SlideShare a Scribd company logo
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
Measures for Managing Safety Tool Licenses 
This document describes the information related to the safety tool licenses and helps 
related personnel to obtain the licenses. The intended audiences of this document are 
version coordinators of different product lines and technical support staff who install the 
safety tools on site. 
Safety tool licenses are the property of the Security Department. The Security 
Department issues all the safety tool licenses. 
Xu Yuankun (ID: 43202) is the coordinator for temporary licenses for the testing and 
verification purposes. The validity period of temporary licenses is around 30 days. 
Zhang Qiuting (ID: 40998) is the coordinator for official licenses. The validity of 
official licenses is longer than three years. 
If you want to apply for a license directly, skip to section 3 "Procedure for Applying 
for a Safety Tool License." 
1 Principle of Safety Tool Licenses 
A safety tool license is verified and controlled in the signature mode by using 
asymmetric keys. A secret key is used for signing and a public key is used for 
verification. 
An official license is a verification file signed by a secret key. 
A safety tool contains a public key. When starting the tool, first check the integrity of 
the license file using the public key. 
After checking the integrity, check the identity of the machine. 
Then, check the validity period of the software. 
2008-06-20 HUAWEI Confidential Page1, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
Start Check the Check the integrity machine identity Check the validity period of the software 
Fail Fail Fail 
Exit Run properly 
2 Characteristics of Safety Tool Licenses 
Integrity check ensures that a license cannot be tampered. A license file becomes 
invalid if altered. This prevents different products from using the same license. 
Identity check ensures that a machine cannot be illegally installed. Every official 
license file is bound to the fingerprint for a machine. That is, a license file can be used 
only in one machine. This prevents a license file from being repeatedly used. 
Validity period check ensures that the software cannot be illegally used. An official 
license file has a validity period. This prevents an official license from being used after 
the validity period expires. 
Note that the validity period of a safety tool is an absolute time segment instead of a 
relative time segment. This time segment is controlled by an effective date and a number 
of valid days. For example, the effective date of a license is 2005-09-01 and the validity 
period is 30 days. The license is valid from 2005-09-01 to 2005-09-31. The license is 
invalid before or after this time segment. The validity period does not begin from the date 
when the tool is installed. 
In a word, safety tool licenses are strictly controlled and cannot be used without 
authorization. 
3 Procedure for Applying for a Safety Tool License 
The official licenses of safety tools are controlled by the CMO Department. The 
coordinator is Zhang Qiuting (ID: 40998). Temporary licenses for the testing and 
2008-06-20 HUAWEI Confidential Page2, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
verification purposes are controlled by the R&D Department. The coordinator is Xu 
Yuankun (ID: 43202). 
3.1 Preparations 
Make sure that the tool is installed and useable before applying for an official 
license. If the tool is installed for the first time, only a temporary license file whose validity 
period is shorter than 30 days is available. 
Note: 
If a message indicating the expiry of the validity period is displayed after the tool is installed, the 
license file provided with the software expires. Please apply for a temporary license first. 
To apply for a temporary license, send the name and version number of the relevant software to Xu 
Yuankun. 
3.2 Obtaining the Version Number 
Record the version number of the safety tool. Fill in the correct version number when 
you apply for a license; otherwise, the license file you obtain is unusable. 
Mapping between the names and versions of the safety tools 
Name Feature Version 
i3SAFE SIS SetSolaris-AF1SISS03 Customizing in 
Solaris 
SIS V100R002SOLB019 
i3SAFE SIS SetWin2000-AF1SISS01 Customizing in 
