WO1998053383A1 - Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files - Google Patents
Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files Download PDFInfo
- Publication number
- WO1998053383A1 WO1998053383A1 PCT/SE1998/000936 SE9800936W WO9853383A1 WO 1998053383 A1 WO1998053383 A1 WO 1998053383A1 SE 9800936 W SE9800936 W SE 9800936W WO 9853383 A1 WO9853383 A1 WO 9853383A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- feature
- log
- program
- computer system
- activation
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/38—Graded-service arrangements, i.e. some subscribers prevented from establishing certain connections
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/42314—Systems providing special services or facilities to subscribers in private branch exchanges
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2201/00—Indexing scheme relating to error detection, to error correction, and to monitoring
- G06F2201/835—Timestamp
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/22—Arrangements for supervision, monitoring or testing
- H04M3/36—Statistical metering, e.g. recording occasions when traffic exceeds capacity of trunks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04M—TELEPHONIC COMMUNICATION
- H04M3/00—Automatic or semi-automatic exchanges
- H04M3/42—Systems providing special services or facilities to subscribers
- H04M3/54—Arrangements for diverting calls for one subscriber to another predetermined subscriber
Definitions
- the present invention relates to computer systems and especially to the handling of optional features in such systems.
- Logging functions are commonly used in computer systems to see what functions have been used.
- a vendor who wishes to verify that only authorized use is being made of a system could at any time request to inspect the log file or log files of the system.
- log files may be tampered with and erased to hide any unauthorized use of features in the system.
- the use of features is logged together with other information about activities that occur regularly in the system, for example about system restarts.
- the log is never empty, and log entries occur regularly, unless the log or the logging function has been tampered with. Thus, if someone tries to cheat, it will be revealed in the log.
- the log enables the vendor of a system comprising optional features to check what features the customer has used since installation.
- the log enables the vendor to check that only activated features have been used and that all activation procedures were the result of appropriate business transactions.
- Figure 1 is a schematic representation of a computer system according to the invention.
- Figure 2 is a flowchart of the events that occur when someone tries to use an optional feature in a system according to a preferred embodiment of the invention.
- FIG. 1 is a schematic representation of a computer system according to the invention.
- the system comprises a number of basic functions 1, for example an operating system, or, in a telephone exchange, the basic switching functions and the basic subscriber functions.
- FI, F2, ... , Fn there are one or more optional programs and/or features FI, F2, ... , Fn within the programs.
- the word processing program has some optional features, such as a graphics package and an equation editor. If the customer wants only the file managing program and the basic version word processing program, the whole package would be delivered, but the spread sheet program, the graphics package and the equation editor would be locked, or deactivated. Later on, if the customer wanted the graphics functions, it would already be available without any new installation, and would only need to be activated.
- the computer system is a telephone exchange, for example, it may include the basic subscriber services from the begi_t ⁇ ing, but not optional features such as call waiting and call forwarding, which may be offered to the subscribers, and which may be wanted at a later stage.
- the system includes one log indicator 9 stored in such a way that it is not persistent, for example in the random access memory (RAM). In this log indicator it is indicated when a feature is used for the first time. The log records are then written to a log 11 stored on disk, out of reach for the user, so that it cannot be changed or erased manually, as explained in connection with figure 2. It will not be possible to prevent this with 100% certainty, but if attempts to change or erase the log are made, these attempts will leave traces.
- RAM random access memory
- the feature identity, time of activation, activation state and any other data about the transaction are logged.
- the vendor may choose to include a transaction-unique seal, which may be stored in the log as an unambiguous indication that the feature was activated as a result of a proper business transaction.
- the log indicator 9 is erased, but the log 11 is not. hen the system is powered up or restarted, some system-specific information that is always present and can be verified against other information sources, is checked and stored in the log 11. In a preferred embodiment, the activation status, and the time and date of the last change of status, of all optional features are registered.
- the system vendor may examine the log 11 at regular or irregular intervals, to verify that only the features paid for have been used. If the log 11 comprises information about every time a feature is used, it may also be used, for example, to determine which features are used by the customers and which ones are not. This information may in turn be used by the vendor to improve the system software.
- Figure 2 shows the events that takes place when someone tries to use an optional feature in the system.
- the computer system comprising an office program package
- this may be when someone tries to run one of the programs or, assuming that a person is working in the word-processing program, for example at an attempt to use the graphics part of the program.
- a telephone exchange it may be when a subscriber tries to use the call forwarding feature.
- Step 100 An attempt is made to access a feature.
- Step 102 The system checks if the feature has been activated. If yes, go to step 154; if no, go to step 158.
- Step 104 The system checks if the feature has been activated permanently. If yes, go to step 160; if no, go to step 156.
- Step 106 The system checks if the last activation date of the feature has not expired.
- step 160 If yes, go to step 160; if no, go to step 158.
- Step 108 Access to the feature is denied. End of procedure.
- Step 110 The system checks if the log indication for the feature is activated. If yes, go to step 166; of no, go to step 162.
- Step 112 The system creates a log record comprising the feature identity, activation status and current date in the log indication found in RAM.
- Step 114 The log record is stored in the log on disk.
- Step 116 Access to the feature is granted. End of procedure.
- step 108 After or in connection to step 108 of course the failed attempt to access the feature could be logged, although this is not shown in the flow chart.
