 17 which are linked to the interface 12 and to a link 18 with the credit meter 16. In addition, it can have a built in expiry date system 19.
Also in Figure 1 an internet site 20 has an ordering and payment means 21, a credit manager application 22 which generates downloadable encrypted codes 23, a registered user database 24, a downloadable WinCAPS Multimedia and controlling program package 25, downloadable upgrades to WinCAPS Multimedia and the controlling program 26 and a clock 27.
<Desc/Clms Page number 4>
As shown in Figure 1 WinCAPS Multimedia 9 and the controlling program 10 can be loaded onto the operating platform 2 via the CD ROM drive 3 or downloaded via the internet connection 8 from the internet site 20. However, the subtitling functions of WinCAPS Multimedia can only run when an authorised code has been entered into the security module 13 and the hardware security key 5. The controlling program 10 can be set to link to the internet site 20 via the internet connection 8 as soon as it has been loaded onto the operating platform 2 to allow the user to buy credit online. Any attempt to run WinCAPS Multimedia 9 will result in a check being made via the interface 12, the monitoring function 17 and the link 18 to the credit meter 16. If there are insufficient credits available for the function requested WinCAPS Multimedia will not perform it. The control ing program 10 can be set to link to the ordering and payment means 21 on the internet site 20 whenever a task is requested in WinCAPS Multimedia for which there is insufficient credit.
When an order and payment, for example a credit card payment, are made into the ordering and payment means 21, the credit manager application 22 refers to the registered user database 24 to confirm the order has been made by a legitimate registered user. (The supplier enters the customer information into the database after registration.) Once this is done the credit manager application 22 generates an encrypted code 23 which will only function with the particular hardware security key 5 and security module 13 registered to that user. With this arrangement only registered users will be able to use the WinCAPS Multimedia, and only on a computer connected to their designated hardware security key. Each code can also only be used once. The detailed account history of each user can be kept in the database 24.
The encrypted code is then sent to the security module 13 as an attachment to an email sent to the user via the internet connection 8.
When the user opens the attachment the security module 13 decrypts and authenticates the code for use, and at the same time the hardware security key 5 performs the same function. Only when both systems are satisfied will credits be entered onto credit meters 6 and 16.
<Desc/Clms Page number 5>
If the user attempts to run WinCAPS Multimedia 9 when credits are registered on the meters 6 and 16 the checking sequence described above will be performed, but with the result that WinCAPS multimedia 9 will run. Each time a request is made of WinCAPS Multimedia the same checking sequence is made to ensure sufficient credit is available. In addition the security module 13 makes regular checks to ensure that the hardware security key 5 is connected to the PC 1. If it does not respond the security module will not allow tasks to be performed in WinCAPS Multimedia.
Each time the user carries out a chargeable operation within WinCAPS Multimedia, such as creating a new subtitle or importing a file, the amount of available credit is reduced by the appropriate amount. A scale of charges can be published and updated periodically on the internet site 20.
The warning function attached to the credit meter 16 can be set to send dialogue confirmation boxes to the screen when tasks of a specified scale are requested, or when the credit levels fall to specified levels. During use the monitoring function 17 can also be set to record specified tasks performed by WinCAPS Multimedia for future reference.
The built in expiry date system 19 can be programmed with a date after which the controlling program 10 will not run WinCAPS Multimedia 9. This forces the user to download an updated version of the software 25 or an upgrade 26. This allows for the controlling program 10 to be replaced so new encrypted codes 23 can be used with new security modules. The built in expiry date system monitors the internet site clock 27 via the link to the browser 14 and the internet connection 8, every time the internet site is accessed. The expiry date system 19 can also be set to respond to codes broadcast by the clock and prevent WinCAPS Multimedia from running in the event of a security breach somewhere in the system.
<Desc/Clms Page number 6>
The user can be notified via the website 20 when optional and mandatory software upgrades 26 are available for downloading. The security module launches the web browser 8 with a URL to the software update page on the internet site 20 several days before the software upgrades 26 becomes mandatory.
According to the second aspect of the present invention Figure 2 shows WinCAPS Multimedia and the controlling program. The same reference numbers are used to indicate similar parts and functions as in Figure 1.
According to the third aspect of the present invention Figure 3 shows WinCAPS Multimedia and the controlling program loaded onto a CD ROM 28. Again, the same reference numbers are used as in Figure 1.
According to the fourth aspect of the present invention a method of using the system shown in Figure 1 comprises the following steps: 1) A user contacts the supplier by telephone, by fax or via the internet site 20 and registers with the supplier by paying a registration fee.
2) The supplier issues the user with a personal ID code.
3) The user downloads or installs WinCAPS Multimedia 9 and the controlling program 10 onto their PC 1.
4) The user is sent a personal hardware security key 5 by post.
5) The user makes an order and purchases credit either by paying directly or by adding the amount onto an account.
6) The user is sent an encrypted code 23, which contains the credit information, as an attachment to an email.
<Desc/Clms Page number 7>
7) The encrypted code is loaded onto the user's version of the controlling program 10 by opening the attached file.
8) The security module 13 and hardware security key 5 decrypt the code and verify its authenticity before loading the amount of credit onto the credit meters 6 and 16.
9) The credit meters 6 and 16 reduce the level of credit each time a chargeable operation is carried out on WinCAPS Multimedia 9. The security module 13 displays the current credit level on the screen, updating the information every time the credit is used.
10) The user purchases additional credit by following steps 5-8 to keep working with the WinCAPS Multimedia 9.
11) All transactions are registered by the supplier on the user's account.
12) A warning message about any necessary software upgrades appears on the screen 4 when the expiry date programmed into the built in expiry date system 19 approaches.
13) After the expiry date the user has to download an updated version of the software with a new security module 13 which can accept new encrypted codes 23.