Windows 2000 
SIS V100R002C21B013 
i3SAFE SIS SetWin98-AF1SISS02 Customizing in 
Windows 98 
SIS V100R002C20B012 
i3SAFE SIS SysPatron2000-AF1SISS07 Protective in 
Windows 2000 
SIS V100R002C41B012 
i3SAFE SIS SysPatron98-AF1SISS08 Protective in 
Windows 98 
SIS V100R002C40B014 
3.3 Obtaining the User ID 
After installation, a user ID that is bound to the host is generated, as shown in the 
following figure. 
2008-06-20 HUAWEI Confidential Page3, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
Record the user ID, which can be used to apply for an official license file. 
3.4 Applying for an Official License File Through the Notes Workflow 
Note: 
The R&D database where the Notes workflow is located is independent of other databases. Thus, 
on-site customer service staff and other people who are unable to access the R&D database cannot 
apply for a license. 
To solve this problem, do as follows: 
1. Entrust a person who has the access to the R&D database to apply for the 
license. 
2. Fill in the following table (example) and send the table to the person-in-charge 
to apply for the license. 
Applicant Product 
Line 
Product Version in 
Use 
Office Version 
Applied for 
USER ID 
Bai 
Juan 
Wireless 
Product Line 
i3SAFE 
SIS 
SetWin20 
00 
V100R002C 
21B013 
Test V100R002C 
21B013 
3.4.1 Opening the LIB Application Database in the Notes Database 
1.Right-click the workstation and select Open Database from the pop-up menu, as 
2008-06-20 HUAWEI Confidential Page4, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
shown in the following figure. 
2. In the Open Database dialog box, select szxap39-ds/Servers/huawei from the 
Server drop-down list; select 平台LIB库申请 from the Database list box, as 
shown in the following figure. 
3. Click Open to access the database, as shown in the following figure. 
2008-06-20 HUAWEI Confidential Page5, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
3.4.2 Creating an LIB Application in the Database 
4.Click New Application to create an application. 
5. In the created application form, fill the details about the current product and the 
relevant product line in the information of applied product column. Do not fill in 
the information about the requested LIB. 
6. In the Purpose for the application column, fill in the information about the 
destination office to facilitate future maintenance and user support, as shown in 
the following figure. 
7. In the Information of Requested LIB column, click the button in the Product Line 
of platform column and make selections in the displayed dialog box, as shown in 
the following figure. 
2008-06-20 HUAWEI Confidential Page6, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
8.Click the button in the Detailed version NO. column; select the version number of 
the software you apply for from the displayed list, for example, 
SISV100R002C21B013, as shown in the following figure. 
9. In the Remark column, fill in the destination user IDs. A license file corresponding 
to each user ID is generated, as shown in the following figure. 
Note: 
All generated license files are named license.dat. If you apply for multiple licenses, identify the 
user IDs that correspond to different hosts. In this way, each license file can correspond to a user ID. 
2008-06-20 HUAWEI Confidential Page7, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
10. Click Submit. 
3.5 Overwriting the Original Temporary License File with an Official License 
File 
Upgrading to an official version is successful if no version message is displayed after 
you restart the safety tool. 
3.6 Application Process 
Install Fill in Generate a user ID the LIB application Generate an official license file 
Overwrite the original temporary Send the file to the applicant 
license file 
Restart the safety tool 
4 Appendix: Obtaining Safety Tools 
You can obtain the safety tools from the FTP directory of Data Communication. Zhou 
Qiuping (ID: 17925) is in charge of the maintenance of Data Communication FTP. The 
path and password are shown as follows. If changes occur, please contact the person in 
charge of FTP maintenance. 
Path: 
yf-ftp://e:/apps/数据通信产品软件包/软件目录/01.华为产品/61.i3SAFE系列/Numen/ 
Account information: 
Reader User: pub_data_dl Password: sjtx0308 
2008-06-20 HUAWEI Confidential Page8, Total 8

