Licensing duplicated systems
First Claim
1. A method for protecting actuation of a computational component, comprising:
- retrieving, from at least first and second computational components, at least first and second unique identifiers respectively associated with the at least first and second computational components;
accessing a license file to obtain at least third and fourth identifiers;
comparing each of the at least first and second unique identifiers with at least one of the at least third and fourth identifiers;
when both the first and second identifiers matches a respective one of the third and fourth identifiers, permitting at least one of the at least first and second computational components to perform an operation; and
when both of the first and second identifiers do not match a respective one of the third and fourth identifiers, not permitting the at least one of the at least first and second computational components to perform an operation.
24 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a system, comprising: (i) first and second computational components 102a and b having, respectively, first and second unique identifiers; (ii) a license file 112 comprising third and fourth identifiers 212a and b respectively associated with the first and second computational components; (iii) a license manager 113 operable to (a) obtain, from the first and second computational components, the first and second unique identifiers, (b) access the license file to obtain the third and fourth identifiers, (c) compare each of the first and second unique identifiers with one or both of the third and fourth identifiers; and (iv) a mode setting agent 124 operable to permit the one or both of the first and second computational components to perform an operation, when both the first and second identifiers match one of the third and fourth identifiers, and not permit the first and second computational components to perform the operation, when only one of the first and second identifiers matches one of the third and fourth identifiers.
83 Citations
42 Claims
-
1. A method for protecting actuation of a computational component, comprising:
-
retrieving, from at least first and second computational components, at least first and second unique identifiers respectively associated with the at least first and second computational components;
accessing a license file to obtain at least third and fourth identifiers;
comparing each of the at least first and second unique identifiers with at least one of the at least third and fourth identifiers;
when both the first and second identifiers matches a respective one of the third and fourth identifiers, permitting at least one of the at least first and second computational components to perform an operation; and
when both of the first and second identifiers do not match a respective one of the third and fourth identifiers, not permitting the at least one of the at least first and second computational components to perform an operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A system for protecting actuation of a computational component, comprising:
-
means for obtaining, from at least first and second computational components, at least first and second unique identifiers respectively associated with the at least first and second computational components;
means for accessing a license file to obtain at least third and fourth identifiers;
means for comparing each of the at least first and second unique identifiers with at least one of the at least third and fourth identifiers;
means for, when both the first and second identifiers matches a respective one of the third and fourth identifiers, permitting at least one of the at least first and second computational components to perform an operation and, when both of the first and second identifiers do not match a respective one of the third and fourth identifiers, not permitting the at least one of the at least first and second computational components to perform the operation. - View Dependent Claims (16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26)
-
-
27. A system for protecting actuation of a computational component, comprising:
-
at least first and second computational components having, respectively, at least first and second unique identifiers;
a license file comprising at least third and fourth identifiers;
a license manager operable to retrieve, from the at least first and second computational components, the at least first and second unique identifiers, access the license file to obtain the at least third and fourth identifiers, compare each of the at least first and second identifiers with at least one of the at least third and fourth identifiers; and
a mode setting agent operable to permit the at least one of the at least first and second computational components to perform an operation, when both the first and second identifiers match a respective one of the third and fourth identifiers, and not permit the at least one of the at least first and second computational components to perform the operation, when both of the first and second identifiers do not match a respective one of the third and fourth identifiers. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38)
-
-
39. A license file for use in controlling activation of a computational component, comprising:
-
at least one unique identifier corresponding to at least a first computational component and a duplication flag indicating whether or not a computational system associated with the first computational component is a duplicated system. - View Dependent Claims (40, 41, 42)
-
Specification