System and method for monitoring software
First Claim
1. A method for generating a plurality of authorization codes for use in monitoring software to reduce unauthorized copying or use of the software, the method comprising:
- repeatedly requiring entry of an authorization code for continued use of the software beyond an associate authorization interval.
1 Assignment
0 Petitions
Accused Products
Abstract
Systems and methods for monitoring, testing, distribution, and use of computer software with associated methods and systems for repeatedly contacting a software user and exchanging information, such as passwords, authorization information, marketing, advertising, or promotional information include associating a list of passwords with each copy or group of copies of computer software which must be entered at predetermined intervals to provide continued use of the software. Software monitoring and network license metering may be providing by storing information relative to software operation on a local computer or server and transferring the information to a remote computer or server at predetermined intervals.
-
Citations
71 Claims
-
1. A method for generating a plurality of authorization codes for use in monitoring software to reduce unauthorized copying or use of the software, the method comprising:
repeatedly requiring entry of an authorization code for continued use of the software beyond an associate authorization interval. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
17. A method for monitoring software to reduce unauthorized use, the method comprising:
-
associating an authorization code with a copy of the software, the authorization code including a password code associated with a plurality of passwords which must be repeatedly entered at selected intervals for continued use of the software, the authorization code being distributed with the copy of the software and the plurality of passwords being maintained by an authorized software representative;
obtaining the authorization code from a user or a user computer;
parsing the authorization code to determine the associated password code;
selecting one of the plurality of passwords associated with the password code; and
providing the selected password to the user or the user computer to allow operation of the software for the selected interval. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A method for monitoring computer software installed on a plurality of computers in communication with one another or a central computer to form a computer network, the method comprising:
-
associating an activation code with the computer software for authorizing a predetermined number of copies of the software to be installed on computers associated with the computer network, the activation code having a corresponding plurality of passwords;
collecting registration information from each computer associated with the computer network during installation of the computer software;
providing a first password from the plurality of passwords to for the predetermined number of copies of the software to authorize operation of the computer software for a first interval;
requiring entry of another one of the plurality of passwords for each copy of the computer software to continue operating beyond the first interval. - View Dependent Claims (38, 39, 40, 41, 42, 43, 44)
-
-
45. A method for monitoring computer software, the method comprising:
-
storing information relative to use of the computer software; and
automatically transmitting the stored information to an authorized software representative at predetermined intervals. - View Dependent Claims (46, 47, 48, 49, 50, 51, 52, 53)
-
-
54. A method for monitoring computer software used by a plurality of computers connected to a local server to form a local area network to reduce unauthorized use of the computer software, the method comprising:
-
monitoring a number of computers using the computer software;
storing information associated with the computers using the computer software on the local server;
repeatedly transferring the stored information to a remote server. - View Dependent Claims (55, 56, 57, 58, 59, 60, 61, 62, 63, 64)
-
-
65. A method for monitoring computer software used by a plurality of computers connected to a local server to form a local area network to reduce unauthorized use of the computer software, the method comprising:
-
associating an authorization code with a plurality of copies of the software, the authorization code including a password code associated with a plurality of passwords which must be repeatedly entered at selected intervals for continued use of the software, the authorization code being distributed with the copies of the software and the plurality of passwords being maintained by an authorized software representative on a remote server;
obtaining the authorization code from the local server or a user computer;
parsing the authorization code to determine the associated password code;
selecting one of the plurality of passwords associated with the password code;
providing the selected password to the local server or the user computer to allow operation of the software for the selected interval;
monitoring a number of computers using the computer software;
storing information associated with the computers using the computer software on the local server; and
repeatedly transferring the stored information to the remote server upon expiration of each selected interval. - View Dependent Claims (66, 67, 68, 69, 70, 71)
-
Specification