Authorizing use of a computer program
First Claim
Patent Images
1. A method of authorizing use of a computer program with an authorization system, said method comprising:
- recording an identifier of a computer program to be authorized for use on the authorization system;
registering a user with the authorization system including sending a user identification to the user from the authorization system, wherein the user is a person seeking use of a computer program;
recording an agreement that relates to the manner of authorized use of the computer program by the user on the authorization system;
receiving at the authorization system a request from the user to use the computer program;
receiving at the authorization system a computer program identifier and a user identification in a login request message;
verifying at the authorization system the identity of the user from the user identification and checking the agreement to determine whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier;
recording on the authorization system the information sent with the request message;
indicating to the computer program whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then an authorization message is sent from the authorization system to the computer program thereby allowing use of the computer program by the user, otherwise an authorization denied message is sent from the authorization system to the computer programthereby disallowing use of the computer program.
5 Assignments
0 Petitions
Accused Products
Abstract
A method of authorising use of a computer program only able to be used when an authorised message is received from an authorising system includes providing an authorisation system, making a request to use a computer program, signalling the request to the authorisation system, the authorisation system recording the use of the computer program and providing the authorisation message to the computer program upon receipt of the authorisation message the computer program may be used.
15 Citations
122 Claims
-
1. A method of authorizing use of a computer program with an authorization system, said method comprising:
-
recording an identifier of a computer program to be authorized for use on the authorization system; registering a user with the authorization system including sending a user identification to the user from the authorization system, wherein the user is a person seeking use of a computer program; recording an agreement that relates to the manner of authorized use of the computer program by the user on the authorization system; receiving at the authorization system a request from the user to use the computer program; receiving at the authorization system a computer program identifier and a user identification in a login request message; verifying at the authorization system the identity of the user from the user identification and checking the agreement to determine whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier; recording on the authorization system the information sent with the request message; indicating to the computer program whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then an authorization message is sent from the authorization system to the computer program thereby allowing use of the computer program by the user, otherwise an authorization denied message is sent from the authorization system to the computer program thereby disallowing use of the computer program. - View Dependent Claims (3, 4, 5, 6, 7, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 44, 45, 46, 47, 48, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79)
indicating to the computer program installed on the second computer whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then an authorization message is sent from the authorization system to the computer program thereby allowing use of the computer program by the user, otherwise an authorization denied message is sent from the authorization system to the computer program thereby disallowing use of the computer program.
-
-
78. A method according to claim 1, wherein the computer program comprises a game.
-
79. A method according to claim 10, wherein the charge for use of the computer program is a single charge for an unlimited use of the computer program.
-
2. A method of authorizing use of a computer program using an authorization system and an interface configured to pass messages between the computer program and the authorization system, said method comprising:
-
recording at the authorization system an identifier of the computer program to be authorized for use; registering a user on the authorization system including sending a user identification from the authorization system to the user, wherein the user is a person seeking use of a computer program; recording on the authorization system an agreement that relates to the manner of authorized use of the computer program by the user; receiving at the authorization system a request from the user to use the computer program, the request activating the interface; receiving at the authorization system the user identification from the interface in a login request message, the interface having received the user identification from the user; verifying the identity of the user from the user identification, and if the identity of the user is verified, then sending a login successful message from the authorization system to the interface; receiving the computer program identifier at the authorization system from the interface in a computer program user request message if a login successful message is received at the computer program by the interface; recording at the authorization system the information sent in the user request message; checking the agreement on the authorization system to determine whether the user is authorized to use the computer program identified by the computer program identifier; sending an authorization message from the authorization system to the interface if the user is authorized to use the computer program, otherwise sending an authorization denied message from the authorization system to the interface; and allowing use of the computer program by the user upon receipt by the interface of the authorization message. - View Dependent Claims (8, 43)
-
-
30. A distributed system for authorizing use of a computer program, said system comprising:
-
an authorization system, the authorization system including a storage device for recording an identifier of a computer program to be authorized for use, a user identification and an agreement that relates to the authorized use of the computer program by a user, wherein the user is a person seeking use of a computer program; and a computer for running the computer program;
the computer being configured to send the identifier of the computer program and the user identification to the authorization system in a login request message when the user makes a request to use the computer program;the authorization system being configured to verify the identity of the user from the recorded user identification and to check the agreement to determine whether the user is authorized to use the computer program identified by the computer program identifier; the authorization system being configured to record the information sent with the login request message; the authorization system being configured to send an authorization message to the computer if the user is verified and authorized to use the computer program and otherwise to send an authorization denied message to the computer; and the computer being configured to continue use of the computer program upon receipt of the authorization message but otherwise to terminate the use of the computer program. - View Dependent Claims (31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42)
-
-
49. An authorization system for authorizing use of a computer program, the authorization system comprising:
-
a storage of agreements, each agreement comprising data representing a manner of authorized use of a computer program by a user, wherein the user is a person seeking use of a computer program; a server configured to lookupage and retrieve agreements, wherein each agreement retrieved is based on a received computer program identifier and a received user identifier; an interface module associated with an installation of a computer program which is activated upon a user seeking to use at least part of the installation of the computer program, the interface module being configured to login a user for identifying the user, and send a user identifier and an identifier of the associated computer program to the server, the interface module being further configured to allow use of the installation of the computer program by the user according to the details in a received authorization message; and an authorization module configured to access the retrieved agreement to determine whether the identified user is permitted to use the at least part of the computer program and in the event that the user is permitted the authorization module is configured to send an authorization message to the interface module, the authorization message comprising details of the manner of use authorized according to the retrieved agreement.
