Management and check method for intangible assets counterfeit
A technology of intangible assets and products, applied in data processing applications, electronic digital data processing, commerce, etc., and can solve problems such as inability to use operating systems
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] see figure 2 , image 3 As shown, it is a flowchart of the counterfeit management and auditing method for intangible assets of the present invention. As can be seen from the flowchart, the intangible asset counterfeiting management and auditing method of the present invention includes: first, step S200, through the Product Licensed unit (Product Licensed unit), to provide the hardware code (Hardware Number) corresponding to the first hardware device The first license code code and the first royalty code code group (First Ln+Rn), and the second license code code and the second royalty code code group (Second Ln+Rn) that provide multiple corresponding different application software (Applicationsoftware) +Rn) (S200), wherein the product authorization unit includes a first license code (First License Code) and a first license code corresponding to the first license code code and the first premium code code group (First Ln+Rn) A royalty code (First Royalty Code) group (Fi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 