WO1998053383A1 - Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files - Google Patents

Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files Download PDF

Info

Publication number
WO1998053383A1
WO1998053383A1 PCT/SE1998/000936 SE9800936W WO9853383A1 WO 1998053383 A1 WO1998053383 A1 WO 1998053383A1 SE 9800936 W SE9800936 W SE 9800936W WO 9853383 A1 WO9853383 A1 WO 9853383A1
Authority
WO
WIPO (PCT)
Prior art keywords
feature
log
program
computer system
activation
Prior art date
Application number
PCT/SE1998/000936
Other languages
French (fr)
Inventor
Peter Carlsund
Original Assignee
Telefonaktiebolaget Lm Ericsson
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Telefonaktiebolaget Lm Ericsson filed Critical Telefonaktiebolaget Lm Ericsson
Priority to AU75614/98A priority Critical patent/AU7561498A/en
Publication of WO1998053383A1 publication Critical patent/WO1998053383A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/38Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/42314Systems providing special services or facilities to subscribers in private branch exchanges
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/835Timestamp
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/36Statistical metering, e.g. recording occasions when traffic exceeds capacity of trunks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/42Systems providing special services or facilities to subscribers
    • H04M3/54Arrangements for diverting calls for one subscriber to another predetermined subscriber

Definitions

  • the present invention relates to computer systems and especially to the handling of optional features in such systems.
  • Logging functions are commonly used in computer systems to see what functions have been used.
  • a vendor who wishes to verify that only authorized use is being made of a system could at any time request to inspect the log file or log files of the system.
  • log files may be tampered with and erased to hide any unauthorized use of features in the system.
  • the use of features is logged together with other information about activities that occur regularly in the system, for example about system restarts.
  • the log is never empty, and log entries occur regularly, unless the log or the logging function has been tampered with. Thus, if someone tries to cheat, it will be revealed in the log.
  • the log enables the vendor of a system comprising optional features to check what features the customer has used since installation.
  • the log enables the vendor to check that only activated features have been used and that all activation procedures were the result of appropriate business transactions.
  • Figure 1 is a schematic representation of a computer system according to the invention.
  • Figure 2 is a flowchart of the events that occur when someone tries to use an optional feature in a system according to a preferred embodiment of the invention.
  • FIG. 1 is a schematic representation of a computer system according to the invention.
  • the system comprises a number of basic functions 1, for example an operating system, or, in a telephone exchange, the basic switching functions and the basic subscriber functions.
  • FI, F2, ... , Fn there are one or more optional programs and/or features FI, F2, ... , Fn within the programs.
  • the word processing program has some optional features, such as a graphics package and an equation editor. If the customer wants only the file managing program and the basic version word processing program, the whole package would be delivered, but the spread sheet program, the graphics package and the equation editor would be locked, or deactivated. Later on, if the customer wanted the graphics functions, it would already be available without any new installation, and would only need to be activated.
  • the computer system is a telephone exchange, for example, it may include the basic subscriber services from the begi_t ⁇ ing, but not optional features such as call waiting and call forwarding, which may be offered to the subscribers, and which may be wanted at a later stage.
  • the system includes one log indicator 9 stored in such a way that it is not persistent, for example in the random access memory (RAM). In this log indicator it is indicated when a feature is used for the first time. The log records are then written to a log 11 stored on disk, out of reach for the user, so that it cannot be changed or erased manually, as explained in connection with figure 2. It will not be possible to prevent this with 100% certainty, but if attempts to change or erase the log are made, these attempts will leave traces.
  • RAM random access memory
  • the feature identity, time of activation, activation state and any other data about the transaction are logged.
  • the vendor may choose to include a transaction-unique seal, which may be stored in the log as an unambiguous indication that the feature was activated as a result of a proper business transaction.
  • the log indicator 9 is erased, but the log 11 is not. hen the system is powered up or restarted, some system-specific information that is always present and can be verified against other information sources, is checked and stored in the log 11. In a preferred embodiment, the activation status, and the time and date of the last change of status, of all optional features are registered.
  • the system vendor may examine the log 11 at regular or irregular intervals, to verify that only the features paid for have been used. If the log 11 comprises information about every time a feature is used, it may also be used, for example, to determine which features are used by the customers and which ones are not. This information may in turn be used by the vendor to improve the system software.
  • Figure 2 shows the events that takes place when someone tries to use an optional feature in the system.
  • the computer system comprising an office program package
  • this may be when someone tries to run one of the programs or, assuming that a person is working in the word-processing program, for example at an attempt to use the graphics part of the program.
  • a telephone exchange it may be when a subscriber tries to use the call forwarding feature.
  • Step 100 An attempt is made to access a feature.
  • Step 102 The system checks if the feature has been activated. If yes, go to step 154; if no, go to step 158.
  • Step 104 The system checks if the feature has been activated permanently. If yes, go to step 160; if no, go to step 156.
  • Step 106 The system checks if the last activation date of the feature has not expired.
  • step 160 If yes, go to step 160; if no, go to step 158.
  • Step 108 Access to the feature is denied. End of procedure.
  • Step 110 The system checks if the log indication for the feature is activated. If yes, go to step 166; of no, go to step 162.
  • Step 112 The system creates a log record comprising the feature identity, activation status and current date in the log indication found in RAM.
  • Step 114 The log record is stored in the log on disk.
  • Step 116 Access to the feature is granted. End of procedure.
  • step 108 After or in connection to step 108 of course the failed attempt to access the feature could be logged, although this is not shown in the flow chart.
  • the limited period of time After the limited period of time has expired, it would of course be possible to deactivate the feature. Instead of making the feature available for a limited period of time, it would be possible to allow the user to test the feature a limited number of times. This could be solved in different ways; for example, the date tag would be replaced by a field registering the number of times the feature may be used, and a field registering how many times the feature had actually been used. In steps 102, 104, 106, the values of these two fields would be compared. Another possible solution would be to register the number of times the user was allowed to use the feature in a counter field and decrement the value of this counter field each time the feature was accessed.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