-
-
50. A method of authorizing use of a computer program, the method comprising:
-
storing a plurality of agreements, each agreement comprising data representing a manner of authorized use of a computer program by a user, wherein the user is a person seeking use of a computer program; activating an interface module associated with an installation of a computer program when a user seeks to use at least a part of the installation of the computer program; identifying a user using a login; sending a user identifier and an identifier of the computer program to a server; looking-upage and retrieving by the server one of the agreements based on the received identifier of the computer program and the received user identifier; accessing the retrieved agreement to determine whether the identified user is permitted to use at least part of the computer program, and in the event that the user is permitted, sending an authorization message to the interface module, the authorization message comprising details of the manner of use authorized according to the retrieved agreement; and allowing use of the installation of the computer program by the user according to the details in the authorization message.
-
-
51. A method of authorizing use of a computer program, with an authorization system, said method comprising:
-
recording on the authorization system an identifier of each of a plurality of computer programs to be authorized for use; registering a plurality of users with the authorization system including sending a respective user identification to each user from the authorization system, wherein each user is a person seeking to use a computer program; recording on the authorization system an agreement that relates to the manner of permitted use of one or more of the computer programs for each user and a rate at which each user is charged for use of the one or more computer programs, wherein the agreement covers whether the requesting user is permitted to use one or more sub-components of the one or more computer programs; receiving at the authorization system a request for one of the users to use an instance of one of the computer programs; receiving at the authorization system a computer program identifier corresponding to the requested computer program and a respective user identification provided by the requesting user in a login request message; verifying at the authorization system the identity of the requesting user from the received user identification and checking the respective agreement to determine whether the requesting user is permitted to use the requested computer program identified by the received computer program identifier; recording on the authorization system information sent with the request; indicating to the instance of the requested computer program whether the requesting user is permitted to use the requested computer program by sending either an authorization message or an authorization denied message, where if the requesting user is verified and permitted to use the requested computer program, an authorization message is sent from the authorization system to the instance of the requested computer program, otherwise an authorization denied message is sent from the authorization system to the instance of the requested computer program, wherein the authorization message is configured to allow use of one or more of the permitted sub-components of the instance of the requested computer program according to the agreement for the use of the requested computer program by the requesting user; receiving one or more requests to incur a charge for use of the requested computer program after use of the instance of the requested computer program is allowed; recording a charge on the authorization system for use of the requested computer program upon receipt of the or each request to incur a charge, wherein the charge is recorded according to the rate in the agreement for use of the requested computer program by the requesting user; receiving a message periodically sent to the authorization system by the authorized instance of the requested computer program; and sending a reply from the authorization system to the authorized instance of the requested computer program, wherein the reply is configured such that if the reply is not received, authorization of use of the instance of the requested computer program ends, wherein each periodic message sent between the instance of the requested computer program and the authorization system includes a unique component that is only valid for a single use.
