WO2001038989A1 - A system for monitoring use of software - Google Patents

A system for monitoring use of software Download PDF

Info

Publication number
WO2001038989A1
WO2001038989A1 PCT/AU2000/001434 AU0001434W WO0138989A1 WO 2001038989 A1 WO2001038989 A1 WO 2001038989A1 AU 0001434 W AU0001434 W AU 0001434W WO 0138989 A1 WO0138989 A1 WO 0138989A1
Authority
WO
WIPO (PCT)
Prior art keywords
software
data processor
identifier
source data
transmission
Prior art date
Application number
PCT/AU2000/001434
Other languages
French (fr)
Inventor
Chris Mcnaughton
Original Assignee
Chris Mcnaughton
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chris Mcnaughton filed Critical Chris Mcnaughton
Priority to AU15058/01A priority Critical patent/AU1505801A/en
Publication of WO2001038989A1 publication Critical patent/WO2001038989A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2135Metering

Definitions

  • the present invention relates to computer software piracy.
  • Software piracy is still a major problem for software manufacturers.
  • One method which is employed to counteract software piracy is the software registration system.
  • software registration system typically software when it is installed on a computer results in a software registration program being activated with fields which must be completed for transmittal over the internet to the software manufacturer.
  • the present invention is aimed at providing a method of monitoring use of computer software so that manufacturers can identify unauthorised use of software.
  • the present invention provides a system for monitoring use of software comprising software having identifier means and a source data processor, a destination data processor and a communication network interconnecting the source data processor and destination data processor, wherein the software identifier means includes transmission software and identifier data and wherein the identifier means is adapted to be activated automatically when the software is installed in the source data processor, whereby the transmission software is adapted to activate the source data processor to automatically transmit the identifier data and source data processor identifier through the communication network to the destination address which is adapted to receive the identifier data and source data processor identifier and store the identifier data and source data processor identifier for monitoring purposes.
  • a storage medium having software stored therein, the software including an identifier means including transmission software and identifier data, wherein the transmission software is adapted to be activated when the software is installed in a source data processor and the source data processor is connected to the communication network, whereby the transmission software is adapted to automatically activate the source data processor to transmit the identifier data over the communication network to a destination data processor for storage thereby.
  • a method of monitoring use of software including the steps of providing software including an identifier means having transmission software and identifier data, a source data processor, a communication network and a destination data processor, installing the software on the source data processor, using the transmission software to automatically activate the source data processor to transmit the identifier data over the communication network to the destination data processor for storage thereby and operating the destination data processor to compare the stored identified data to identify identical identified data and to output from the destination data processor a means of noting that duplication of the identifier data has occurred.
  • the software comprises transmission software and main software which main software is completely distinct from the transmission software and identifier data.
  • the transmission software is adapted to read an identification means of the source data processor.
  • the identification means may comprise a URL.
  • the identifier data comprises a serial number or code number/character of the software.
  • the transmission software may be adapted to form a data package comprising the URL of the source data processor and the software serial number and send this package to an email outbox for its transmission therefrom.
  • the transmission software is preferably adapted to form an encrypted data package including the identifier data and identification means and to transmit the data package to a data transmitter of the source data processor.
  • the transmission software may be adapted to monitor the source data processor until the source data processor is connected to the communication network.
  • the transmission software detects that the source data processor is connected to the communication network
  • the transmission software is adapted to transmit the data package to an output of the source data processor and activate the source data processor to transmit the data package over the communication network.
  • the software may include main software which is adapted for a specific purpose of a purchaser and registration software which includes the identifier means.
  • the registration software may be encrypted.
  • the registration software may be hidden so that it is not flagged when the software is installed.
  • the software may include detection software for detecting when the source data processor is connected to a communication network and for activating transmission software of the registration software to transmit identifier data to a location in the source data processor where it is able to be automatically transmitted to the communication network when other data exclusive of registration software is transmitted to the communication network.
  • the location is an outbox of an email storage area.
  • the detection software may be activated whenever the source data processor is used (activated) . It is preferred that the detection software is periodically activated until the identifier data is transmitted by the source data processor.
  • the system includes feedback means located at the destination data processor for transmitting a receipt signal to the source data processor when the identifier data is received, whereby detection software of the source data processor is adapted to disable transmission of the identifier data.