A method and an apparatus for enabling a vendor of a computer system, such as a telephone exchange, to see what features in a computer system have been used by the customer, and which ones have not. The computer system normally comprises one or more optional features, which may be activated forever, or for a limited period of time. Information concerning the activation status, when the activation status was changed, and the use of each feature, is logged in a persistently stored log (11). The use of each feature is also registered in a log indicator (9). By checking the log (11) and the log indicator (9), the system vendor can determine what features have been used and, in one embodiment, how often each feature has been used.

Description

METHOD AND APPARATUS FOR VISUALIZING THE FEATURES/PROGRAMS THAT HAVE BEEN USED IN A COMPUTER SYSTEM BY MEANS OF LOG FILES
Technical Field
The present invention relates to computer systems and especially to the handling of optional features in such systems.
Background
Especially in large computer systems, there is a need for vendors to offer optional functions or features that can be made available to an operator if and when they are paid for. In many cases it is feasible to include all features at system generation, to avoid having to make new deliveries each time a customer wants to upgrade his system with a new optional function, which is costly and time consuming. Also the system management becomes increasingly difficult when new deliveries are made.
One example of such a computer system is a modern digital telephone exchange. In telephone exchanges it is particularly important to avoid service interrupt. Therefore, there is a strong desire to be able to change the functionality of a telephone exchange without having to take the exchange out of service.
It is possible to deliver a complete software system to the customer, but to activate only the programs or features the customer has ordered. The other programs or features could then be activated at a later date without new software installation. This, however, makes it possible for a customer to make unauthorized use of the optional features, if he manages to activate them. Therefore the vendor may wish to check from time to time what features have been used by a particular customer to see if features that have not been paid for have been activated and used in an unauthorized way. This is feasible for vendors of large systems, with a few large customers, where the customers and the vendors stay in close contact over a period of several years, as is the case with telecommunications systems.
Logging functions are commonly used in computer systems to see what functions have been used. A vendor who wishes to verify that only authorized use is being made of a system could at any time request to inspect the log file or log files of the system. However, log files may be tampered with and erased to hide any unauthorized use of features in the system.
Summary of the Invention It is an object of the invention to enable a system vendor to verify what programs and/or features are used, or not used, by the end users of the system, without the use of additional hardware.
It is another object of the invention to be able to discover any unauthorized use of optional features in the system without the use of additional hardware.
This and other objects are achieved according to the invention by using a log registration file in combination with a log.
In the log, the use of features is logged together with other information about activities that occur regularly in the system, for example about system restarts. In this way, the log is never empty, and log entries occur regularly, unless the log or the logging function has been tampered with. Thus, if someone tries to cheat, it will be revealed in the log.
The invention offers the following advantages:
The log enables the vendor of a system comprising optional features to check what features the customer has used since installation.
The log enables the vendor to check that only activated features have been used and that all activation procedures were the result of appropriate business transactions.
The logging of routine activities together with the information about the activation/deactivation of features allows the vendor to check if the logging function and/or the log file has been tampered with. Brief Description of the Drawings
The invention will be described in more detail in the following, with particular reference to the drawings, in which:
Figure 1 is a schematic representation of a computer system according to the invention;
Figure 2 is a flowchart of the events that occur when someone tries to use an optional feature in a system according to a preferred embodiment of the invention.
Detailed Description of the Embodiments Figure 1 is a schematic representation of a computer system according to the invention. The system comprises a number of basic functions 1, for example an operating system, or, in a telephone exchange, the basic switching functions and the basic subscriber functions.