Claims (27)

  1. CLAIMS 1. A computer comprising a controlling section, and a subtitling or captioning application software section, wherein the controlling section is adapted to run tasks in the application software section when it is supplied with a specific externally generated and encrypted code, which carries commands to determine the amount of tasks which can be performed in the application software section, and in which the controlling section is further adapted to run no tasks in the application software unless a code is supplied.
  2. 2. A computer as claimed in Claim 1 in which the controlling section is adapted to monitor the tasks which are performed in the application software section, and to run no further tasks when the amount of tasks which can be performed in the application software section as determined by the externally generated code, have been performed.
  3. 3. A computer as claimed in Claim 2 in which the controlling system is adapted to provide information on the tasks which have been performed in the application software section, and the amount of further tasks which can be performed in the application software section.
  4. 4. A computer as claimed in Claim 3 in which the number of tasks which have been performed in the application software section, and the number of further tasks which can be performed in the application software section is translated to the user through a system of credits, in which number of credits is reduced when tasks are performed in the application software.
  5. 5. A computer as claimed in Claim 4 in which the controlling system can be provided with a number of different externally generated and encrypted codes, which carry commands to determine different amounts of tasks which can be performed in the application software section, so that any number of credits can be provided.
    <Desc/Clms Page number 9>
  6. 6. A computer as claimed in Claim 5 in which the controlling system is adapted to receive the externally generated and encrypted codes from a code generating computer via a data transfer means.
  7. 7. A computer as claimed in Claim 6 in which the data transfer means is a connection provided via the Internet.
  8. 8. A computer as claimed in Claim 7 in which the controlling system can be provided with any number of codes at any time, so that any number of credits can be stored in the controlling system.
  9. 9. A computer as claimed in Claim 8 in which the controlling system is adapted to warn the user when a predetermined level of credits is reached.
  10. 10. A computer as claimed in Claim 9 in which the controlling system is adapted to provide a user prompt to connect to the code generating computer via the Internet when the credits expire.
  11. 11. A computer as claimed in Claim 10 in which the controlling system is provided with individual identification means, in which the individual identification means is communicated to the code generating computer via the Internet, and in which the controlling system will only accept externally generated and encrypted codes created individually for it by the code generating computer.
  12. 12. A computer as claimed in any of the above Claims in which the controlling system will only run tasks in the application software section when a hardware security key is connected to the computer.
  13. 13. A computer as claimed in claim 12 in which the controlling system will only run tasks in the application software section when a hardware security key which is provided with individual identification means is connected to the computer.
    <Desc/Clms Page number 10>
  14. 14. A computer as claimed in Claim 13 in which the controlling system is a computer program, installed onto an operating system installed on the computer.
  15. 15. A computer as claimed in Claim 14 in which the computer program comprises a security module sub-program comprising a credit metre, a code decryption and authentication function and an interface with an Internet browser program also installed onto the operating system.
  16. 16. A computer as claimed in Claim 15 in which the computer program also comprises an interface with the application software section and a task monitoring and recording function.
  17. 17. A computer as claimed in Claim 16 in which the computer program is provided with an interface with the hardware security key, which is itself provided with a code authentication function and a credit metre.