  • the receipt signal preferably includes a code for deactivating the main software if a receipt signal is received from the destination data processor.
  • the software preferably includes deactivating software for deactivating the main software when the receipt signal is received through the communication network.
  • the registration software includes a counter which is incremented whenever the main software is installed on a data processor having a different URL from that stored by the detection software during a first installation of the software.
  • Figure 1 shows a block diagram of a flow chart for implementing a system for monitoring use of software in accordance with a preferred embodiment of the invention.
  • FIG. 2 shows a block diagram of a communication structure for implementing the system according to the preferred embodiment of the invention. Detailed Description of the Drawing
  • software is sold on a hard disc and the software includes the main program, which is the program the purchaser wanted to buy and monitoring software which is hidden from the purchaser.
  • the monitoring software is effectively separate from the main program although it is activated as soon as the main program is installed on a computer.
  • the monitoring software includes a set program which records the serial number of the computer in which the main program is installed. If the computer is connected to the internet via an ISP a sub program of the monitoring software searches through transmission software of the computer and records the computer URL.
  • a sub program of the monitoring software routinely checks the computer and looks to see if the computer has been configured so that it can communicate over the internet or a similar communication network.
  • the continual monitoring may take the form of checking the computer every time it is turned on.
  • the process of monitoring use of the main program begins with installation of the purchased software as shown in block (11) .
  • the monitoring software then records the serial number of the computer and if the computer is connected to an ISP it then records the URL as shown in block (12).
  • the monitoring software then prepares an encrypted email including both the serial number of the computer and the URL of the computer as shown in block (13) .
  • the monitoring software then monitors the computer to see if it is connected to an ISP (14). If the computer is not connected to an ISP the monitoring software then waits until the computer is connected to an ISP (15). If the computer is connected to an ISP the email is sent to a central data base and is stored therein (16).
  • the main data base typically would be a data base set up by the manufacturer of the main program and the data base stores the decrypted email which contains the serial number of the computer as well as its URL. If the data base already has a record of the URL and serial number of the computer (17) then this indicates that the software has been installed on another computer and has thus been duplicated as shown in block (18).
  • the central data base is then adapted to issue a notification email 19 to the computer from which the encrypted email was received. If no reply is received from the computer then the central data base can issue a notification to the manufacturer indicating that legal action may be required (20) . A report would then be sent to the copyright owner 21 and then whatever legal recourse is required can be enacted.
  • the monitoring procedure is completed (22) .
  • the above system could be modified by having the monitoring software including a deactivation software which is able to be deactivated upon receipt of a deactivation signal from the central data base. Such a signal would be transmitted from the central data base if duplication is recorded at the central data base.
  • FIG. 30 new software incorporating monitoring software in accordance with the present invention is identified by item 30.
  • This software may be recorded on a CD ROM and includes the user App 31 and monitoring software 32.
  • the monitoring software 32 uses a COM object and OLE automation.
  • the user App can be in any supported language . It is preferred that the COM object produces a standard HTTP request directly from the program and this allows a server App 33 to be a standard active server page ASP.
  • the monitoring software ASP collects the application and processor ID information and passes it on to a monitoring validation module for authentication. The response is then encoded and sent back to the monitoring software COM object.
  • the monitoring validation module 34 contains business logic which determines how validation requests are dealt with. Unique IDs from requests are stored in a data base. Responses are created for the end users and (also if required) violation/usage information is created for developers .
  • This module contains all the logic associated with the validation process, but is a passive module. It is preferably the responsibility of other modules to query this module and communicate any responses .
  • the above system thus provides a simple way of monitoring use of new software without the purchaser being aware of this use or having to complete registration requirements in the conventional fashion.

Abstract

A system for monitoring use of software comprising software having identifier means and a source data processor, a destination data processor and a communication network interconnecting the source data processor and destination data processor, wherein the software identifier means includes transmission software and identifier data and wherein the identifier means is adapted to be activated automatically when the software is installed in the source data processor, whereby the transmission software is adapted to activate the source data processor to automatically transmit the identifier data and source data processor identifier through the communication network to the destination address which is adapted to receive the identifier data and source data processor identifier and store the identifier data and source data processor identifier for monitoring purposes.

