Browse Prior Art Database

Entitlement History Log for Entitlement Controlled Use of Software Products

IP.com Disclosure Number: IPCOM000120470D
Original Publication Date: 1991-Apr-01
Included in the Prior Art Database: 2005-Apr-02
Document File: 1 page(s) / 47K

Publishing Venue

IBM

Related People

Beetcher, RC: AUTHOR [+3]

Abstract

Described is a method which solves the problem associated with how to provide a disincentive to those who would pirate or fabricate entitlement to protected software, by defining a method for associating an entitlement history log with the entitlement control mechanism in a software protection scheme. This method: allows for maintaining a history of the software entitlement that has been used to run protected software on a computer system. suggests that the implementation of this history log restrict, as much as possible, the customers ability to tamper with it.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 75% of the total text.

Entitlement History Log for Entitlement Controlled Use of Software
Products

      Described is a method which solves the problem associated with
how to provide a disincentive to those who would pirate or fabricate
entitlement to protected software, by defining a method for
associating an entitlement history log with the entitlement control
mechanism in a software protection scheme.  This method:
      allows for maintaining a history of the software entitlement
that has been used to run protected software on a computer system.
      suggests that the implementation of this history log restrict,
as much as possible, the customers ability to tamper with it.

      The software protection mechanism, which itself is not
described here, must incorporate:
      an ability to recognize changes in the entitlement used to run
protected software products on a computer system, and
      an ability to communicate occurrences of such changes to a
logging mechanism.

      The logging mechanism is incorporated into a computer system in
association with the software protection mechanism of the system.
It:
      accepts entries to be added to the log from the mechanism which
recognizes changes in the entitlement used to run protected software
products,
      adds such entries to the log to provide a history of the
entitlement use on the system,
   -  provides no interfaces to the user of the system for altering
the contents of the log,
    ...