  18. 18. A computer as claimed in Claim 17 in which the computer program is provided with an expiry date system, which is adapted to run no tasks in the application software section after a predetermined date.
  19. 19. A computer as claimed in Claim 18 in which the expiry date system is adapted to warn the user of the expiry date at a predetermined time prior to the expiry date.
  20. 20. A computer as claimed in Claim 19 in which the computer program is adapted to provide the user with a prompt to connect to the code generating computer via the Internet, where a new computer program can be provided with a new expiry date to replace the current computer program.
  21. 21. A computer as claimed in Claim 20 in which the operating system is a Microsoft Windows type operating platform.
  22. 22. A computer as claimed in Claim 21 in which the application software section is Sysmedia WinCAPS Multimedia.
    <Desc/Clms Page number 11>
  23. 23. A computer program and/or data enabling a computer to implement all or part of the functions as set forth in any of the above Claims.
  24. 24. A data carrying medium holding thereon a computer program and/or data for enabling a computer to implement all or part of the functions as set forth in any of the above Claims, and in which said medium is computer processable.
  25. 25. A method of operating a computer as set forth in any of the above Claims, comprising the steps of: 1) Registering end users of the controlling section and the application software section onto a database.
    2) Loading or installing the controlling section and the application software section onto the computer.
    3) Selling encrypted codes to said registered end users for loading onto the computer so the controlling section will run tasks in the application software section.
    4) Selling further encrypted codes to registered end users for loading onto the computer so the controlling section will run further tasks on the application software section.
  26. 26. A method of operating a computer as claimed in Claim 25, comprising the further steps of: 1) The user contacts the supplier by telephone, by fax or via the Internet, registers with the supplier by paying a registration fee, and places an order.
    2) The supplier issues the user with a personal ID code.
    3) The user downloads or installs WinCAPS Multimedia and the controlling computer program onto the computer.
    4) The user is sent a personal hardware security key by post.
    5) The user purchases credit either by paying directly or by adding the amount onto an account provided by the supplier.
    <Desc/Clms Page number 12>
    6) The user is sent an encrypted code, which contains the credit information, as an attachment to an email sent via the Internet.
    7) The user loads the encrypted code into controlling computer program by opening the attached file.
    8) The security module and the hardware security key decrypt the code and verify its authenticity before loading the amount of credit onto credit metres provided in the security module and the hardware security key.
    9) The credit meters reduce the level of credit when chargeable operations are carried out on WinCAPS Multimedia. The security module displays the current credit level on the screen, updating the information every time the credit is used.
    10) The user purchases additional credit by following steps 5-8 to keep working with the WinCAPS Multimedia.
    11) All transactions are registered by the supplier on the user's account.
    12) A warning message about any necessary software upgrades appears on the screen when the expiry date approaches.
    13) After the expiry date the user has to download an updated version of the software with a new security module which can accept new encrypted codes.
  27. 27. A computer, computer program, data carrying means holding thereon a computer program, or a method of operating a computer, substantially as described herein and with reference to the accompanying diagrams
GB0111291A 2001-05-09 2001-05-09 Pay per use software Withdrawn GB2378529A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
GB0111291A GB2378529A (en) 2001-05-09 2001-05-09 Pay per use software

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB0111291A GB2378529A (en) 2001-05-09 2001-05-09 Pay per use software

Publications (2)

