SlideShare una empresa de Scribd logo
1 de 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
Measures for Managing Safety Tool Licenses 
This document describes the information related to the safety tool licenses and helps 
related personnel to obtain the licenses. The intended audiences of this document are 
version coordinators of different product lines and technical support staff who install the 
safety tools on site. 
Safety tool licenses are the property of the Security Department. The Security 
Department issues all the safety tool licenses. 
Xu Yuankun (ID: 43202) is the coordinator for temporary licenses for the testing and 
verification purposes. The validity period of temporary licenses is around 30 days. 
Zhang Qiuting (ID: 40998) is the coordinator for official licenses. The validity of 
official licenses is longer than three years. 
If you want to apply for a license directly, skip to section 3 "Procedure for Applying 
for a Safety Tool License." 
1 Principle of Safety Tool Licenses 
A safety tool license is verified and controlled in the signature mode by using 
asymmetric keys. A secret key is used for signing and a public key is used for 
verification. 
An official license is a verification file signed by a secret key. 
A safety tool contains a public key. When starting the tool, first check the integrity of 
the license file using the public key. 
After checking the integrity, check the identity of the machine. 
Then, check the validity period of the software. 
2008-06-20 HUAWEI Confidential Page1, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
Start Check the Check the integrity machine identity Check the validity period of the software 
Fail Fail Fail 
Exit Run properly 
2 Characteristics of Safety Tool Licenses 
Integrity check ensures that a license cannot be tampered. A license file becomes 
invalid if altered. This prevents different products from using the same license. 
Identity check ensures that a machine cannot be illegally installed. Every official 
license file is bound to the fingerprint for a machine. That is, a license file can be used 
only in one machine. This prevents a license file from being repeatedly used. 
Validity period check ensures that the software cannot be illegally used. An official 
license file has a validity period. This prevents an official license from being used after 
the validity period expires. 
Note that the validity period of a safety tool is an absolute time segment instead of a 
relative time segment. This time segment is controlled by an effective date and a number 
of valid days. For example, the effective date of a license is 2005-09-01 and the validity 
period is 30 days. The license is valid from 2005-09-01 to 2005-09-31. The license is 
invalid before or after this time segment. The validity period does not begin from the date 
when the tool is installed. 
In a word, safety tool licenses are strictly controlled and cannot be used without 
authorization. 
3 Procedure for Applying for a Safety Tool License 
The official licenses of safety tools are controlled by the CMO Department. The 
coordinator is Zhang Qiuting (ID: 40998). Temporary licenses for the testing and 
2008-06-20 HUAWEI Confidential Page2, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
verification purposes are controlled by the R&D Department. The coordinator is Xu 
Yuankun (ID: 43202). 
3.1 Preparations 
Make sure that the tool is installed and useable before applying for an official 
license. If the tool is installed for the first time, only a temporary license file whose validity 
period is shorter than 30 days is available. 
Note: 
If a message indicating the expiry of the validity period is displayed after the tool is installed, the 
license file provided with the software expires. Please apply for a temporary license first. 
To apply for a temporary license, send the name and version number of the relevant software to Xu 
Yuankun. 
3.2 Obtaining the Version Number 
Record the version number of the safety tool. Fill in the correct version number when 
you apply for a license; otherwise, the license file you obtain is unusable. 
Mapping between the names and versions of the safety tools 
Name Feature Version 
i3SAFE SIS SetSolaris-AF1SISS03 Customizing in 
Solaris 
SIS V100R002SOLB019 
i3SAFE SIS SetWin2000-AF1SISS01 Customizing in 