- the limited period of time After the limited period of time has expired, it would of course be possible to deactivate the feature. Instead of making the feature available for a limited period of time, it would be possible to allow the user to test the feature a limited number of times. This could be solved in different ways; for example, the date tag would be replaced by a field registering the number of times the feature may be used, and a field registering how many times the feature had actually been used. In steps 102, 104, 106, the values of these two fields would be compared. Another possible solution would be to register the number of times the user was allowed to use the feature in a counter field and decrement the value of this counter field each time the feature was accessed.
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
Claims
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
AU75614/98A AU7561498A (en) | 1997-05-21 | 1998-05-19 | Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
SE9701895-6 | 1997-05-21 | ||
SE9701895A SE9701895L (en) | 1997-05-21 | 1997-05-21 | Method and apparatus for computer systems |
Publications (1)
Publication Number | Publication Date |
---|---|
WO1998053383A1 true WO1998053383A1 (en) | 1998-11-26 |
Family
ID=20407025
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/SE1998/000936 WO1998053383A1 (en) | 1997-05-21 | 1998-05-19 | Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files |
Country Status (3)
Country | Link |
---|---|
AU (1) | AU7561498A (en) |
SE (1) | SE9701895L (en) |
WO (1) | WO1998053383A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2542471A1 (en) * | 1983-03-07 | 1984-09-14 | Atalla Corp | METHOD AND APPARATUS FOR ENSURING SECURITY OF ACCESS TO FILES |
EP0249090A2 (en) * | 1986-06-13 | 1987-12-16 | International Business Machines Corporation | Database index journaling for enhanced recovery |
US5023907A (en) * | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
WO1997000475A1 (en) * | 1995-06-14 | 1997-01-03 | Novell, Inc. | Method for managing globally distributed software components |
-
1997
- 1997-05-21 SE SE9701895A patent/SE9701895L/en not_active Application Discontinuation
-
1998
- 1998-05-19 AU AU75614/98A patent/AU7561498A/en not_active Abandoned
- 1998-05-19 WO PCT/SE1998/000936 patent/WO1998053383A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR2542471A1 (en) * | 1983-03-07 | 1984-09-14 | Atalla Corp | METHOD AND APPARATUS FOR ENSURING SECURITY OF ACCESS TO FILES |
EP0249090A2 (en) * | 1986-06-13 | 1987-12-16 | International Business Machines Corporation | Database index journaling for enhanced recovery |
US5023907A (en) * | 1988-09-30 | 1991-06-11 | Apollo Computer, Inc. | Network license server |
WO1997000475A1 (en) * | 1995-06-14 | 1997-01-03 | Novell, Inc. | Method for managing globally distributed software components |
Non-Patent Citations (1)
Title |
---|
PATENT ABSTRACTS OF JAPAN, Vol. 96, No. 6; & JP,A,08 030 461 (KYUSHU NIPPON DENKI SOFTWARE KK NEC CORP) 2 February 1996. * |
Also Published As
Publication number | Publication date |
---|---|
SE9701895L (en) | 1998-11-22 |
SE9701895D0 (en) | 1997-05-21 |
AU7561498A (en) | 1998-12-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US6049670A (en) | Identifier managing device and method in software distribution system | |
US7140035B1 (en) | Rule based security policy enforcement | |
US5469576A (en) | Front end for file access controller | |
US6618735B1 (en) | System and method for protecting shared system files | |
CN1096014C (en) | Method of operating a computer system | |
US5499340A (en) | Method and apparatus for computer program usage monitoring | |
US6067640A (en) | System for management of software employing memory for processing unit with regulatory information, for limiting amount of use and number of backup copies of software | |
US6754722B2 (en) | System and method for installing device drivers in a computer system | |
EP0976014A1 (en) | Method and apparatus for establishing the legitimacy of use of a block of digitally represented information | |
JP2006053913A (en) | Central system for managing test by computer | |
US7882085B2 (en) | Database system and method with improved locks | |
JPH10312335A (en) | Data processing method and processor therefor | |
US20050216466A1 (en) | Method and system for acquiring resource usage log and computer product | |
JP2003248596A (en) | Method for taking over processing in multicomputer system | |
US6823348B2 (en) | File manager for storing several versions of a file | |
WO1994010655A1 (en) | Ic card | |
US20020129270A1 (en) | Electronic device for providing software protection | |
WO1998053384A1 (en) | Method and apparatus for activating programs/features in a computer | |
JPH1049443A (en) | Information processing system | |
EP2145335A1 (en) | System and method for detecting and mitigating the writing of sensitive data to memory | |
WO1998053383A1 (en) | Method and apparatus for visualizing the features/programs that have been used in a computer system by means of log files | |
JP2000010773A (en) | Program execution management method and record medium recording program execution management program | |
JP3803002B2 (en) | Data maintenance method and apparatus by data update monitoring, and storage medium storing data maintenance program | |
US6581156B1 (en) | Method for recording a data state in a data processing system | |
CN112231720B (en) | Positioning method for forced access control rule hiding formulator |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AL AM AT AU AZ BA BB BG BR BY CA CH CN CU CZ DE DK EE ES FI GB GE GH GM GW HU ID IL IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT UA UG US UZ VN YU ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): GH GM KE LS MW SD SZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE BF BJ CF CG CI CM GA GN ML MR NE SN TD TG |
|
DFPE | Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101) | ||
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 09443648 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: JP Ref document number: 1998550294 Format of ref document f/p: F |
|
REG | Reference to national code |
Ref country code: DE Ref legal event code: 8642 |
|
122 | Ep: pct application non-entry in european phase | ||
NENP | Non-entry into the national phase |
Ref country code: CA |