There are one or more optional programs and/or features FI, F2, ... , Fn within the programs. As an example, consider an office program package containing a spread sheet, a word processing programming, and file managing program. The word processing program has some optional features, such as a graphics package and an equation editor. If the customer wants only the file managing program and the basic version word processing program, the whole package would be delivered, but the spread sheet program, the graphics package and the equation editor would be locked, or deactivated. Later on, if the customer wanted the graphics functions, it would already be available without any new installation, and would only need to be activated.
If the computer system is a telephone exchange, for example, it may include the basic subscriber services from the begi_tτιιing, but not optional features such as call waiting and call forwarding, which may be offered to the subscribers, and which may be wanted at a later stage. The system includes one log indicator 9 stored in such a way that it is not persistent, for example in the random access memory (RAM). In this log indicator it is indicated when a feature is used for the first time. The log records are then written to a log 11 stored on disk, out of reach for the user, so that it cannot be changed or erased manually, as explained in connection with figure 2. It will not be possible to prevent this with 100% certainty, but if attempts to change or erase the log are made, these attempts will leave traces.
When a feature is activated, the feature identity, time of activation, activation state and any other data about the transaction are logged. For example, the vendor may choose to include a transaction-unique seal, which may be stored in the log as an unambiguous indication that the feature was activated as a result of a proper business transaction.
If the system is restarted, the log indicator 9 is erased, but the log 11 is not. hen the system is powered up or restarted, some system-specific information that is always present and can be verified against other information sources, is checked and stored in the log 11. In a preferred embodiment, the activation status, and the time and date of the last change of status, of all optional features are registered.
It is possible to log every time a feature is used, but in many cases this would make the log very big and not add any useful information. In some cases the only point of interest, as will be discussed later, is whether or not the customer is using a particular feature, not how many times it is used. To prevent unauthorized persons from tampering with the file it is suggested to let the log consist of a number of sequential files, and to use a wrap-around principle, so that when it is full, the oldest file will be overwritten.
The system vendor may examine the log 11 at regular or irregular intervals, to verify that only the features paid for have been used. If the log 11 comprises information about every time a feature is used, it may also be used, for example, to determine which features are used by the customers and which ones are not. This information may in turn be used by the vendor to improve the system software.
Figure 2 shows the events that takes place when someone tries to use an optional feature in the system. In the example of the computer system comprising an office program package, this may be when someone tries to run one of the programs or, assuming that a person is working in the word-processing program, for example at an attempt to use the graphics part of the program. In the example of a telephone exchange, it may be when a subscriber tries to use the call forwarding feature.
Step 100: An attempt is made to access a feature.
Step 102: The system checks if the feature has been activated. If yes, go to step 154; if no, go to step 158.
Step 104: The system checks if the feature has been activated permanently. If yes, go to step 160; if no, go to step 156.
Step 106: The system checks if the last activation date of the feature has not expired.
If yes, go to step 160; if no, go to step 158.
Step 108: Access to the feature is denied. End of procedure.
Step 110: The system checks if the log indication for the feature is activated. If yes, go to step 166; of no, go to step 162.
Step 112: The system creates a log record comprising the feature identity, activation status and current date in the log indication found in RAM.
Step 114: The log record is stored in the log on disk.
Step 116: Access to the feature is granted. End of procedure.
After or in connection to step 108 of course the failed attempt to access the feature could be logged, although this is not shown in the flow chart.
After the limited period of time has expired, it would of course be possible to deactivate the feature. Instead of making the feature available for a limited period of time, it would be possible to allow the user to test the feature a limited number of times. This could be solved in different ways; for example, the date tag would be replaced by a field registering the number of times the feature may be used, and a field registering how many times the feature had actually been used. In steps 102, 104, 106, the values of these two fields would be compared. Another possible solution would be to register the number of times the user was allowed to use the feature in a counter field and decrement the value of this counter field each time the feature was accessed.