Windows 2000 
SIS V100R002C21B013 
i3SAFE SIS SetWin98-AF1SISS02 Customizing in 
Windows 98 
SIS V100R002C20B012 
i3SAFE SIS SysPatron2000-AF1SISS07 Protective in 
Windows 2000 
SIS V100R002C41B012 
i3SAFE SIS SysPatron98-AF1SISS08 Protective in 
Windows 98 
SIS V100R002C40B014 
3.3 Obtaining the User ID 
After installation, a user ID that is bound to the host is generated, as shown in the 
following figure. 
2008-06-20 HUAWEI Confidential Page3, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
Record the user ID, which can be used to apply for an official license file. 
3.4 Applying for an Official License File Through the Notes Workflow 
Note: 
The R&D database where the Notes workflow is located is independent of other databases. Thus, 
on-site customer service staff and other people who are unable to access the R&D database cannot 
apply for a license. 
To solve this problem, do as follows: 
1. Entrust a person who has the access to the R&D database to apply for the 
license. 
2. Fill in the following table (example) and send the table to the person-in-charge 
to apply for the license. 
Applicant Product 
Line 
Product Version in 
Use 
Office Version 
Applied for 
USER ID 
Bai 
Juan 
Wireless 
Product Line 
i3SAFE 
SIS 
SetWin20 
00 
V100R002C 
21B013 
Test V100R002C 
21B013 
3.4.1 Opening the LIB Application Database in the Notes Database 
1.Right-click the workstation and select Open Database from the pop-up menu, as 
2008-06-20 HUAWEI Confidential Page4, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
shown in the following figure. 
2. In the Open Database dialog box, select szxap39-ds/Servers/huawei from the 
Server drop-down list; select 平台LIB库申请 from the Database list box, as 
shown in the following figure. 
3. Click Open to access the database, as shown in the following figure. 
2008-06-20 HUAWEI Confidential Page5, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
3.4.2 Creating an LIB Application in the Database 
4.Click New Application to create an application. 
5. In the created application form, fill the details about the current product and the 
relevant product line in the information of applied product column. Do not fill in 
the information about the requested LIB. 
6. In the Purpose for the application column, fill in the information about the 
destination office to facilitate future maintenance and user support, as shown in 
the following figure. 
7. In the Information of Requested LIB column, click the button in the Product Line 
of platform column and make selections in the displayed dialog box, as shown in 
the following figure. 
2008-06-20 HUAWEI Confidential Page6, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
8.Click the button in the Detailed version NO. column; select the version number of 
the software you apply for from the displayed list, for example, 
SISV100R002C21B013, as shown in the following figure. 
9. In the Remark column, fill in the destination user IDs. A license file corresponding 
to each user ID is generated, as shown in the following figure. 
Note: 
All generated license files are named license.dat. If you apply for multiple licenses, identify the 
user IDs that correspond to different hosts. In this way, each license file can correspond to a user ID. 
2008-06-20 HUAWEI Confidential Page7, Total 8
Measures for Managing Safety Tool Licenses For Internal 
Use Only 
10. Click Submit. 
3.5 Overwriting the Original Temporary License File with an Official License 
File 
Upgrading to an official version is successful if no version message is displayed after 
you restart the safety tool. 
3.6 Application Process 
Install Fill in Generate a user ID the LIB application Generate an official license file 
Overwrite the original temporary Send the file to the applicant 
license file 
Restart the safety tool 
4 Appendix: Obtaining Safety Tools 
You can obtain the safety tools from the FTP directory of Data Communication. Zhou 
Qiuping (ID: 17925) is in charge of the maintenance of Data Communication FTP. The 
path and password are shown as follows. If changes occur, please contact the person in 
charge of FTP maintenance. 
Path: 
yf-ftp://e:/apps/数据通信产品软件包/软件目录/01.华为产品/61.i3SAFE系列/Numen/ 
Account information: 
Reader User: pub_data_dl Password: sjtx0308 
2008-06-20 HUAWEI Confidential Page8, Total 8

