System and method for monitoring and controlling software usage in a computer
First Claim
1. A method comprising:
- running an agent program on a computer;
identifying a new process executing on the computer;
comparing a configuration file to a master configuration file for the computer to determine if the configuration file is updated;
comparing the new process to a restricted list stored in the configuration file on the computer, each entry in the restricted list comprising a name of an executable and a restriction action, the restriction action being a termination of the execution of the new process; and
performing the restriction action on the new process if the new process is on the restricted list and not on an ignore list,the step of comparing the configuration file to the master configuration file further including the steps of;
calculating a checksum for the configuration file,transmitting the checksum to a server,receiving a copy of the master configuration file from the server if the transmitted checksum does not equal a checksum for the master configuration file, andreplacing the configuration file with the copy of the master configuration file.
2 Assignments
0 Petitions
Accused Products
Abstract
Methods and systems for providing real-time reporting of software usage includes an agent running on a local computer. The agent identifies new processes started on the computer and checks the new process against a restricted list. If the new process is on the restricted list, the agent automatically performs one or more restriction actions associated with the executable name of the process. The restricted list is contained in a configuration file stored on the local computer. A master configuration file for the local computer is stored on a server and replaces the configuration file when the configuration file is outdated. An authorized administrator may edit the master configuration file by adding or removing executable and DLL names from the restricted list and by adding or removing restriction actions associated with the executable and DLL names on the restricted list.
-
Citations
12 Claims
-
1. A method comprising:
-
running an agent program on a computer; identifying a new process executing on the computer; comparing a configuration file to a master configuration file for the computer to determine if the configuration file is updated; comparing the new process to a restricted list stored in the configuration file on the computer, each entry in the restricted list comprising a name of an executable and a restriction action, the restriction action being a termination of the execution of the new process; and performing the restriction action on the new process if the new process is on the restricted list and not on an ignore list, the step of comparing the configuration file to the master configuration file further including the steps of; calculating a checksum for the configuration file, transmitting the checksum to a server, receiving a copy of the master configuration file from the server if the transmitted checksum does not equal a checksum for the master configuration file, and replacing the configuration file with the copy of the master configuration file. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A system comprising:
-
a computer in communication with a server; a configuration file stored on the computer, the configuration file including a restricted list, each entry in the restricted list comprising an executable name and a restriction action; and an agent program executing on the computer, the agent configured to identify a new process executing on the computer by comparing the new process to the restricted list stored in the configuration file and perform the restriction action when the new process matches the executable name on the restricted list and is not on an ignore list, the restriction action being a termination of the execution of the new process, the agent program further configured to compare the configuration file to a master configuration file for the computer to determine if the configuration file is updated, wherein said compare the configuration file to the master configuration file further includes calculating a checksum for the configuration file, transmitting the checksum to the server, receiving a copy of the master configuration file from the server if the transmitted checksum does not equal a checksum for the master configuration file, and replacing the configuration file with the copy of the master configuration file. - View Dependent Claims (10, 11)
-
-
12. A computer program product stored on a non-transitory computer readable medium having thereon computer executable instructions that, when executed on a computer, configure the computer to perform a method comprising the steps of:
-
running an agent program; identifying a new process executing; comparing a configuration file to a master configuration file for the computer to determine if the configuration file is updated; comparing the new process to a restricted list stored in the configuration file, each entry in the restricted list comprising a name of an executable and a restriction action, the restriction action being a termination of the execution of the new process; and
performing a restriction action on the new process if the new process is on the restricted list and not on an ignore list,the step of comparing the configuration file to the master configuration file further including the steps of; calculating a checksum for the configuration file, transmitting the checksum to a server, receiving a copy of the master configuration file from the server if the transmitted checksum does not equal a checksum for the master configuration file, and replacing the configuration file with the copy of the master configuration file.
-
Specification