Identifying Software
First Claim
1. A computer implemented method of establishing the identity of software installed on a computer having a processor, the software being purportedly identified by identification data associated with the installed software, the method using a catalogue of established software identification data, the method comprising:
- mapping, by the processor, the purported identification data to established identification data in the catalogue; and
using, in further processing by the processor, the identification data to which the purported data is mapped as the established identification data of the installed software.
2 Assignments
0 Petitions
Accused Products
Abstract
Software installed on a computer network is often inconsistently, or even incorrectly, identified. The same software may be identified in different ways. A catalogue of standardised identifiers is provided. The actual identifiers of software installed on the network are accessed and they are mapped to the standardised identifiers of the catalogue. The standardised identifiers are used to manage the installed software, monitor license compliance and/or, monitor maintenance agreements amongst other uses. Data relating to the use of the software may also be obtained and associated with the identification data. The usage data together with the standardised identifiers allows managers to more reliably manage software on the network. For example un-used software may be un-installed and licenses cancelled or reallocated.
-
Citations
33 Claims
-
1. A computer implemented method of establishing the identity of software installed on a computer having a processor, the software being purportedly identified by identification data associated with the installed software, the method using a catalogue of established software identification data, the method comprising:
-
mapping, by the processor, the purported identification data to established identification data in the catalogue; and using, in further processing by the processor, the identification data to which the purported data is mapped as the established identification data of the installed software. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A non-transitory computer readable medium storing a computer program, the program comprising instructions which, when run on a computer, cause the computer to establish the identity of software installed on another computer, the software being purportedly identified by identification data associated with the installed software, by
accessing a catalogue of established software identification data; -
mapping the purported identification data to the established identification data in the catalogue; and using the identification data to which the purported data is mapped as the established identification data of the installed software.
-
-
27. A computer system, comprising:
-
a plurality of user computers coupled to a network; and one or more administrative computers, coupled to the network, on which a systems management tool and an identification data processing engine are installed, wherein the systems management tool stores software identification data and computer identifiers identifying the software installed on the user computers, and also stores usage data relating to the usage of the installed software, and wherein the identification data processing engine has a catalogue of standardised software identification data and is configured to map identification data derived from the systems management tool to the standardised identification data of the catalogue to produce standardised identifiers of the installed software. - View Dependent Claims (28, 29, 30, 31, 32, 33)
-
Specification