Más contenido relacionado

Destacado

Huawei net engine5000e core router chassis and features
Huawei net engine5000e core router chassis and featuresHuawei net engine5000e core router chassis and features
Huawei net engine5000e core router chassis and featuresHuanetwork
 
Configuration guide basic configurations(v800 r002c01-01)
Configuration guide   basic configurations(v800 r002c01-01)Configuration guide   basic configurations(v800 r002c01-01)
Configuration guide basic configurations(v800 r002c01-01)Ghulam Mohyud Din
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsChristian Silva Espinoza
 
Huawei All-in-one Box IPCC Solution
Huawei All-in-one Box IPCC SolutionHuawei All-in-one Box IPCC Solution
Huawei All-in-one Box IPCC SolutionMundo Contact
 
2 g data performance dimensioning ,planning & optimization
2 g data performance dimensioning ,planning & optimization2 g data performance dimensioning ,planning & optimization
2 g data performance dimensioning ,planning & optimizationVusal Suleymanov
 
03 gsm bss network kpi (sdcch congestion rate) optimization manual
03 gsm bss network kpi (sdcch congestion rate) optimization manual03 gsm bss network kpi (sdcch congestion rate) optimization manual
03 gsm bss network kpi (sdcch congestion rate) optimization manualtharinduwije
 
Huawei Training slides
Huawei Training slidesHuawei Training slides
Huawei Training slidesrydenova
 
Gsm frequency-planning-issue2
Gsm frequency-planning-issue2Gsm frequency-planning-issue2
Gsm frequency-planning-issue2swatisabnis87
 
Gsm Cell Planning And Optimization
Gsm Cell Planning And OptimizationGsm Cell Planning And Optimization
Gsm Cell Planning And OptimizationYasir Azmat
 

Destacado (11)

06 mgw data configuration issue1.10
06 mgw data configuration issue1.1006 mgw data configuration issue1.10
06 mgw data configuration issue1.10
 
02 uap fundamental issue1.10
02 uap fundamental issue1.1002 uap fundamental issue1.10
02 uap fundamental issue1.10
 
Huawei net engine5000e core router chassis and features
Huawei net engine5000e core router chassis and featuresHuawei net engine5000e core router chassis and features
Huawei net engine5000e core router chassis and features
 
Configuration guide basic configurations(v800 r002c01-01)
Configuration guide   basic configurations(v800 r002c01-01)Configuration guide   basic configurations(v800 r002c01-01)
Configuration guide basic configurations(v800 r002c01-01)
 
Attachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning toolsAttachment 11 use of common analyzing and positioning tools
Attachment 11 use of common analyzing and positioning tools
 
Huawei All-in-one Box IPCC Solution
Huawei All-in-one Box IPCC SolutionHuawei All-in-one Box IPCC Solution
Huawei All-in-one Box IPCC Solution
 
2 g data performance dimensioning ,planning & optimization
2 g data performance dimensioning ,planning & optimization2 g data performance dimensioning ,planning & optimization
2 g data performance dimensioning ,planning & optimization
 
03 gsm bss network kpi (sdcch congestion rate) optimization manual
03 gsm bss network kpi (sdcch congestion rate) optimization manual03 gsm bss network kpi (sdcch congestion rate) optimization manual
03 gsm bss network kpi (sdcch congestion rate) optimization manual
 
Huawei Training slides
Huawei Training slidesHuawei Training slides
Huawei Training slides
 
Gsm frequency-planning-issue2
Gsm frequency-planning-issue2Gsm frequency-planning-issue2
Gsm frequency-planning-issue2
 
Gsm Cell Planning And Optimization
Gsm Cell Planning And OptimizationGsm Cell Planning And Optimization
Gsm Cell Planning And Optimization
 

Similar a Attachment 3 measures for managing and applying for licenses

Similar a Attachment 3 measures for managing and applying for licenses (20)

License Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial ApplicationLicense Generator using MAC Address for Industrial Application
License Generator using MAC Address for Industrial Application
 
License
LicenseLicense
License
 
Anajli_Synopsis
Anajli_SynopsisAnajli_Synopsis
Anajli_Synopsis
 
Design Documents (4)
Design Documents (4)Design Documents (4)
Design Documents (4)
 
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
Proximity Issues Brief – Software Licence Issues in a Thin-Client or Virtuali...
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 
Centralized Tool for Software and USB
Centralized Tool for Software and USBCentralized Tool for Software and USB
Centralized Tool for Software and USB
 
License
LicenseLicense
License
 
License
LicenseLicense
License
 

Más de Christian Silva Espinoza

Más de Christian Silva Espinoza (8)

05 uap terminal system issue1.10
05 uap terminal system issue1.1005 uap terminal system issue1.10
05 uap terminal system issue1.10
 
04 hardware system of uap mgc issue1.10
04 hardware system of uap mgc issue1.1004 hardware system of uap mgc issue1.10
04 hardware system of uap mgc issue1.10
 