Description

Title of the Invention
A SYSTEM FOR MONITORING USE OF SOFTWARE Field of the Invention
The present invention relates to computer software piracy.
Background of the Invention
Software piracy is still a major problem for software manufacturers. One method which is employed to counteract software piracy is the software registration system. Typically software when it is installed on a computer results in a software registration program being activated with fields which must be completed for transmittal over the internet to the software manufacturer.
The problem with the above system is that failure to complete the registration fields does not prevent use of the software. Thus although there are benefits in registering the software, such as receiving updates and warranties, it is still possible for multiple users to use the same software without the manufacturer being aware of this other use and thus obtaining the applicable licence fee. Summary of the Invention
The present invention is aimed at providing a method of monitoring use of computer software so that manufacturers can identify unauthorised use of software.
Accordingly the present invention provides a system for monitoring use of software comprising software having identifier means and a source data processor, a destination data processor and a communication network interconnecting the source data processor and destination data processor, wherein the software identifier means includes transmission software and identifier data and wherein the identifier means is adapted to be activated automatically when the software is installed in the source data processor, whereby the transmission software is adapted to activate the source data processor to automatically transmit the identifier data and source data processor identifier through the communication network to the destination address which is adapted to receive the identifier data and source data processor identifier and store the identifier data and source data processor identifier for monitoring purposes.
According to another aspect of the present invention there is provided a storage medium having software stored therein, the software including an identifier means including transmission software and identifier data, wherein the transmission software is adapted to be activated when the software is installed in a source data processor and the source data processor is connected to the communication network, whereby the transmission software is adapted to automatically activate the source data processor to transmit the identifier data over the communication network to a destination data processor for storage thereby.
According to a further aspect of the present invention there is provided a method of monitoring use of software, the method including the steps of providing software including an identifier means having transmission software and identifier data, a source data processor, a communication network and a destination data processor, installing the software on the source data processor, using the transmission software to automatically activate the source data processor to transmit the identifier data over the communication network to the destination data processor for storage thereby and operating the destination data processor to compare the stored identified data to identify identical identified data and to output from the destination data processor a means of noting that duplication of the identifier data has occurred.
Preferably the software comprises transmission software and main software which main software is completely distinct from the transmission software and identifier data.
Preferably the transmission software is adapted to read an identification means of the source data processor.
The identification means may comprise a URL.
Preferably the identifier data comprises a serial number or code number/character of the software.
The transmission software may be adapted to form a data package comprising the URL of the source data processor and the software serial number and send this package to an email outbox for its transmission therefrom. The transmission software is preferably adapted to form an encrypted data package including the identifier data and identification means and to transmit the data package to a data transmitter of the source data processor.
The transmission software may be adapted to monitor the source data processor until the source data processor is connected to the communication network.
Preferably when the transmission software detects that the source data processor is connected to the communication network, the transmission software is adapted to transmit the data package to an output of the source data processor and activate the source data processor to transmit the data package over the communication network.
The software may include main software which is adapted for a specific purpose of a purchaser and registration software which includes the identifier means.
The registration software may be encrypted. The registration software may be hidden so that it is not flagged when the software is installed.
The software may include detection software for detecting when the source data processor is connected to a communication network and for activating transmission software of the registration software to transmit identifier data to a location in the source data processor where it is able to be automatically transmitted to the communication network when other data exclusive of registration software is transmitted to the communication network. Preferably the location is an outbox of an email storage area.
The detection software may be activated whenever the source data processor is used (activated) . It is preferred that the detection software is periodically activated until the identifier data is transmitted by the source data processor.
