Method and system for monitoring the use of rented software
First Claim
1. A method for monitoring the use of a computer program, comprising the steps of:
- launching a check-in/check-out (CICO) module, said CICO module for providing licensing information for said computer program to a Software Monitor module;
after launching said CICO module, launching said computer program;
launching said Software Monitor module, said Software Monitor module for monitoring use of said computer program;
causing said CICO module to provide said licensing information for said computer program to said Software Monitor module;
in response to said licensing information provided by said CICO module, causing said Software Monitor module to authorize use of said computer program; and
causing said Software Monitor module to delete said CICO module after said Software Monitor module receives said licensing information from said CICO module.
2 Assignments
0 Petitions
Accused Products
Abstract
A method and system for monitoring the use of a rented software program module. A rented software program module is downloaded from an Internet site operated by an authorized software rental service provider along with a Check-in/Check-out module and a Software Monitor module. The Check-in/Check-out module provides required licensing information for the rented software program module to the Software Monitor module. The Software Monitor module monitors use of the rented software program module while it is in use by the user. Particularly, the Software Monitor prevents use of the rented software program module after the expiration of the licensed usage time or licensed number of uses. The Software Monitor prevents unauthorized copying of the software program module. The desired software program module may be rented on a pay-per-use basis.
-
Citations
24 Claims
-
1. A method for monitoring the use of a computer program, comprising the steps of:
-
launching a check-in/check-out (CICO) module, said CICO module for providing licensing information for said computer program to a Software Monitor module; after launching said CICO module, launching said computer program; launching said Software Monitor module, said Software Monitor module for monitoring use of said computer program; causing said CICO module to provide said licensing information for said computer program to said Software Monitor module; in response to said licensing information provided by said CICO module, causing said Software Monitor module to authorize use of said computer program; and causing said Software Monitor module to delete said CICO module after said Software Monitor module receives said licensing information from said CICO module. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A computer-readable medium on which is stored a Software Monitor module for monitoring the use of a computer program, said Software Monitor module comprising instructions which, when executed by a computer, perform the steps of:
-
receiving identification information for said computer program from a check-in/check-out (CICO) module; verifying said CICO module has not been previously used; receiving licensing information from said CICO module for said computer program; verifying license to use said computer program; issuing an authorization message to said computer program to authorize use of said computer program; and tracking the use of said computer program. - View Dependent Claims (7, 8, 9)
-
-
10. A system for monitoring the use of a computer program, comprising:
-
a Software Monitor module; a Check-in/Check out (CICO) module operative to transfer identification information for said computer program to said Software Monitor module, and to transfer licensing information for said computer program to said Software Monitor module; said Software Monitor module being operative to receive said identification information from said CICO module, to receive said licensing information from said CICO module, to verify license to use said computer program during a licensed time of use, to issue an authorization message to said computer program, and to track the use of said computer program during said licensed time of use. - View Dependent Claims (11, 12)
-
-
13. A method for monitoring the use of a computer program rented via the Internet, comprising the steps of:
-
registering said computer program on a software registry, said software registry located on a remote server; downloading said computer program from said remote server to a local computing device via the Internet; downloading a check-in/check-out (CICO) module from said remote server to said local computing device via said Internet; downloading a Software Monitor module from said remote server to said local computing device via said Internet; causing said Software Monitor module to receive identification information for said computer program from said CICO module; causing said Software Monitor module to verify said CICO module has not been previously used; causing said Software Monitor module to receive licensing information from said CICO module for said computer program; causing said Software Monitor module to verify license to use said computer program during a licensed time of use; causing said Software Monitor module to issue an authorization message to said computer program to authorize use of said computer program; and causing said Software Monitor module to track the use of said computer program during said licensed time of use.
-
-
14. A method for monitoring the licensed use of a computer program, comprising the steps of:
-
receiving licensing information for said computer program from a check-in/check-out (CICO) module; in response to said licensing information, causing a Software Monitor module to verify said licensed use of said computer program; causing said Software Monitor module to issue an authorization message to said computer program to authorize use of said computer program; causing said Software Monitor module to delete said CICO module to prevent subsequent use of said CICO module; and causing said Software Monitor module to track the use of said computer program during said licensed use of said computer program. - View Dependent Claims (15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
Specification