Claims
- 1. A method for ensuring authenticity of billing information for on-demand resources on a computerized apparatus, comprising:
receiving billing information generated by a computerized apparatus on which an on-demand resource was requested for a specified time period for a fee and wherein the billing information comprises details of a request for the on-demand resource specifying a quantity of the on-demand resource and a time period of use of the quantity of the on-demand resource.
- 2. The computer-implemented method of claim 1 wherein billing information comprises a maximum allowable usage value against which additional requests for use of the on-demand resource may be made so long as a product of a requested quantity of the on-demand resource and a requested time period for use of the quantity is less than or equal to the maximum allowable usage value.
- 3. The computer-implemented method of claim 1 wherein the requested on-demand resource indicated in the billing information comprise processors.
- 4. The computer-implemented method of claim 1 further comprising generating an invoice based on the billing information and submitting the invoice to a customer which requested use of the on-demand resource.
- 5. The computer-implemented method of claim 1 wherein the on-demand resource is processors and the billing information comprises a number of processors currently requested on the computerized apparatus, a system runtime of the computerized apparatus value and a unique identification of the computerized apparatus.
- 6. The computer-implemented method of claim 1 further comprising authenticating the billing information.
- 7. The computer-implemented method of claim 6 wherein the billing information comprises an encrypted signature and wherein authenticating comprises decrypting the signature.
- 8. The computer-implemented method of claim 7 wherein the signature was generated based on selected fields of the billing information.
- 9. A computer-implemented method for providing resource-enabling values for on-demand resources, comprising:
generating a machine-unique resource-time value having a resource-identifying component and a usage limit component, wherein the resource-identifying component specifies a given type of an on-demand resource of a particular computerized apparatus and the usage limit component defines a maximum allowable usage value of the resource on the basis of time and quantity; and receiving billing information generated by the computerized apparatus on which a least a portion of the on-demand resource was requested for a specified time period for a fee; and authenticating the billing information.
- 10. The computer-implemented method of claim 9 further comprising generating an invoice based on the billing information and submitting the invoice to a customer which used the on-demand resources.
- 11. The computer-implemented method of claim 9 wherein the billing information comprises usage information for usage of the resource including a quantity of processors used and a time period for which the quantity of processors were used.
- 12. The computer-implemented method of claim 9 wherein the billing information comprises an encrypted signature and wherein authenticating comprises decrypting the signature.
- 13. The computer-implemented method of claim 12 wherein the signature was generated based on selected fields of the billing information.
- 14. The computer-implemented method of claim 9 wherein the usage limit component is the product of a quantity value and a time value, the quantity value specifying a quantity of the resource and the time value specifying a duration of time for which the quantity of the resource may be used.
- 15. The computer-implemented method of claim 9 wherein the given type of the resource identified by the resource-identifying component comprises computer hardware.
- 16. The computer-implemented method of claim 15 wherein the given type of the resource identified by the resource-identifying component comprises a processor.
- 17. The computer-implemented method of claim 15 wherein the given type of the resource identified by the resource-identifying component comprises a processor and the time period is a number of days.
- 18. The computer-implemented method of claim 15 wherein the given type of the resource identified by the resource-identifying component comprises at least one of memory and storage.
- 19. A computer-implemented method for enabling resources on a computerized apparatus, comprising:
receiving a resource-time value comprising a resource-identifying component and a usage limit component, wherein the resource-identifying component specifies a given type of a resource and the usage limit component defines a maximum allowable usage value of the resource on the basis of time and quantity; enabling the resource of the given type specified by the resource-identifying component; wherein enabling comprises making the resource available for request; receiving a request for a quantity of the resource of the given type and a time period for using the quantity, wherein the quantity and the time period are delimited by the maximum allowable usage value; generating billing information for use of the requested quantity of the resource; and generating an encrypted signature based on a plurality of fields of the billing information.
- 20. The computer-implemented method of claim 19 further comprising sending the billing information and the encrypted signature to a provider of the resource-time value.
- 21. The computer-implemented method of claim 19 further comprising receiving an invoice for use of the portion of the quantity of the enabled resource.
- 22. The computer-implemented method of claim 19 wherein a mathematical product of the quantity and the time period must be less than or equal to the maximum allowable usage value.
- 23. The computer-implemented method of claim 19 further comprising validating the resource-time value.
- 24. The computer-implemented method of claim 19 wherein the resource-time value is a machine-specific code unique to the computerized apparatus.
- 25. The computer-implemented method of claim 19 wherein enabling comprises inputting the resource-time value into the computerized apparatus.
- 26. The computer-implemented method of claim 19 wherein enabling comprises inputting the resource-time value into the computerized apparatus via a user interface.
- 27. The computer-implemented method of claim 19 wherein the resource comprises software.
- 28. The computer-implemented method of claim 19 wherein the resource of the given type specified by the resource-identifying component comprises computer hardware.
- 29. The computer-implemented method of claim 28 wherein the resource of the given type specified by the resource-identifying component is a processor.
- 30. The computer-implemented method of claim 28 wherein the resource of the given type specified by the resource-identifying component is a processor and the time period is a number of days.
- 31. The computer-implemented method of claim 28 wherein the resource of the given type identified by the resource-identifying component is a processor and wherein the enabled quantity of the resource comprises a plurality of processors partitioned within at least two logical partitions.