It is preferred that the system includes feedback means located at the destination data processor for transmitting a receipt signal to the source data processor when the identifier data is received, whereby detection software of the source data processor is adapted to disable transmission of the identifier data.
The receipt signal preferably includes a code for deactivating the main software if a receipt signal is received from the destination data processor.
The software preferably includes deactivating software for deactivating the main software when the receipt signal is received through the communication network.
Preferably the registration software includes a counter which is incremented whenever the main software is installed on a data processor having a different URL from that stored by the detection software during a first installation of the software.
It is preferred that the identifier data is transmitted over the communication network with the latest counter number. Brief Description of the Drawing A preferred embodiment of the present invention will now be described by way of example only with reference to the accompanying drawings in which:
Figure 1 shows a block diagram of a flow chart for implementing a system for monitoring use of software in accordance with a preferred embodiment of the invention; and
Figure 2 shows a block diagram of a communication structure for implementing the system according to the preferred embodiment of the invention. Detailed Description of the Drawing
According to the preferred embodiment of the present invention software is sold on a hard disc and the software includes the main program, which is the program the purchaser wanted to buy and monitoring software which is hidden from the purchaser.
The monitoring software is effectively separate from the main program although it is activated as soon as the main program is installed on a computer.
The monitoring software includes a set program which records the serial number of the computer in which the main program is installed. If the computer is connected to the internet via an ISP a sub program of the monitoring software searches through transmission software of the computer and records the computer URL.
If the computer is not connected to a communication network such as the internet, a sub program of the monitoring software routinely checks the computer and looks to see if the computer has been configured so that it can communicate over the internet or a similar communication network. The continual monitoring may take the form of checking the computer every time it is turned on.
As shown in the figure the process of monitoring use of the main program begins with installation of the purchased software as shown in block (11) . The monitoring software then records the serial number of the computer and if the computer is connected to an ISP it then records the URL as shown in block (12).
The monitoring software then prepares an encrypted email including both the serial number of the computer and the URL of the computer as shown in block (13) .
The monitoring software then monitors the computer to see if it is connected to an ISP (14). If the computer is not connected to an ISP the monitoring software then waits until the computer is connected to an ISP (15). If the computer is connected to an ISP the email is sent to a central data base and is stored therein (16). The main data base typically would be a data base set up by the manufacturer of the main program and the data base stores the decrypted email which contains the serial number of the computer as well as its URL. If the data base already has a record of the URL and serial number of the computer (17) then this indicates that the software has been installed on another computer and has thus been duplicated as shown in block (18).
The central data base is then adapted to issue a notification email 19 to the computer from which the encrypted email was received. If no reply is received from the computer then the central data base can issue a notification to the manufacturer indicating that legal action may be required (20) . A report would then be sent to the copyright owner 21 and then whatever legal recourse is required can be enacted.
If no legal action is required because the computer responds in a manner requested in block 19 then the monitoring procedure is completed (22) . The above system could be modified by having the monitoring software including a deactivation software which is able to be deactivated upon receipt of a deactivation signal from the central data base. Such a signal would be transmitted from the central data base if duplication is recorded at the central data base.
As shown in Figure 2 new software incorporating monitoring software in accordance with the present invention is identified by item 30. This software may be recorded on a CD ROM and includes the user App 31 and monitoring software 32. In this example the monitoring software 32 uses a COM object and OLE automation.
The user App can be in any supported language . It is preferred that the COM object produces a standard HTTP request directly from the program and this allows a server App 33 to be a standard active server page ASP. The monitoring software ASP collects the application and processor ID information and passes it on to a monitoring validation module for authentication. The response is then encoded and sent back to the monitoring software COM object.
It is noted that the monitoring validation module 34 contains business logic which determines how validation requests are dealt with. Unique IDs from requests are stored in a data base. Responses are created for the end users and (also if required) violation/usage information is created for developers . This module contains all the logic associated with the validation process, but is a passive module. It is preferably the responsibility of other modules to query this module and communicate any responses .
The above system thus provides a simple way of monitoring use of new software without the purchaser being aware of this use or having to complete registration requirements in the conventional fashion.

