IPC분류정보
국가/구분 |
United States(US) Patent
등록
|
국제특허분류(IPC7판) |
|
출원번호 |
UP-0440957
(2006-05-25)
|
등록번호 |
US-7765160
(2010-08-13)
|
발명자
/ 주소 |
- Niles, Ronald S.
- Lam, Wai
|
출원인 / 주소 |
|
대리인 / 주소 |
|
인용정보 |
피인용 횟수 :
12 인용 특허 :
17 |
초록
▼
A method is provided to audit license restrictions of a computer program in an enterprise computing environment. In one example, a digital fingerprint is generated of at least one file in the computer program using a substantially collision-free algorithm, and a digital fingerprint is generated for
A method is provided to audit license restrictions of a computer program in an enterprise computing environment. In one example, a digital fingerprint is generated of at least one file in the computer program using a substantially collision-free algorithm, and a digital fingerprint is generated for each file on each computer in the enterprise using the substantially collision-free algorithm. The digital fingerprints from the enterprise files are compared with the digital fingerprint of the computer program file, and the number of fingerprint matches is counted. Another method is provided for inventorying a computer program in an enterprise computing environment. In examples of both methods, a file may be divided into data blocks and a digital fingerprint may be generated for each data block.
대표청구항
▼
We claim: 1. A method for auditing license restrictions of a computer program in an enterprise computing environment, comprising: generating a digital fingerprint of at least one file in the computer program using an algorithm; generating a digital fingerprint for each file on each computer in the
We claim: 1. A method for auditing license restrictions of a computer program in an enterprise computing environment, comprising: generating a digital fingerprint of at least one file in the computer program using an algorithm; generating a digital fingerprint for each file on each computer in the enterprise using the algorithm; comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file; comparing the number of fingerprint matches to a number of licenses allowed to the enterprise for the computer program; and verifying compliance with licensing restrictions based, at least in part, on the comparison. 2. The method of claim 1, further comprising: dividing the file into data blocks; and generating a digital fingerprint of at least one data block. 3. The method of claim 1, wherein the algorithm comprises a substantially collision-free algorithm. 4. The method of claim 3, wherein the substantially collision-free algorithm comprises a hash function. 5. The method of claim 4, wherein the hash function comprises a hash function chosen from the group consisting of: a message digest 5 (“MD5”) algorithm and a secure hash algorithm (“SHA-1”). 6. The method of claim 1, comprising: generating a digital fingerprint for each file on each of a plurality of computers in the enterprise using the algorithm. 7. A method for inventorying a computer program in an enterprise computing environment, comprising: generating a digital fingerprint of at least one file in the computer program using an algorithm; generating a digital fingerprint for each file stored on each computer in the enterprise using the algorithm; comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file; counting the number of fingerprint matches; and generating an inventory of the computer program based, at least in part, on the number of fingerprint matches resulting from comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file. 8. The method of claim 7, further comprising: dividing each file into data blocks; and generating a digital fingerprint of at least one data block. 9. The method of claim 7, wherein the algorithm comprises a substantially collision-free algorithm. 10. The method of claim 9, wherein the substantially collision-free algorithm comprises a hash function. 11. The method of claim 10, wherein the hash function comprises a hash function chosen from the group consisting of: a message digest 5 (“MD5”) algorithm and a secure hash algorithm (“SHA-1”). 12. The method of claim 7, comprising: generating a digital fingerprint for each file on each of a plurality of computers in the enterprise using the algorithm. 13. A system for auditing license restrictions of a computer program in an enterprise computing environment, comprising: a plurality of computers in an enterprise, each computer having a respective first processor configured to: generate a digital fingerprint for at least some files on the computer using an algorithm; at least one second processor configured to: generate a digital fingerprint of at least one file in the computer program using the algorithm; compare the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file; and verify compliance with one or more licensing requirements based, at least in part, on the number of fingerprint matches resulting from comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file. 14. The system of claim 13, wherein at least one of the respective first processors is further configured to: divide each file into data blocks; and generate a digital fingerprint of at least one data block. 15. The system of claim 13, wherein the algorithm comprises a substantially collision-free algorithm. 16. The system of claim 15, wherein the substantially collision-free algorithm comprises a hash function. 17. The system of claim 13, wherein the at least one second processor is further configured to: determine a number of software licenses provided to the enterprise, permitting use of a computer program. 18. A system for inventorying a computer program in an enterprise computing environment, comprising: a plurality of computers in an enterprise, at least one of the computers comprising a plurality of files, each computer having a respective first processor configured to: generate a digital fingerprint for at least some files stored on the computer using an algorithm; at least one second processor configured to: generate a digital fingerprint of at least one file in a computer program using the algorithm; compare the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file; and generate an inventory of the computer program based, at least in part, on a number of fingerprint matches resulting from comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file. 19. The system of claim 18, wherein at least one of the first processors is further configured to: divide each file into data blocks; and generate a digital fingerprint of at least one data block. 20. The system of claim 18, wherein the algorithm comprises a substantially collision-free algorithm. 21. The system of claim 20, wherein the substantially collision-free algorithm comprises a hash function. 22. A method for auditing license restrictions of a computer program in an enterprise computing environment, comprising: generating a digital fingerprint of at least one file in the computer program by at least one computer processor using an algorithm; generating a digital fingerprint for at least some files on at least some computers in the enterprise by the at least one computer processor using the algorithm, wherein at least one of the computers in the enterprise comprises a plurality of files, and a plurality of digital fingerprints is generated for the plurality of files stored on the at least one computer; comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file by the at least one computer processor; and verifying compliance with one or more licensing requirements based, at least in part, on the number of fingerprint matches resulting from comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file. 23. The method of claim 22, comprising: verifying compliance with one or more licensing requirements based, at least in part, on the number of fingerprint matches resulting from comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file, by the at least one processor. 24. A method for inventorying a computer program in an enterprise computing environment, comprising: generating a digital fingerprint of at least one file in the computer program by at least one computer processor using an algorithm; generating a digital fingerprint for at least some files stored on at least some computers in the enterprise by the at least one computer processor using the algorithm; comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file by the at least one computer processor; and generating an inventory of the computer program based, at least in part, on a number of fingerprint matches resulting from comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file. 25. The method of claim 24, further comprising: generating a plurality of digital fingerprints for at least one file in a respective plurality of computer programs, by the at least one computer processor, using the algorithm; storing the plurality of digital fingerprints in a database, by the at least one computer processor; comparing at least some of the plurality of digital fingerprints to the digital fingerprints from the enterprise files, by the at least one computer processor; and generating an inventory of the at least some of the plurality of computer programs based, at least in part, on the comparisons, by the at least one computer processor. 26. A method for auditing license restrictions of a computer program in an enterprise computing environment, comprising: determining a number of software licenses permitting use a computer program that are provided to an enterprise; generating a digital fingerprint of at least one file in the computer program using an algorithm; generating a digital fingerprint for each file on each computer in the enterprise using the algorithm; comparing the digital fingerprints from the enterprise files with the digital fingerprint of the computer program file; comparing the number of fingerprint matches to a number of licenses allowed to the enterprise for the computer program; and determining compliance with license restrictions based on the comparison between the number of fingerprint matches and the number of licenses allowed to the enterprise.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.