-
-
80. A method of seeking authorization of a computer program to be run on a user'"'"'s computer by an authorization system, said method comprising
recording an identifier of a computer program to be authorized for use on the user'"'"'s computer; -
receiving user identification from the authorization system, wherein the user is a person seeking use of the computer program; sending to the authorization system an indication of an agreement by the user to an agreement that relates to the manner of authorized use of the computer program by the user; sending a request from to use the computer program from the user'"'"'s computer to the authorization system; sending the recorded computer program identifier and a user identification in a login request message from the user'"'"'s computer to the authorization system so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check the agreement agreed to determine whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier; and receiving at the user'"'"'s computer an indication sent from the authorization system to the computer program whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then the computer program is allowed to proceed, but otherwise use of the computer program is denied. - View Dependent Claims (81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103)
-
-
104. A method of authorizing use of a computer program, said method comprising:
-
recording an identifier of a computer program to be authorized for use on the authorization system; recording the identifier of a computer program to be authorized for use on the user'"'"'s computer; registering a user with the authorization system including sending a user identification to the user from the authorization system, wherein the user is a person seeking use of a computer program; receiving user identification from the authorization system; recording an agreement that relates to the manner of authorized use of the computer program by the user on the authorization system; sending to the authorization system an indication of an agreement by the user to the agreement that relates to the manner of authorized use of the computer program by the user; sending a request from to use the computer program from the user'"'"'s computer to the authorization system; receiving at the authorization system the request from the user to use the computer program; sending the recorded computer program identifier and a user identification in a login request message from the user'"'"'s computer to the authorization system receiving at the authorization system a computer program identifier and the user identification in the login request message; verifying at the authorization system the identity of the user from the user identification and checking the agreement to determine whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier;
recording on the authorization system the information sent with the request message;indicating to the computer program whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then an authorization message is sent from the authorization system to the computer program, otherwise an authorization denied message is sent from the authorization system to the computer program; and receiving at the user'"'"'s computer a message sent from the authorization system to the computer program whether the user is authorized to use the computer program, where if an authorization message is received then the computer program is allowed to proceed, but otherwise use of the computer program is denied.
-
-
105. An authorization system for authorizing a user to use a computer program on a computer, said system comprising:
-
a memory for recording an identifier of a computer program to be authorized for use on the authorization system and for recording an agreement that relates to the manner of authorized use of the computer program by the user on the authorization system; a registration module for registering a user with the authorization system including sending a user identification to the user from the authorization system, wherein the user is a person seeking use of a computer program, where in the user identification is recorded in the memory; a receiver for receiving a request from the user to use the computer program and for receiving a computer program identifier and a user identification in a login request message; a processor configured to verify the identity of the user from the user identification and checking the agreement to determine whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier; and a transmitter for indicating to the computer program whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then an authorization message is sent from the authorization system to the computer program thereby allowing use of the computer program by the user, otherwise an authorization denied message is sent from the authorization system to the computer program thereby disallowing use of the computer program. - View Dependent Claims (106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119)
-
-
120. A computer configured in a manner that seeks authorization from an authorization system for use of a computer program to be run on the computer, said computer comprising;
-
a memory for recording an identifier of a computer program to be authorized for use on the user'"'"'s computer; a receiver for receiving user identification from the authorization system, wherein the user is a person seeking use of the computer program; and a transmitter for; sending to the authorization system an indication of an agreement by the user to an agreement that relates to the manner of authorized use of the computer program by the user; sending a request from to use the computer program from the user'"'"'s computer to the authorization system; and sending the recorded computer program identifier and a user identification in a login request message from the user'"'"'s computer to the authorization system so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check the agreement agreed to determine whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier; the receiver also for receiving at the user'"'"'s computer an indication sent from the authorization system to the computer program whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then the computer program is allowed to proceed, but otherwise use of the computer program is denied.
-
-
121. A computer program product comprising instructions stored on a non-transitory computer readable storage tangible medium that when executed control a computer to operate as an authorization system which is configured to
record an identifier of a computer program to be authorized for use on the authorization system; -
register a user with the authorization system including sending a user identification to the user from the authorization system, wherein the user is a person seeking use of a computer program; record an agreement that relates to the manner of authorized use of the computer program by the user on the authorization system; receive at the authorization system a request from the user to use the computer program; receive at the authorization system a computer program identifier and a user identification in a login request message; verify at the authorization system the identity of the user from the user identification and checking the agreement to determine whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier; and record on the authorization system the information sent with the request message;
indicate to the computer program whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then an authorization message is sent from the authorization system to the computer program thereby allowing use of the computer program by the user, otherwise an authorization denied message is sent from the authorization system to the computer program thereby disallowing use of the computer program.
-
-
122. A computer program product comprising instructions stored on a non-transitory computer readable storage tangible medium that when executed control a computer to operate the computer to seek authorization from an authorization system for use of a computer program to be run on the computer, the computer being configured to
record an identifier of a computer program to be authorized for use on the user'"'"'s computer; -
receive user identification from the authorization system, wherein the user is a person seeking use of the computer program; send to the authorization system an indication of an agreement by the user to an agreement that relates to the manner of authorized use of the computer program by the user; send a request from to use the computer program from the user'"'"'s computer to the authorization system; and send the recorded computer program identifier and a user identification in a login request message from the user'"'"'s computer to the authorization system so that the authorization system is able to verify the identity of the user from the send user identification and so that the authorization system is able to check the agreement agreed to determine whether the user identified by the received user identification is authorized to use the computer program identified by the computer program identifier; and receive at the user'"'"'s computer an indication sent from the authorization system to the computer program whether the user is authorized to use the computer program, where if the user is verified and authorized to use the computer program, then the computer program is allowed to proceed, but otherwise use of the computer program is denied.
-
Specification