Unlock instant, AI-driven research and patent intelligence for your innovation.

Management and check method for intangible assets counterfeit

A technology of intangible assets and products, applied in data processing applications, electronic digital data processing, commerce, etc., and can solve problems such as inability to use operating systems

Inactive Publication Date: 2012-07-18
王榕梆
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Furthermore, in step S116, if the PK+HID and PK+another HID exist once respectively, it means that the operating system has been installed twice under the other two HIDs respectively before, so it is determined that the operating system is counterfeit, and The operating system cannot be used or only a trial version of the operating system can be used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management and check method for intangible assets counterfeit
  • Management and check method for intangible assets counterfeit
  • Management and check method for intangible assets counterfeit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] see figure 2 , image 3 As shown, it is a flowchart of the counterfeit management and auditing method for intangible assets of the present invention. As can be seen from the flowchart, the intangible asset counterfeiting management and auditing method of the present invention includes: first, step S200, through the Product Licensed unit (Product Licensed unit), to provide the hardware code (Hardware Number) corresponding to the first hardware device The first license code code and the first royalty code code group (First Ln+Rn), and the second license code code and the second royalty code code group (Second Ln+Rn) that provide multiple corresponding different application software (Applicationsoftware) +Rn) (S200), wherein the product authorization unit includes a first license code (First License Code) and a first license code corresponding to the first license code code and the first premium code code group (First Ln+Rn) A royalty code (First Royalty Code) group (Fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to one intangible asset management and audit method, which comprises the following steps: through one hardware code and one special code and right code set match and through product start unit judgment, it knows whether all relative software installed meet total authorization need; when same software repeats or loads different hardware system, the product activates unit to update product authorization codes to avoid hardware update part by need of other product authroi8zation number complains.

Description

technical field [0001] The present invention relates to a kind of imitation management and auditing method of intangible assets, especially a pairing of a hardware number (Hardware Number) and a license code number and a royalty code number group (Ln+Rn), and through a product startup unit ( Product Activation unit) to manage and audit the counterfeiting of intangible assets. Background technique [0002] The conditions for legal authorization must meet at the same time (1) authorized manufacturing license, and (2) products that can be recognized as legally authorized when the payment of royalties is completed. However, under the temptation of interests, many unscrupulous manufacturers have produced many different infringing products without legal authorization. There are also those who only obtain the authorized manufacturing license from the obligee and then cover up the illegality in a legal way to evade the payment of royalties. These infringing products have caused a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q30/00G06F21/00G06F21/12
Inventor 王榕梆
Owner 王榕梆