AUTHORISING USE OF A COMPUTER PROGRAM
5 Assignments
0 Petitions
Accused Products
Abstract
A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system includes providing an authorisation system, making a request to use a computer program, signalling the request to the authorisation system, the authorisation system recording the use of the computer program and providing the authorisation message to the computer program upon receipt of the authorisation message the computer program may be used.
19 Citations
40 Claims
-
1. (canceled)
-
2. A method of authorizing use of a computer program with an authorization system, said method comprising:
-
recording an identifier of a computer program to be authorized for use on the authorization system; recording a user identification with the authorization system, wherein the user identification identifies the user to the authorization system, wherein the user is a person seeking use of a computer program; recording an agreement that relates to the manner of authorized use of the computer program by the user on the authorization system; receiving at the authorization system a request from the user to use the computer program; receiving at the authorization system a computer program identifier and a user identification in a login request message; verifying at the authorization system the identity of the user from the user identification and checking whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement; sending to the user'"'"'s computer an indication as to whether the user is authorized to use the computer program, so that where the user is verified and authorized to use the computer program, then use of the computer program is allowed, otherwise use of the computer program is denied. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method of seeking authorization from an authorization system for use of a computer program that is to be run on a user'"'"'s computer, said method comprising
recording an identifier of a computer program to be authorized for use on the user'"'"'s computer; -
receiving a user identification for recording by the authorization system, wherein the user is a person seeking use of the computer program; sending to the authorization system an indication of an acceptance by the user to an agreement that relates to the manner of authorized use of the computer program by the user; receiving a request from the user to use the computer program; sending the recorded computer program identifier and a user identification in a login request message from the user'"'"'s computer to the authorization system so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement; receiving at the user'"'"'s computer an indication sent from the authorization system as to whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then use of the computer program is allowed to proceed, but otherwise use of the computer program is denied. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. An authorization system for authorization of use of a computer program, said authorization system comprising:
-
a storage configured to record an identifier of a computer program to be authorized for use by the authorization system; a storage configured to record a user identification, wherein the user identification identifies the user to the authorization system, wherein the user is a person seeking use of a computer program; a storage configured to record an agreement that relates to the manner of authorized use of the computer program by the user; a receiver configured to receive a request from the user to use the computer program and, a computer program identifier and a user identification in a login request message; a processor configured to verify the identity of the user from the user identification and further configured to check whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement; a transmitter configured to send to a user'"'"'s computer an indication as to whether the user is authorized to use the computer program, so that where the user is verified and authorized to use the computer program, then use of the computer program is allowed, otherwise use of the computer program is denied. - View Dependent Claims (33)
-
-
34. A computer configured to allow use of a computer program upon authorization by an authorization system, said computer comprising:
-
a storage configured to record an identifier of a computer program to be authorized for use on the user'"'"'s computer; a receiver configured to receiving a user identification for recording by the authorization system, wherein the user is a person seeking use of the computer program; a transmitter configured to send to the authorization system an indication of an acceptance by the user to an agreement that relates to the manner of authorized use of the computer program by the user; an input configured to receive a request from the user to use the computer program; a transmitter configured to send the recorded computer program identifier and a user identification in a login request message from the user'"'"'s computer to the authorization system so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement; a receiver configured to receive an indication sent from the authorization system as to whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then use of the computer program is allowed to proceed, but otherwise use of the computer program is denied. - View Dependent Claims (35)
-
-
36. Non transient computer readable media comprising instructions for controlling a computer to allow use of a computer program authorized by an authorization system, said instructions configuring the computer to:
-
record an identifier of a computer program to be authorized for use on the authorization system; record a user identification with the authorization system, wherein the user identification identifies the user to the authorization system, wherein the user is a person seeking use of a computer program; record an agreement that relates to the manner of authorized use of the computer program by the user on the authorization system; receiving at the authorization system a request from the user to use the computer program; receive at the authorization system a computer program identifier and a user identification in a login request message; verify at the authorization system the identity of the user from the user identification and checking whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement; send to the user'"'"'s computer an indication as to whether the user is authorized to use the computer program, so that where the user is verified and authorized to use the computer program, then use of the computer program is allowed, otherwise use of the computer program is denied.
-
-
37. Non transient computer readable media comprising instructions for controlling a computer to operate as an authorization system for authorizing use of a computer program, said instructions configuring the computer to:
-
record an identifier of a computer program to be authorized for use on the user'"'"'s computer; receive a user identification for recording by the authorization system, wherein the user is a person seeking use of the computer program; send to the authorization system an indication of an acceptance by the user to an agreement that relates to the manner of authorized use of the computer program by the user; receive a request from the user to use the computer program; send the recorded computer program identifier and a user identification in a login request message from the user'"'"'s computer to the authorization system so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement; receive at the user'"'"'s computer an indication sent from the authorization system as to whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then use of the computer program is allowed to proceed, but otherwise use of the computer program is denied.
-
-
38. A method of payment for use of a computer program comprising:
-
recording an identifier of a computer program to be authorized for use on the user'"'"'s computer; receiving a user identification for recording by the authorization system, wherein the user is a person seeking use of the computer program; sending to the authorization system an indication of an agreement by the user to an agreement that relates to the manner of authorized use of the computer program by the user, including the manner of payment for use of the computer program; receiving a request from the user to use the computer program; sending a payment authorization to the authorization system for payment for use of the computer program; sending the recorded computer program identifier and a user identification to the authorization system in a login request message so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement and that the user has authorized payment for the use of the computer program; receiving an indication sent from the authorization system as to whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then use of the computer program is allowed to proceed, but otherwise use of the computer program is denied.
-
-
39. A method of payment for use of a computer program comprising:
-
recording an identifier of a computer program to be authorized for use on the user'"'"'s computer; receiving a user identification for recording by the authorization system, wherein the user is a person seeking use of the computer program; sending to the authorization system an indication of an acceptance by the user to an agreement that relates to the manner of authorized use of the computer program by the user; receiving a payment authorization to the authorization system for payment for use of the computer program; receiving a request from the user to use the computer program; sending the recorded computer program identifier and a user identification in a login request message from the user'"'"'s computer to the authorization system so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement; receiving at the user'"'"'s computer an indication sent from the authorization system as to whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then use of the computer program is allowed to proceed, but otherwise use of the computer program is denied.
-
-
40. A method of enabling payment for use of a computer program comprising providing to a user computer a computer program that comprises instructions for controlling to user computer to:
-
record an identifier of a computer program to be authorized for use on the user'"'"'s computer; receive a user identification for recording by the authorization system, wherein the user is a person seeking use of the computer program; send to the authorization system an indication of an agreement by the user to an agreement that relates to the manner of authorized use of the computer program by the user, including the manner of payment for use of the computer program; receive a request from the user to use the computer program; send a payment authorization to the authorization system for payment for use of the computer program; send the recorded computer program identifier and a user identification to the authorization system in a login request message so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier according to the agreement and that the user has authorized payment for the use of the computer program; receive an indication sent from the authorization system as to whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then use of the computer program is allowed to proceed, but otherwise use of the computer program is denied.
-
Specification