Claims

1. A system for monitoring use of software comprising software having identifier means and a source data processor, a destination data processor and a communication network interconnecting the source data processor and destination data processor, wherein the software identifier means includes transmission software and identifier data and wherein the identifier means is adapted to be activated automatically when the software is installed in the source data processor, whereby the transmission software is adapted to activate the source data processor to automatically transmit the identifier data and source data processor identifier through the communication network to the destination address which is adapted to receive the identifier data and source data processor identifier and store the identifier data and source data processor identifier for monitoring purposes.
2. The system as claimed in claim 1 wherein the software comprises transmission software and main software which main software is completely distinct from the transmission software and identifier data.
3. The system as claimed in claim 1 or 2 wherein the transmission software is adapted to read an identification means of the source data processor.
4. The system as claimed in claim 3 wherein the identification means comprises a URL.
5. The system as claimed in claim 4 wherein the identifier data comprises a serial number or code number/character of the software.
6. The system as claimed in claim 5 wherein the transmission software is adapted to form a data package comprising the URL of the source data processor and the software serial number and send this package to an email out box for its transmission therefrom.
7. The system as claimed in claim 6 wherein the transmission software is adapted to form an encrypted data package including the identifier data and identification means and to transmit the data package to a data transmitter of the source data processor.
8. The system as claimed in claim 7 wherein the transmission software is adapted to monitor the source data processor until the source data processor is connected to the communication network.
9. The system as claimed in claim 8 wherein the transmission software, when it detects that the source data processor is connected to the communication network, is adapted to transmit the data package to an output of the source data processor and activate the source data processor to transmit the data package over the communication network.
10. The system as claimed in claim 9 wherein the software includes main software which is adapted for a specific purpose of a purchaser and registration software which includes the identifier means.
11. The system as claimed in claim 10 wherein the registration software is encrypted.
12. The system as claimed in claim 11 wherein the registration software is adapted to be hidden so that it is not flagged when the software is installed.
13. The system as claimed in claim 12 including feed back means located at the destination data processor for transmitting a receipt signal to the source data processor when the identifier data is received whereby detection software of the source data processor is adapted to disable transmission of the identifier data.
14. The system as claimed in claim 13 wherein the receipt signal includes a code for deactivating the main software if a receipt signal is received from the destination data processor.
15. A storage medium having software stored therein, the software including an identifier means including transmission software and identifier data, wherein the transmission software is adapted to be activated when the software is installed in a source data processor and the source data processor is connected to the communication network, whereby the transmission software is adapted to automatically activate the source data processor to transmit the identifier data over the communication network to a destination data processor for storage thereby.
16. The storage medium as claimed in claim 15 wherein the transmission software is adapted to read an identification means of the source data processor.
17. The storage medium as claimed in claim 16 wherein the identifier data comprises a serial number or code number/character of the software.
18. The storage medium as claimed in claim 18 wherein the transmission software is adapted to form a data package comprising the URL of the source data processor and the software serial number and send this package to an email output for its transmission therefrom.
19. The storage medium as claimed in claim 18 wherein the transmission software is adapted to form an encrypted data package including the identifier data and identification means and to transmit the data package to a data transmitter of the source data processor.
20. The storage medium as claimed in claim 19 wherein the transmission software is adapted to monitor the source data processor until the source data processor is connected to the communication network.
21. The storage medium as claimed in claim 20 wherein the transmission software is adapted to transmit the data package to an output of the source data processor and activate the source data processor to transmit the data package over the communication network when the transmission software detects that the source data processor is connected to the communication network.
22. The storage medium as claimed in claim 21 wherein the software includes main software which is adapted for a specific purpose of a purchaser and registration software which includes the identifier means.
23. The storage medium as claimed in claim 22 wherein the registration software is adapted to be hidden so that it is not flagged when the software is installed.
24. The storage medium as claimed in claim 23 wherein the software includes detection software for detecting when the source data processor is connected to the communication network and for activating transmission software of the registration software to transmit identifier data to a location in the source data processor where it is able to be automatically transmitted to the communication network when other data exclusive of registration software is transmitted to the communication network.
25. The storage medium as claimed in claim 24 wherein the detection software is adapted to be periodically activated whenever the source data processor is used until the identified data is transmitted by the source data processor.
26. The storage medium as claimed in claim 25 wherein the software includes deactivation software for deactivating the main software when a receipt signal is received through the communication network from the destination data processor.
27. A method of monitoring use of software, the method including the steps of providing software including an identifier means having transmission software and identifier data, a source data processor, a communication network and a destination data processor, installing the software on the source data processor, using the transmission software to automatically activate the source data processor to transmit the identifier data over the communication network to the destination data processor for storage thereby and operating the destination data processor to compare the stored identified data to identify identical identified data and to output from the destination data processor a means of noting that duplication of the identifier data has occurred.
28. The method as claimed in claim 27 wherein the transmission software is adapted to read an identification means of the source data processor and is adapted to form an encrypted data package including the identifier data and identification means and to transmit the data package to a data transmitter of the source data processor.
PCT/AU2000/001434 1999-11-26 2000-11-24 A system for monitoring use of software WO2001038989A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
AU15058/01A AU1505801A (en) 1999-11-26 2000-11-24 A system for monitoring use of software

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AUPQ4345A AUPQ434599A0 (en) 1999-11-26 1999-11-26 Computer software
AUPQ4345 1999-11-26

Publications (1)

Publication Number Publication Date
WO2001038989A1 true WO2001038989A1 (en) 2001-05-31