Claims

1. A computer system comprising one or more optional programs and/or program parts which may be activated and/or deactivated, comprising a persistently stored log (11), adapted to hold at least the following information for each optional program and/or program part:
- the feature identity (FI)
- the feature activation status (FA)
- the date when the feature activation status (FA) was last changed, characterized in that it also comprises information about activities which are not related to the handling of optional programs and/or program parts, and which occur regularly in the system
2. A computer system according to claim 1, characterized in that it comprises one log indicator file (9), adapted to hold information for each optional program and/or program part about whether it has been used or not.
3. A computer system according to claim 1 or 2, characterized in that the log (11) is adapted to hold, for each transaction in which an optional program or program part has been activated, information uniquely identifying the transaction.
4. A method for detecting the unauthorized use of optional programs and/or program parts in a computer system in which optional programs and/or program parts can be present in an activated or deactivated form and where the optional programs and/or program parts can be activated and/or deactivated without any installation of HW and/or SW, characterized by the following steps:
- when the activation status of a program or program part is changed, registering at least the identity of the program or program part, the current date and the activation status in a persistently stored log (11). - logging at least one type of activity not relating to the activation of features, which occurs regularly in the system, in the same log (11).
5. A method according to claim 5, characterized in that the following steps are performed by the computer system when an attempt to use the feature is carried out:
- checking if the feature has been activated;
- if the feature has been activated, checking if the activation is still valid;
- if the activation is still valid, granting access to the feature.
6. A method according to claim any one of the preceding claims, characterized in that the following steps are performed by the computer system when a valid activation has been verified, but before access to the feature is granted:
- checking if there is a log record for the feature, and, if there is not, performing the following steps: - registering the activation of the feature in the log indication (9)
- creating a log record for the feature and storing it in the persistent log (11).
PCT/SE1998/000936 1997-05-21 1998-05-19 Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files WO1998053383A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU75614/98A AU7561498A (en) 1997-05-21 1998-05-19 Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE9701895A SE9701895L (en) 1997-05-21 1997-05-21 Method and apparatus for computer systems
SE9701895-6 1997-05-21

Publications (1)

Publication Number Publication Date
WO1998053383A1 true WO1998053383A1 (en) 1998-11-26

Family

ID=20407025

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE1998/000936 WO1998053383A1 (en) 1997-05-21 1998-05-19 Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files

Country Status (3)

Country Link
AU (1) AU7561498A (en)
SE (1) SE9701895L (en)
WO (1) WO1998053383A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2542471A1 (en) * 1983-03-07 1984-09-14 Atalla Corp METHOD AND APPARATUS FOR ENSURING SECURITY OF ACCESS TO FILES
EP0249090A2 (en) * 1986-06-13 1987-12-16 International Business Machines Corporation Database index journaling for enhanced recovery
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
WO1997000475A1 (en) * 1995-06-14 1997-01-03 Novell, Inc. Method for managing globally distributed software components

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2542471A1 (en) * 1983-03-07 1984-09-14 Atalla Corp METHOD AND APPARATUS FOR ENSURING SECURITY OF ACCESS TO FILES
EP0249090A2 (en) * 1986-06-13 1987-12-16 International Business Machines Corporation Database index journaling for enhanced recovery
US5023907A (en) * 1988-09-30 1991-06-11 Apollo Computer, Inc. Network license server
WO1997000475A1 (en) * 1995-06-14 1997-01-03 Novell, Inc. Method for managing globally distributed software components

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
PATENT ABSTRACTS OF JAPAN, Vol. 96, No. 6; & JP,A,08 030 461 (KYUSHU NIPPON DENKI SOFTWARE KK NEC CORP) 2 February 1996. *

Also Published As

Publication number Publication date
AU7561498A (en) 1998-12-11
SE9701895L (en) 1998-11-22
SE9701895D0 (en) 1997-05-21

Similar Documents

Publication Publication Date Title
US6049670A (en) Identifier managing device and method in software distribution system
US7140035B1 (en) Rule based security policy enforcement
US5469576A (en) Front end for file access controller
US6618735B1 (en) System and method for protecting shared system files
US5893910A (en) Method and apparatus for establishing the legitimacy of use of a block of digitally represented information
US5671412A (en) License management system for software applications
CN1096014C (en) Method of operating a computer system
US6067640A (en) System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software
US6754722B2 (en) System and method for installing device drivers in a computer system
JP2006053913A (en) Central system for managing test by computer
US7882085B2 (en) Database system and method with improved locks
JPH10312335A (en) Data processing method and processor therefor
US20050216466A1 (en) Method and system for acquiring resource usage log and computer product
JP2003248596A (en) Method for taking over processing in multicomputer system
US6823348B2 (en) File manager for storing several versions of a file
US5604904A (en) Method and apparatus for accessing system management functions of a computer system
WO1994010655A1 (en) Ic card
US20020129270A1 (en) Electronic device for providing software protection
WO1998053384A1 (en) Method and apparatus for activating programs/features in a computer
EP2145335A1 (en) System and method for detecting and mitigating the writing of sensitive data to memory
WO1998053383A1 (en) Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files
JP2000010773A (en) Program execution management method and record medium recording program execution management program
JP3803002B2 (en) Data maintenance method and apparatus by data update monitoring, and storage medium storing data maintenance program
US6581156B1 (en) Method for recording a data state in a data processing system
CN112231720B (en) Positioning method for forced access control rule hiding formulator

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 09443648

Country of ref document: US

NENP Non-entry into the national phase

Ref country code: JP

Ref document number: 1998550294

Format of ref document f/p: F

REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: CA