More Related Content

Viewers also liked

Huawei net engine5000e core router chassis and features
Huawei net engine5000e core router chassis and featuresHuawei net engine5000e core router chassis and features
Huawei net engine5000e core router chassis and featuresHuanetwork
 
Configuration guide basic configurations(v800 r002c01-01)
Configuration guide   basic configurations(v800 r002c01-01)Configuration guide   basic configurations(v800 r002c01-01)
Configuration guide basic configurations(v800 r002c01-01)
Ghulam Mohyud Din
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
Christian Silva Espinoza
 
Huawei All-in-one Box IPCC Solution
Huawei All-in-one Box IPCC SolutionHuawei All-in-one Box IPCC Solution
Huawei All-in-one Box IPCC Solution
Mundo Contact
 
2 g data performance dimensioning ,planning & optimization
2 g data performance dimensioning ,planning & optimization2 g data performance dimensioning ,planning & optimization
2 g data performance dimensioning ,planning & optimizationVusal Suleymanov
 
03 gsm bss network kpi (sdcch congestion rate) optimization manual
03 gsm bss network kpi (sdcch congestion rate) optimization manual03 gsm bss network kpi (sdcch congestion rate) optimization manual
03 gsm bss network kpi (sdcch congestion rate) optimization manual
tharinduwije
 
Huawei Training slides
Huawei Training slidesHuawei Training slides
Huawei Training slidesrydenova
 
Gsm frequency-planning-issue2
Gsm frequency-planning-issue2Gsm frequency-planning-issue2
Gsm frequency-planning-issue2swatisabnis87
 
Gsm Cell Planning And Optimization
Gsm Cell Planning And OptimizationGsm Cell Planning And Optimization
Gsm Cell Planning And Optimization
Yasir Azmat
 

Viewers also liked (11)

06 mgw data configuration issue1.10
06 mgw data configuration issue1.1006 mgw data configuration issue1.10
06 mgw data configuration issue1.10
 
02 uap fundamental issue1.10
02 uap fundamental issue1.1002 uap fundamental issue1.10
02 uap fundamental issue1.10
 
Huawei net engine5000e core router chassis and features
Huawei net engine5000e core router chassis and featuresHuawei net engine5000e core router chassis and features
Huawei net engine5000e core router chassis and features
 
Configuration guide basic configurations(v800 r002c01-01)
Configuration guide   basic configurations(v800 r002c01-01)Configuration guide   basic configurations(v800 r002c01-01)
Configuration guide basic configurations(v800 r002c01-01)
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 
Huawei All-in-one Box IPCC Solution
Huawei All-in-one Box IPCC SolutionHuawei All-in-one Box IPCC Solution
Huawei All-in-one Box IPCC Solution
 
2 g data performance dimensioning ,planning & optimization
2 g data performance dimensioning ,planning & optimization2 g data performance dimensioning ,planning & optimization
2 g data performance dimensioning ,planning & optimization
 
03 gsm bss network kpi (sdcch congestion rate) optimization manual
03 gsm bss network kpi (sdcch congestion rate) optimization manual03 gsm bss network kpi (sdcch congestion rate) optimization manual
03 gsm bss network kpi (sdcch congestion rate) optimization manual
 
Huawei Training slides
Huawei Training slidesHuawei Training slides
Huawei Training slides
 
Gsm frequency-planning-issue2
Gsm frequency-planning-issue2Gsm frequency-planning-issue2
Gsm frequency-planning-issue2
 
Gsm Cell Planning And Optimization
Gsm Cell Planning And OptimizationGsm Cell Planning And Optimization
Gsm Cell Planning And Optimization
 

Similar to Attachment 3 measures for managing and applying for licenses

License Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationLicense Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial Application
IRJET Journal
 
License
LicenseLicense
Design Documents (4)
Design Documents (4)Design Documents (4)
Design Documents (4)Isidro Garcia
 
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Sean King
 
Centralized Tool for Software and USB
Centralized Tool for Software and USBCentralized Tool for Software and USB
Centralized Tool for Software and USB
ijtsrd
 
License
LicenseLicense
License
yopui
 

Similar to Attachment 3 measures for managing and applying for licenses (20)

License Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationLicense Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial Application
 
License
LicenseLicense
License
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Design Documents (4)
Design Documents (4)Design Documents (4)
Design Documents (4)
 
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Centralized Tool for Software and USB
Centralized Tool for Software and USBCentralized Tool for Software and USB
Centralized Tool for Software and USB
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 

More from Christian Silva Espinoza

Cisco data center training for ibm
Cisco data center training for ibmCisco data center training for ibm
Cisco data center training for ibm
Christian Silva Espinoza
 

More from Christian Silva Espinoza (8)

05 uap terminal system issue1.10
05 uap terminal system issue1.1005 uap terminal system issue1.10
05 uap terminal system issue1.10
 
04 hardware system of uap mgc issue1.10
04 hardware system of uap mgc issue1.1004 hardware system of uap mgc issue1.10
04 hardware system of uap mgc issue1.10
 
