Browse Prior Art Database

Counting Users of an Operating System

IP.com Disclosure Number: IPCOM000115195D
Original Publication Date: 1995-Mar-01
Included in the Prior Art Database: 2005-Mar-30
Document File: 4 page(s) / 92K

Publishing Venue

IBM

Related People

Tracy, RR: AUTHOR

Abstract

Disclosed is a method for counting the users of an operating system for purposes of user-based pricing.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Counting Users of an Operating System

      Disclosed is a method for counting the users of an operating
system for purposes of user-based pricing.

      This is a description of how to count users of an operating
system for the purpose of licensing the operating system by the
number of users.

      The actual users of an operating system are people.  Because of
the wide range of ways of accessing function of an operating system,
it is difficult for the operating system to determine how many actual
users (people) there are actually concurrently using the system.
Most conventional measures either miss a lot of the people or double
count people who are using multiple sessions to the system from
different windows of a work station.  Disclosed is the means by which
a closer estimate can be made.

      This invention consists of a trigger mechanism and a set of
algorithms invoked by the trigger mechanism to determine if this
event represents another user accessing the operating system
function.

      The trigger mechanism is in the data management structure of
the system, actually in the open function.  When a file is opened,
the system determines if this file is a work station file, an
Advanced
Program-to-Program Communication (APPC) type communications file, or
a
Transmission Control Protocol (TCP) type communications file.

      In addition, there is a set of mechanisms to trigger the
release of the count of another user.  If this event is the opening
of a work station file, the following algorithm is invoked:
  1.  If the file is attached to a device, the device ID is checked.
       If this is a new device ID, then this represents a use by
another
       user.  The count of users is incremented by one.  This ID is
       added to the table of in use device IDs.  If this is a file
from
       an in use device ID, then this is not a new use and the count
of
       users is not incremented.  However, the count of open files
for
       this device is incremented by one.
  2.  If the file is an APPC communications file, or a work station
       emulation file from an APPC communications file, then the
       following algorithm is used.
        The network address of the originating address (not the
       last node) is checked.  If this...