Authorising use of a computer program
First Claim
Patent Images
1. A method of authorising use of a computer program, said method including the steps of:
- providing an authorisation system;
the authorisation system recording an identifier of a computer program to be authorised for use;
registering a user with the authorisation system, the user receiving a user identification from the authorisation system;
the authorisation system recording an arrangement that relates to the authorised use of the computer program by the use;
the user requesting use of the computer program;
sending the computer program identifier and user identification to the authorisation system in a log request message;
the authorisation system verifying the identity of the user from the user identification and checking the arrangement to determine whether the user is authorised to use the computer program identified by the computer program identifier;
the authorisation system recording the information sent with the request message;
the authorisation system indicating to the computer program whether the user is authorised to use the computer program, where if the user is verified and authorised to use the computer program, then a login authorisation message is sent to the computer program, otherwise an authorisation denied message is sent to the computer program;
allowing use of the computer program upon receipt of the authorisation message.
7 Assignments
0 Petitions
Accused Products
Abstract
A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system. The method includes providing an authorisation system, making a request to use a computer program, signalling the request to the authorisation system, the authorisation system recording the use of the computer program and providing the authorisation message to the computer program upon receipt of the authorisation message the computer program may be used.
-
Citations
42 Claims
-
1. A method of authorising use of a computer program, said method including the steps of:
-
providing an authorisation system;
the authorisation system recording an identifier of a computer program to be authorised for use;
registering a user with the authorisation system, the user receiving a user identification from the authorisation system;
the authorisation system recording an arrangement that relates to the authorised use of the computer program by the use;
the user requesting use of the computer program;
sending the computer program identifier and user identification to the authorisation system in a log request message;
the authorisation system verifying the identity of the user from the user identification and checking the arrangement to determine whether the user is authorised to use the computer program identified by the computer program identifier;
the authorisation system recording the information sent with the request message;
the authorisation system indicating to the computer program whether the user is authorised to use the computer program, where if the user is verified and authorised to use the computer program, then a login authorisation message is sent to the computer program, otherwise an authorisation denied message is sent to the computer program;
allowing use of the computer program upon receipt of the authorisation message. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29)
-
-
2. A method of authorised use of a computer program, said method including the steps of:
-
providing an authorisation system;
providing an interface for passing messages between the computer program and the authorisation system;
the authorisation system recording an identifier of the computer program to be authorised for use;
registering a user with authorisation system, the user receiving a user identification from the authorisation system;
the authorisation system recording an arrangement that relates to the authorised user of the computer program by the user;
the user making a request to user the computer program;
sending the user identification to the authorisation system in a login request message;
the authorisation system verifying the identity of the user from the user identification; and
if the identity of the is verified, then sending a login successful message to the interface;
if a login successful message is received by the interface, then sending the computer program identifier to the authorisation system in a computer program use request message;
recording the information sent in the user request message;
the authorisation system checking the arrangement to determine whether the user is authorised to use the computer program identified by the computer program identifier;
if the user is authorised to use the computer program, then an authorisation message is sent to the computer program, otherwise an authorisation denied message is sent to the computer program;
allowing use of the computer program upon receipt of the authorisation message the computer program may be used by the user.
-
-
30. A distributed system for authorising use of a computer program, said system comprising at least:
-
an authorisation system, with a storage means for recording an identifier of a computer program to be authorised for use, a user identification and an agreement that relates to the authorised use of the computer program by a user;
a computer for running the computer program;
the computer being configured to send the identifier of the computer program and user identification to the authorisation system in a login request message when the user makes a request to use the computer program;
the authorisation system being configured to verify the identity of the user from the recorded user login identification and check the arrangement to determine whether the user is authorised to use the computer program identified by the recorded computer program identifier;
the authorisation system configured to record the information sent with the request message;
the authorisation system being configured to send an authorisation message to the computer if the user is verified and authorised to use the computer program and otherwise send an authorisation denied message is sent to the computer;
whereby the computer is configured to continue use of the computer program upon receipt of the authorisation message but otherwise terminate the use of the computer program. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
Specification