- 32. The computer-implemented method of claim 28 wherein the resource of the given type specified by the resource-identifying component comprises at least one of memory and storage.
- 33. The computer-implemented method of claim 19 further comprising:
determining the expiration of the time period; and disabling the quantity of the resource upon determining the expiration of the time period.
- 34. A computer-implemented method for enabling resources on a computerized apparatus, comprising:
receiving a resource-time value comprising a resource-identifying component and a usage limit component, wherein the resource-identifying component specifies a given type of a resource and the usage limit component defines a maximum allowable usage value of the resource on the basis of time and quantity; enabling the resource specified by the resource-identifying component; placing a specified quantity of the enabled resource into service for a specified time period, wherein the product of the quantity and the time period must be less than or equal to the maximum allowable usage value; disabling the specified quantity of the enabled resource upon expiration of the time period; generating billing information for use of the specified quantity of the enabled resource; and generating an encrypted signature based on a plurality of fields of the billing information.
- 35. The computer-implemented method of claim 34 further comprising providing the billing information to a provider of the resource-time value.
- 36. The computer-implemented method of claim 35 further comprising receiving an invoice for use of the specified quantity of the enabled resource.
- 37. The computer-implemented method of claim 34 wherein the resource-time value specifies a quantity of the resource to be enabled.
- 38. The computer-implemented method of claim 34 wherein enabling comprises unlocking the resource and making it available for use upon request.
- 39. The computer-implemented method of claim 34 wherein placing the specified quantity of the enabled resource into service for the specified time period is done in response to a user request specifying the specified quantity and the specified time period.
- 40. The computer-implemented method of claim 34 wherein the given type of the resource is a processor.
- 41. The computer-implemented method of claim 34 wherein the given type of the resource is computer hardware.
- 42. The computer-implemented method of claim 34 wherein the given type of the resource is selected from one of processors, memory and storage.
- 43. A computer readable medium containing a program which, when executed, performs an operation for providing resource-enabling values, comprising:
generating a machine-unique resource-time value having a resource-identifying component and a usage limit component, wherein the resource-identifying component specifies a given type of an on-demand resource of a particular computerized apparatus and the usage limit component defines a maximum allowable usage value of the resource on the basis of time and quantity; and receiving billing information generated by the computerized apparatus on which a quantity of the on-demand resource was requested for a specified time period for a fee; and authenticating the billing information.
- 44. The computer readable medium of claim 43 further comprising generating an invoice based on the billing information and submitting the invoice to a customer which used the on-demand resource.
- 45. The computer readable medium of claim 43 wherein the billing information comprises usage information for usage of the resource including a quantity of processors used and a time period for which the quantity of processors were used.
- 46. The computer readable medium of claim 43 wherein the billing information comprises an encrypted signature and wherein authenticating comprises decrypting the signature.
- 47. The computer readable medium of claim 46 wherein the signature was generated based on selected fields of the billing information.
- 48. The computer readable medium of claim 46 wherein the maximum allowable usage value allows requests to be made for use of the on-demand resource so long as a product of a quantity of the resource requested and a time period for use of the quantity is less than or equal to the maximum allowable usage value.
- 49. The computer readable medium of claim 43 wherein the given type of the resource identified by the resource-identifying component comprises computer hardware.
- 50. The computer readable medium of claim 43 wherein the given type of the resource identified by the resource-identifying component comprises a processor.
- 51. The computer readable medium of claim 43 wherein the given type of the resource identified by the resource-identifying component comprises a processor and the time period is a number of days.
- 52. The computer readable medium of claim 43 wherein the given type of the resource identified by the resource-identifying component comprises at least one of memory and storage.
- 53. The computer readable medium of claim 43, wherein the given type of the resource specified by the resource-identifying component comprises at least one of memory and storage.
- 54. A computer, comprising:
at least one processor and memory; and a billing information authenticator executable by the processor and configured to at least:
receive billing information generated by a computerized apparatus on which an on-demand resource was requested for a specified time period for a fee and wherein the billing information comprises details of a request for the on-demand resource specifying a quantity of the on-demand resource and a time period of use of the quantity of the on-demand resource; and authenticate the billing information.
- 55. The computer of claim 54, wherein billing information comprises a maximum allowable usage value against which additional requests for use of the on-demand resource may be made so long as a product of a requested quantity of the on-demand resource and a requested time period for use of the quantity is less than or equal to the maximum allowable usage value.
- 56. The computer of claim 54, wherein the requested on-demand resource indicated in the billing information comprise processors.
- 57. The computer of claim 54, further comprising generating an invoice based on the billing information and submitting the invoice to a customer which requested use of the on-demand resource.
- 58. The computer of claim 54, wherein the on-demand resource is processors and the billing information comprises a number of processors currently requested on the computerized apparatus, a system runtime of the computerized apparatus value and a unique identification of the computerized apparatus.
- 59. The computer of claim 54, wherein the billing information comprises an encrypted signature and wherein authenticating comprises decrypting the signature.
- 60. The computer of claim 59, wherein the signature was generated based on selected fields of the billing information.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is related to co-pending and commonly owned U.S. patent application Ser. No. ______ (Attorney Docket No. IBMK30071), entitled “METHOD TO PROVIDE ON-DEMAND RESOURCE ACCESS”, filed herewith and incorporated by reference in its entirety.