03 hardware system of uap mgw issue1.10
03 hardware system of uap mgw issue1.1003 hardware system of uap mgw issue1.10
03 hardware system of uap mgw issue1.10
 
01 introduction to ipcc system issue1.0
01 introduction to ipcc system issue1.001 introduction to ipcc system issue1.0
01 introduction to ipcc system issue1.0
 
Apkt ds nn central_110620
Apkt ds nn central_110620Apkt ds nn central_110620
Apkt ds nn central_110620
 
1600 g technical_description
1600 g technical_description1600 g technical_description
1600 g technical_description
 
Apkt sn lte_091102
Apkt sn lte_091102Apkt sn lte_091102
Apkt sn lte_091102
 
Cisco data center training for ibm
Cisco data center training for ibmCisco data center training for ibm
Cisco data center training for ibm
 

Último

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 

Último (20)

Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 

Attachment 3 measures for managing and applying for licenses

  • 1. Measures for Managing Safety Tool Licenses For Internal Use Only Measures for Managing Safety Tool Licenses This document describes the information related to the safety tool licenses and helps related personnel to obtain the licenses. The intended audiences of this document are version coordinators of different product lines and technical support staff who install the safety tools on site. Safety tool licenses are the property of the Security Department. The Security Department issues all the safety tool licenses. Xu Yuankun (ID: 43202) is the coordinator for temporary licenses for the testing and verification purposes. The validity period of temporary licenses is around 30 days. Zhang Qiuting (ID: 40998) is the coordinator for official licenses. The validity of official licenses is longer than three years. If you want to apply for a license directly, skip to section 3 "Procedure for Applying for a Safety Tool License." 1 Principle of Safety Tool Licenses A safety tool license is verified and controlled in the signature mode by using asymmetric keys. A secret key is used for signing and a public key is used for verification. An official license is a verification file signed by a secret key. A safety tool contains a public key. When starting the tool, first check the integrity of the license file using the public key. After checking the integrity, check the identity of the machine. Then, check the validity period of the software. 2008-06-20 HUAWEI Confidential Page1, Total 8
  • 2. Measures for Managing Safety Tool Licenses For Internal Use Only Start Check the Check the integrity machine identity Check the validity period of the software Fail Fail Fail Exit Run properly 2 Characteristics of Safety Tool Licenses Integrity check ensures that a license cannot be tampered. A license file becomes invalid if altered. This prevents different products from using the same license. Identity check ensures that a machine cannot be illegally installed. Every official license file is bound to the fingerprint for a machine. That is, a license file can be used only in one machine. This prevents a license file from being repeatedly used. Validity period check ensures that the software cannot be illegally used. An official license file has a validity period. This prevents an official license from being used after the validity period expires. Note that the validity period of a safety tool is an absolute time segment instead of a relative time segment. This time segment is controlled by an effective date and a number of valid days. For example, the effective date of a license is 2005-09-01 and the validity period is 30 days. The license is valid from 2005-09-01 to 2005-09-31. The license is invalid before or after this time segment. The validity period does not begin from the date when the tool is installed. In a word, safety tool licenses are strictly controlled and cannot be used without authorization. 3 Procedure for Applying for a Safety Tool License The official licenses of safety tools are controlled by the CMO Department. The coordinator is Zhang Qiuting (ID: 40998). Temporary licenses for the testing and 2008-06-20 HUAWEI Confidential Page2, Total 8