03 hardware system of uap mgw issue1.10
03 hardware system of uap mgw issue1.1003 hardware system of uap mgw issue1.10
03 hardware system of uap mgw issue1.10
 
01 introduction to ipcc system issue1.0
01 introduction to ipcc system issue1.001 introduction to ipcc system issue1.0
01 introduction to ipcc system issue1.0
 
Apkt ds nn central_110620
Apkt ds nn central_110620Apkt ds nn central_110620
Apkt ds nn central_110620
 
1600 g technical_description
1600 g technical_description1600 g technical_description
1600 g technical_description
 
Apkt sn lte_091102
Apkt sn lte_091102Apkt sn lte_091102
Apkt sn lte_091102
 
Cisco data center training for ibm
Cisco data center training for ibmCisco data center training for ibm
Cisco data center training for ibm
 

Recently uploaded

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Attachment 3 measures for managing and applying for licenses

  • 1. Measures for Managing Safety Tool Licenses For Internal Use Only Measures for Managing Safety Tool Licenses This document describes the information related to the safety tool licenses and helps related personnel to obtain the licenses. The intended audiences of this document are version coordinators of different product lines and technical support staff who install the safety tools on site. Safety tool licenses are the property of the Security Department. The Security Department issues all the safety tool licenses. Xu Yuankun (ID: 43202) is the coordinator for temporary licenses for the testing and verification purposes. The validity period of temporary licenses is around 30 days. Zhang Qiuting (ID: 40998) is the coordinator for official licenses. The validity of official licenses is longer than three years. If you want to apply for a license directly, skip to section 3 "Procedure for Applying for a Safety Tool License." 1 Principle of Safety Tool Licenses A safety tool license is verified and controlled in the signature mode by using asymmetric keys. A secret key is used for signing and a public key is used for verification. An official license is a verification file signed by a secret key. A safety tool contains a public key. When starting the tool, first check the integrity of the license file using the public key. After checking the integrity, check the identity of the machine. Then, check the validity period of the software. 2008-06-20 HUAWEI Confidential Page1, Total 8
  • 2. Measures for Managing Safety Tool Licenses For Internal Use Only Start Check the Check the integrity machine identity Check the validity period of the software Fail Fail Fail Exit Run properly 2 Characteristics of Safety Tool Licenses Integrity check ensures that a license cannot be tampered. A license file becomes invalid if altered. This prevents different products from using the same license. Identity check ensures that a machine cannot be illegally installed. Every official license file is bound to the fingerprint for a machine. That is, a license file can be used only in one machine. This prevents a license file from being repeatedly used. Validity period check ensures that the software cannot be illegally used. An official license file has a validity period. This prevents an official license from being used after the validity period expires. Note that the validity period of a safety tool is an absolute time segment instead of a relative time segment. This time segment is controlled by an effective date and a number of valid days. For example, the effective date of a license is 2005-09-01 and the validity period is 30 days. The license is valid from 2005-09-01 to 2005-09-31. The license is invalid before or after this time segment. The validity period does not begin from the date when the tool is installed. In a word, safety tool licenses are strictly controlled and cannot be used without authorization. 3 Procedure for Applying for a Safety Tool License The official licenses of safety tools are controlled by the CMO Department. The coordinator is Zhang Qiuting (ID: 40998). Temporary licenses for the testing and 2008-06-20 HUAWEI Confidential Page2, Total 8