Family

ID=3818487

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2000/001434 WO2001038989A1 (en) 1999-11-26 2000-11-24 A system for monitoring use of software

Country Status (2)

Country Link
AU (2) AUPQ434599A0 (en)
WO (1) WO2001038989A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2406664A (en) * 2003-10-03 2005-04-06 Sendo Int Ltd Registering an application program of a mobile information device
EP1796362A1 (en) * 2004-09-28 2007-06-13 Huawei Technologies Co., Ltd. A mobile terminal having monitor function and a method for realizing monitor function by the mobile terminal

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5790664A (en) * 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
CA2231978A1 (en) * 1998-05-20 1999-11-20 Andre J. Brisson Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5790664A (en) * 1996-02-26 1998-08-04 Network Engineering Software, Inc. Automated system for management of licensed software
CA2231978A1 (en) * 1998-05-20 1999-11-20 Andre J. Brisson Bigsoft brother - software method for tracking and identifying illegal software piracy, installation, copying and theft of software

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2406664A (en) * 2003-10-03 2005-04-06 Sendo Int Ltd Registering an application program of a mobile information device
GB2406664B (en) * 2003-10-03 2006-12-13 Sendo Int Ltd Registering an application program of an information device
EP1796362A1 (en) * 2004-09-28 2007-06-13 Huawei Technologies Co., Ltd. A mobile terminal having monitor function and a method for realizing monitor function by the mobile terminal
EP1796362A4 (en) * 2004-09-28 2009-12-30 Huawei Tech Co Ltd A mobile terminal having monitor function and a method for realizing monitor function by the mobile terminal

Also Published As

Publication number Publication date
AU1505801A (en) 2001-06-04
AUPQ434599A0 (en) 1999-12-23

Similar Documents

Publication Publication Date Title
US7611053B2 (en) Ticket issuing system, storage medium and electronic ticket issuing and managing method
US8474051B2 (en) Information processing system, information processor, image forming apparatus, and information processing method
CN101287608B (en) Printing apparatus and information processing apparatus and its control method
US6658586B1 (en) Method and system for device status tracking
JP4564532B2 (en) Method and apparatus for accessing information of an external machine readable tag
US6636983B1 (en) Method and system for uniform resource locator status tracking
US8316423B2 (en) Image forming apparatus, key management server, activation system, and deactivation system
US7818741B1 (en) Method and system to monitor installation of a software program
US8839444B2 (en) Automatic analysis of software license usage in a computer network
US20050044546A1 (en) Method of allowing printing from a network attached device
US20090210435A1 (en) Configuration item management tool
EP1967980B1 (en) Software execution management device and method thereof
WO2001025884A1 (en) Method and system for device tracking
JP4304300B2 (en) User device, server, upgrade service system, method and program thereof
CN103416040A (en) Terminal control method, apparatus and terminal
WO2001026288A1 (en) Method and system for simple network management protocol status tracking
CN112800397A (en) Data asset protection method, system, electronic equipment and storage medium
JP3613159B2 (en) SOFTWARE UPDATE DEVICE, SOFTWARE UPDATE SYSTEM, UPDATE METHOD THEREOF, AND RECORDING MEDIUM CONTAINING UPDATE PROGRAM
US7716137B2 (en) System and method for automatically tracking and enabling the operation of a product
EP2013771B1 (en) Method for managing domain using multi domain manager and domain system
KR20190009921A (en) Terminal and platform for authenticating genuine products and the authenticating method by using the same
JP2010092322A (en) Network system, server device, and printer driver
KR20090001317A (en) System for managing history of material and method thereof
WO2001038989A1 (en) A system for monitoring use of software
JP7100607B2 (en) Anomaly detection system and anomaly detection method

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY CA CH CN CR CU CZ DE DK DM DZ EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX NO NZ PL PT RO RU SD SE SG SI SK SL TJ TM TR TT TZ UA UG US UZ VN YU ZA ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZW AM AZ BY KG KZ MD RU TJ TM AT BE CH CY DE DK ES FI FR GB GR IE IT LU MC NL PT SE TR BF BJ CF CG CI CM GA GN GW ML MR NE SN TD TG

121 Ep: the epo has been informed by wipo that ep was designated in this application
DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
REG Reference to national code

Ref country code: DE

Ref legal event code: 8642

122 Ep: pct application non-entry in european phase