Management and check method for non-physical assets counterfeit
A technology of intangible assets and products, applied in data processing applications, electronic digital data processing, commerce, etc., can solve problems such as the inability to use the operating system
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] Please refer to Fig. 2 and Fig. 3, which are flowcharts of the method for counterfeiting intangible assets management and auditing of the present invention. As can be seen from the flowchart, the intangible asset counterfeiting management and auditing method of the present invention includes: first, step S200, through the Product Licensed unit (Product Licensed unit), to provide the hardware code (Hardware Number) corresponding to the first hardware device The first license code code and the first royalty code code group (First Ln+Rn), and the second license code code and the second royalty code code group (Second Ln+Rn) that provide multiple corresponding different application software (Applicationsoftware) +Rn) (S200), wherein the product authorization unit includes a first license code (First License Code) and a first license code corresponding to the first license code code and the first premium code code group (First Ln+Rn) A royalty code (First Royalty Code) group...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 