  • 3. Measures for Managing Safety Tool Licenses For Internal Use Only verification purposes are controlled by the R&D Department. The coordinator is Xu Yuankun (ID: 43202). 3.1 Preparations Make sure that the tool is installed and useable before applying for an official license. If the tool is installed for the first time, only a temporary license file whose validity period is shorter than 30 days is available. Note: If a message indicating the expiry of the validity period is displayed after the tool is installed, the license file provided with the software expires. Please apply for a temporary license first. To apply for a temporary license, send the name and version number of the relevant software to Xu Yuankun. 3.2 Obtaining the Version Number Record the version number of the safety tool. Fill in the correct version number when you apply for a license; otherwise, the license file you obtain is unusable. Mapping between the names and versions of the safety tools Name Feature Version i3SAFE SIS SetSolaris-AF1SISS03 Customizing in Solaris SIS V100R002SOLB019 i3SAFE SIS SetWin2000-AF1SISS01 Customizing in Windows 2000 SIS V100R002C21B013 i3SAFE SIS SetWin98-AF1SISS02 Customizing in Windows 98 SIS V100R002C20B012 i3SAFE SIS SysPatron2000-AF1SISS07 Protective in Windows 2000 SIS V100R002C41B012 i3SAFE SIS SysPatron98-AF1SISS08 Protective in Windows 98 SIS V100R002C40B014 3.3 Obtaining the User ID After installation, a user ID that is bound to the host is generated, as shown in the following figure. 2008-06-20 HUAWEI Confidential Page3, Total 8
  • 4. Measures for Managing Safety Tool Licenses For Internal Use Only Record the user ID, which can be used to apply for an official license file. 3.4 Applying for an Official License File Through the Notes Workflow Note: The R&D database where the Notes workflow is located is independent of other databases. Thus, on-site customer service staff and other people who are unable to access the R&D database cannot apply for a license. To solve this problem, do as follows: 1. Entrust a person who has the access to the R&D database to apply for the license. 2. Fill in the following table (example) and send the table to the person-in-charge to apply for the license. Applicant Product Line Product Version in Use Office Version Applied for USER ID Bai Juan Wireless Product Line i3SAFE SIS SetWin20 00 V100R002C 21B013 Test V100R002C 21B013 3.4.1 Opening the LIB Application Database in the Notes Database 1.Right-click the workstation and select Open Database from the pop-up menu, as 2008-06-20 HUAWEI Confidential Page4, Total 8
  • 5. Measures for Managing Safety Tool Licenses For Internal Use Only shown in the following figure. 2. In the Open Database dialog box, select szxap39-ds/Servers/huawei from the Server drop-down list; select 平台LIB库申请 from the Database list box, as shown in the following figure. 3. Click Open to access the database, as shown in the following figure. 2008-06-20 HUAWEI Confidential Page5, Total 8
  • 6. Measures for Managing Safety Tool Licenses For Internal Use Only 3.4.2 Creating an LIB Application in the Database 4.Click New Application to create an application. 5. In the created application form, fill the details about the current product and the relevant product line in the information of applied product column. Do not fill in the information about the requested LIB. 6. In the Purpose for the application column, fill in the information about the destination office to facilitate future maintenance and user support, as shown in the following figure. 7. In the Information of Requested LIB column, click the button in the Product Line of platform column and make selections in the displayed dialog box, as shown in the following figure. 2008-06-20 HUAWEI Confidential Page6, Total 8
  • 7. Measures for Managing Safety Tool Licenses For Internal Use Only 8.Click the button in the Detailed version NO. column; select the version number of the software you apply for from the displayed list, for example, SISV100R002C21B013, as shown in the following figure. 9. In the Remark column, fill in the destination user IDs. A license file corresponding to each user ID is generated, as shown in the following figure. Note: All generated license files are named license.dat. If you apply for multiple licenses, identify the user IDs that correspond to different hosts. In this way, each license file can correspond to a user ID. 2008-06-20 HUAWEI Confidential Page7, Total 8
  • 8. Measures for Managing Safety Tool Licenses For Internal Use Only 10. Click Submit. 3.5 Overwriting the Original Temporary License File with an Official License File Upgrading to an official version is successful if no version message is displayed after you restart the safety tool. 3.6 Application Process Install Fill in Generate a user ID the LIB application Generate an official license file Overwrite the original temporary Send the file to the applicant license file Restart the safety tool 4 Appendix: Obtaining Safety Tools You can obtain the safety tools from the FTP directory of Data Communication. Zhou Qiuping (ID: 17925) is in charge of the maintenance of Data Communication FTP. The path and password are shown as follows. If changes occur, please contact the person in charge of FTP maintenance. Path: yf-ftp://e:/apps/数据通信产品软件包/软件目录/01.华为产品/61.i3SAFE系列/Numen/ Account information: Reader User: pub_data_dl Password: sjtx0308 2008-06-20 HUAWEI Confidential Page8, Total 8