FIELD: information technology.
SUBSTANCE: method is realised by using a combination of computers with an installed application, a computer network, a license file, cryptographic apparatus, a data sending module, a data receiving module, and apparatus for counting the number of simultaneous uses of computer application licenses. Computers with an installed application can set up communication using altered license keys, which ultimately enables to construct a record table in which each license used in that computer network and the number of applications associated with that license which are active at that given moment is marked.
EFFECT: wider range of apparatus for protecting applications from unauthorised use.
9 cl, 5 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR OPTIMISING EXECUTION OF ANTIVIRUS TASKS IN LOCAL AREA NETWORK | 2010 |
|
RU2453917C1 |
METHOD FOR DISTRIBUTED PERFORMANCE OF COMPUTER SECURITY TASKS | 2011 |
|
RU2494453C2 |
MIGRATION OF DIGITAL LICENCE FROM FIRST PLATFORM TO SECOND PLATFORM | 2006 |
|
RU2406116C2 |
METHOD FOR AUTOMATIC GENERATION OF HEURISTIC ALGORITHMS FOR SEARCHING FOR MALICIOUS OBJECTS | 2012 |
|
RU2510530C1 |
METHOD OF USING DEDICATED COMPUTER SECURITY SERVICE | 2015 |
|
RU2601162C1 |
REMOTE ADMINISTRATION OF INITIAL CONFIGURATION PARAMETERS OF COMPUTER OPERATING SYSTEM | 2018 |
|
RU2764645C2 |
FLEXIBLE LICENSING ARCHITECTURE FOR LICENSING DIGITAL APPLICATION | 2006 |
|
RU2402809C2 |
METHOD FOR OPTIMISATION OF DATA STORAGE AND TRANSMISSION | 2011 |
|
RU2581551C2 |
METHOD FOR ANTI-VIRUS SCANNING OF COMPUTER SYSTEM | 2015 |
|
RU2617925C2 |
SYSTEM AND METHOD OF VERIFYING TRUSTED FILES | 2012 |
|
RU2491623C1 |
Authors
Dates
2012-03-27—Published
2010-11-24—Filed