  • 3. Measures for Managing Safety Tool Licenses For Internal Use Only verification purposes are controlled by the R&D Department. The coordinator is Xu Yuankun (ID: 43202). 3.1 Preparations Make sure that the tool is installed and useable before applying for an official license. If the tool is installed for the first time, only a temporary license file whose validity period is shorter than 30 days is available. Note: If a message indicating the expiry of the validity period is displayed after the tool is installed, the license file provided with the software expires. Please apply for a temporary license first. To apply for a temporary license, send the name and version number of the relevant software to Xu Yuankun. 3.2 Obtaining the Version Number Record the version number of the safety tool. Fill in the correct version number when you apply for a license; otherwise, the license file you obtain is unusable. Mapping between the names and versions of the safety tools Name Feature Version i3SAFE SIS SetSolaris-AF1SISS03 Customizing in Solaris SIS V100R002SOLB019 i3SAFE SIS SetWin2000-AF1SISS01 Customizing in Windows 2000 SIS V100R002C21B013 i3SAFE SIS SetWin98-AF1SISS02 Customizing in Windows 98 SIS V100R002C20B012 i3SAFE SIS SysPatron2000-AF1SISS07 Protective in Windows 2000 SIS V100R002C41B012 i3SAFE SIS SysPatron98-AF1SISS08 Protective in Windows 98 SIS V100R002C40B014 3.3 Obtaining the User ID After installation, a user ID that is bound to the host is generated, as shown in the following figure. 2008-06-20 HUAWEI Confidential Page3, Total 8
  • 4. Measures for Managing Safety Tool Licenses For Internal Use Only Record the user ID, which can be used to apply for an official license file. 3.4 Applying for an Official License File Through the Notes Workflow Note: The R&D database where the Notes workflow is located is independent of other databases. Thus, on-site customer service staff and other people who are unable to access the R&D database cannot apply for a license. To solve this problem, do as follows: 1. Entrust a person who has the access to the R&D database to apply for the license. 2. Fill in the following table (example) and send the table to the person-in-charge to apply for the license. Applicant Product Line Product Version in Use Office Version Applied for USER ID Bai Juan Wireless Product Line i3SAFE SIS SetWin20 00 V100R002C 21B013 Test V100R002C 21B013 3.4.1 Opening the LIB Application Database in the Notes Database 1.Right-click the workstation and select Open Database from the pop-up menu, as 2008-06-20 HUAWEI Confidential Page4, Total 8
  • 5. Measures for Managing Safety Tool Licenses For Internal Use Only shown in the following figure. 2. In the Open Database dialog box, select szxap39-ds/Servers/huawei from the Server drop-down list; select 平台LIB库申请 from the Database list box, as shown in the following figure. 3. Click Open to access the database, as shown in the following figure. 2008-06-20 HUAWEI Confidential Page5, Total 8
  • 6. Measures for Managing Safety Tool Licenses For Internal Use Only 3.4.2 Creating an LIB Application in the Database 4.Click New Application to create an application. 5. In the created application form, fill the details about the current product and the relevant product line in the information of applied product column. Do not fill in the information about the requested LIB. 6. In the Purpose for the application column, fill in the information about the destination office to facilitate future maintenance and user support, as shown in the following figure. 7. In the Information of Requested LIB column, click the button in the Product Line of platform column and make selections in the displayed dialog box, as shown in the following figure. 2008-06-20 HUAWEI Confidential Page6, Total 8
  • 7. Measures for Managing Safety Tool Licenses For Internal Use Only 8.Click the button in the Detailed version NO. column; select the version number of the software you apply for from the displayed list, for example, SISV100R002C21B013, as shown in the following figure. 9. In the Remark column, fill in the destination user IDs. A license file corresponding to each user ID is generated, as shown in the following figure. Note: All generated license files are named license.dat. If you apply for multiple licenses, identify the user IDs that correspond to different hosts. In this way, each license file can correspond to a user ID. 2008-06-20 HUAWEI Confidential Page7, Total 8
  • 8. Measures for Managing Safety Tool Licenses For Internal Use Only 10. Click Submit. 3.5 Overwriting the Original Temporary License File with an Official License File Upgrading to an official version is successful if no version message is displayed after you restart the safety tool. 3.6 Application Process Install Fill in Generate a user ID the LIB application Generate an official license file Overwrite the original temporary Send the file to the applicant license file Restart the safety tool 4 Appendix: Obtaining Safety Tools You can obtain the safety tools from the FTP directory of Data Communication. Zhou Qiuping (ID: 17925) is in charge of the maintenance of Data Communication FTP. The path and password are shown as follows. If changes occur, please contact the person in charge of FTP maintenance. Path: yf-ftp://e:/apps/数据通信产品软件包/软件目录/01.华为产品/61.i3SAFE系列/Numen/ Account information: Reader User: pub_data_dl Password: sjtx0308 2008-06-20 HUAWEI Confidential Page8, Total 8