Licensing duplicated systems
First Claim
1. A method for protecting actuation of a computational component, comprising:
- (a) retrieving, from at least first and second computational components, at least first and second unique identifiers respectively associated with the at least first and second computational components, wherein the second computational component is a duplicate of the first computational component;
(b) accessing a license file to obtain at least third and fourth identifiers;
(c) comparing each of the at least first and second unique identifiers with at least one of the at least third and fourth identifiers;
(d) when both the first and second identifiers matches a respective one of the third and fourth identifiers, permitting at least one of the at least first and second computational components to perform an operation; and
(e) when both of the first and second identifiers do not match a respective one of the third and fourth identifiers, not permitting the at least one of the at least first and second computational components to perform an operation.
24 Assignments
0 Petitions
Accused Products
Abstract
The present invention is directed to a system, comprising: (i) first and second computational components 102a and b having, respectively, first and second unique identifiers; (ii) a license file 112 comprising third and fourth identifiers 212a and b respectively associated with the first and second computational components; (iii) a license manager 113 operable to (a) obtain, from the first and second computational components, the first and second unique identifiers, (b) access the license file to obtain the third and fourth identifiers, (c) compare each of the first and second unique identifiers with one or both of the third and fourth identifiers; and (iv) a mode setting agent 124 operable to permit the one or both of the first and second computational components to perform an operation, when both the first and second identifiers match one of the third and fourth identifiers, and not permit the first and second computational components to perform the operation, when only one of the first and second identifiers matches one of the third and fourth identifiers.
104 Citations
41 Claims
-
1. A method for protecting actuation of a computational component, comprising:
-
(a) retrieving, from at least first and second computational components, at least first and second unique identifiers respectively associated with the at least first and second computational components, wherein the second computational component is a duplicate of the first computational component; (b) accessing a license file to obtain at least third and fourth identifiers; (c) comparing each of the at least first and second unique identifiers with at least one of the at least third and fourth identifiers; (d) when both the first and second identifiers matches a respective one of the third and fourth identifiers, permitting at least one of the at least first and second computational components to perform an operation; and (e) when both of the first and second identifiers do not match a respective one of the third and fourth identifiers, not permitting the at least one of the at least first and second computational components to perform an operation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system for protecting actuation of a computational component, comprising:
-
a processor; at least first and second computational components having, respectively, at least first and second unique identifiers, wherein the second computational component is a duplicate of the first computational component; a license file comprising at least third and fourth identifiers; a license manager operable within a telecommunications switching system to retrieve, from the at least first and second computational components, the at least first and second unique identifiers, access the license file to obtain the at least third and fourth identifiers, compare each of the at least first and second identifiers with at least one of the at least third and fourth identifiers; and a mode setting agent operable within the telecommunications switching system to permit at least one of the at least first and second computational components to perform an operation, when both the first and second identifiers match a respective one of the third and fourth identifiers, and not permit the at least one of the at least first and second computational components to perform the operation, when both of the first and second identifiers do not match a respective one of the third and fourth identifiers. - View Dependent Claims (18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31)
-
-
32. A computer readable medium in a computer system executable on a processor, comprising:
-
a license file for use in controlling activation of a computational component, the license file including; first and second unique identifiers, each corresponding to a respective identifier of first and second computational components, the second component being a duplicate of the first component and a duplication flag indicating that the second computational component is a duplicate of the first computational component; and a license manager operable within a telecommunications switching system to access the license file to obtain the first and second identifiers, compare each of the first and second identifiers with the respective identifier received from the corresponding one of the first and second computational components; and a mode setting agent operable within the telecommunications switching system to permit the at least one of the first and second computational components to perform an operation, when both the first and second computational components match a respective one of the retrieved identifiers, and not permit the at least one of the first and second computational components to perform the operation when both of the first and second identifiers do not match a respective one of the retrieved identifiers. - View Dependent Claims (33, 34, 35)
-
-
36. A method, comprising:
-
(a) receiving from a third computational component a request for permission to execute and/or continue execution; (b) in response, retrieving from at least first and second computational components, at least first and second unique identifiers, respectively, associated with the at least first and second computational components, the second component being a duplicate of the first component; (c) accessing a license file to obtain at least third and fourth identifiers; (d) determining whether the first unique identifier matches at least one of the third and fourth identifiers; (e) when the first unique identifier fails to match at least one of the third and fourth identifiers, not permitting the third computational component to execute after a predetermined period of time; (f) determining a value of a duplication flag; (g) when the duplication flag has a first value and when the first unique identifier matches at least one of the third and fourth identifiers, determining whether the second unique identifier matches at least one of the third and fourth identifiers; (h) when the second unique identifier fails to match at least one of the third and fourth identifiers, not permitting the third computational component to execute after a predetermined period of time; and (i) when the first and second unique identifiers each match a respective one of the third and fourth identifiers, permitting the third computational component to execute longer than the predetermined period of time. - View Dependent Claims (37, 38, 39, 40, 41)
-
Specification