Publication Number Publication Date
GB0111291D0 GB0111291D0 (en) 2001-06-27
GB2378529A true GB2378529A (en) 2003-02-12

Family

ID=9914270

Family Applications (1)

Application Number Title Priority Date Filing Date
GB0111291A Withdrawn GB2378529A (en) 2001-05-09 2001-05-09 Pay per use software

Country Status (1)

Country Link
GB (1) GB2378529A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1632834A2 (en) * 2004-09-01 2006-03-08 Agenda Informationssysteme GmbH Method for access control to an application program
EP1984878A1 (en) * 2006-02-14 2008-10-29 Microsoft Corporation Disaggregated secure execution environment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996018939A2 (en) * 1994-12-16 1996-06-20 Graphisoft R & D Software Development Company Limited By Shares Software usage metering system
WO1997025675A1 (en) * 1996-01-10 1997-07-17 John Philip Griffits A secure pay-as-you-use system for computer software
EP0836132A1 (en) * 1996-10-09 1998-04-15 Hewlett-Packard Company Software metering management of remote computing devices
WO2001084283A2 (en) * 2000-04-28 2001-11-08 Moldflow Corporation Network enabled application software system and method
EP1176491A2 (en) * 2000-05-25 2002-01-30 Sony Corporation Software program providing system and software program providing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1996018939A2 (en) * 1994-12-16 1996-06-20 Graphisoft R & D Software Development Company Limited By Shares Software usage metering system
WO1997025675A1 (en) * 1996-01-10 1997-07-17 John Philip Griffits A secure pay-as-you-use system for computer software
EP0836132A1 (en) * 1996-10-09 1998-04-15 Hewlett-Packard Company Software metering management of remote computing devices
WO2001084283A2 (en) * 2000-04-28 2001-11-08 Moldflow Corporation Network enabled application software system and method
EP1176491A2 (en) * 2000-05-25 2002-01-30 Sony Corporation Software program providing system and software program providing method

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1632834A2 (en) * 2004-09-01 2006-03-08 Agenda Informationssysteme GmbH Method for access control to an application program
EP1632834A3 (en) * 2004-09-01 2006-05-24 Agenda Informationssysteme GmbH Method for access control to an application program
EP1984878A1 (en) * 2006-02-14 2008-10-29 Microsoft Corporation Disaggregated secure execution environment
EP1984878A4 (en) * 2006-02-14 2011-04-13 Microsoft Corp Disaggregated secure execution environment

Also Published As

Publication number Publication date
GB0111291D0 (en) 2001-06-27

Similar Documents

Publication Publication Date Title
US5984508A (en) System, method and article of manufacture for product return of software and other information
US7428512B2 (en) Information distribution system, information distribution device, information receiving device, information distribution method, information distribution program, recording medium recording the information distribution program, information receiving method, information receiving program, and recording medium recording the information receiving program
US7137140B2 (en) Transaction verification
KR100796583B1 (en) System, method and storage medium for license management
US20020161709A1 (en) Server-side commerce for deliver-then-pay content delivery
US7016878B2 (en) Content sales period verifying system and content decryption key effective period verifying system
US20040015958A1 (en) Method and system for conditional installation and execution of services in a secure computing environment
US20210256491A1 (en) System and method for remote management of sale transaction data
US20160005016A1 (en) Metering System For Software Licenses
GB2378780A (en) An arrangement for preventing the re-use of tokens in accessing pay-per-use software
US8738535B2 (en) System and method for software site licensing
JPH10269078A (en) Software distribution method, server device and client device
US7711614B2 (en) Content delivery method, content delivery service computer, content delivery service system, data discard recognition method, data discard recognition computer, and terminal
US20020055910A1 (en) Program component distribution
US7600228B2 (en) Information processing device and information processing terminal
US10534896B2 (en) Authorising use of a computer program
CN100447773C (en) Method, system and program for reuse of software license for new computer hardware
GB2378529A (en) Pay per use software
JP2002006974A (en) Rental and sales method, of program management method of trial, rental or sold software program, and the recording medium of program installed in terminal computer
WO2003036530A1 (en) A method and a system for licensing digital resources and services
KR20060057996A (en) Computer recovery method

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)