Methods and system for software metering
First Claim
1. A method for monitoring software usage on a computer, the method comprising:
- running an agent program on the computer;
identifying a new process executing on the computer;
comparing the new process to a restricted list stored in a configuration file on the computer; and
performing a restriction action on the new process if the new process is on the restricted list.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for providing real-time reporting of software usage includes an agent running on a local computer. The agent identifies new processes started on the computer and checks the new process against a restricted list. If the new process is on the restricted list, the agent automatically performs one or more restriction actions associated with the executable name of the process. The restricted list is contained in a configuration file stored on the local computer. A master configuration file for the local computer is stored on a server and replaces the configuration file when the configuration file is outdated. An authorized administrator may edit the master configuration file by adding or removing executable and DLL names from the restricted list and by adding or removing restriction actions associated with the executable and DLL names on the restricted list.
52 Citations
20 Claims
-
1. A method for monitoring software usage on a computer, the method comprising:
-
running an agent program on the computer;
identifying a new process executing on the computer;
comparing the new process to a restricted list stored in a configuration file on the computer; and
performing a restriction action on the new process if the new process is on the restricted list. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
-
14. A system comprising:
-
a computer in communication with a server;
a configuration file stored on the computer, the configuration file including a restricted list, each entry in the restricted list comprising an executable name and a restriction action; and
an agent program executing on the computer, the agent configured to identify a new process executing on the computer and perform the restriction action when the new process matches the executable name on the restricted list. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification