The following operators can be used to better focus your queries.
( ) , AND, OR, NOT, W/#
? single char wildcard, not at start
* multi char wildcard, not at start
(Cat? OR feline) AND NOT dog?
Cat? W/5 behavior
(Cat? OR feline) AND traits
Cat AND charact*
This guide provides a more detailed description of the syntax that is supported along with examples.
This search box also supports the look-up of an IP.com Digital Signature (also referred to as Fingerprint); enter the 72-, 48-, or 32-character code to retrieve details of the associated file or submission.
Concept Search - What can I type?
For a concept search, you can enter phrases, sentences, or full paragraphs in English. For example, copy and paste the abstract of a patent application or paragraphs from an article.
Concept search eliminates the need for complex Boolean syntax to inform retrieval. Our Semantic Gist engine uses advanced cognitive semantic analysis to extract the meaning of data. This reduces the chances of missing valuable information, that may result from traditional keyword searching.
License managers, software asset managers and software licensing agreements attempt to keep track of users and license levels of software.
English (United States)
This text was extracted from a PDF file.
100% of the total text.
Page 1 of 1
Hierarchy of methods for discovering application usage in software license
In a recessionary economy organizations may have negotiated and installed a level of
licenses that are no longer required or used. Most license managers when installed can
track levels of use and report history of use. However where a license manager is not
installed, or in cases where the software vendor may not believe or want verification of
actual use it is not easily verified.
System scanning using signatures of application use that can verify or infer using
evidence of application use that a license is or is no longer in use. For example
Microsoft Office* when installed creates certain registry entries and .exe, .dll files. This
is a signature of installation.If configuration changes are made these changes and the
date these changes were made are identifiable using time date stamps and registry
history. If .doc files or internal temporary files are created these are also evidence. The
last date of creation can be used as an indicator of use. Successive scans run over time
can confirm sporadic use or disuse. These metrics can be aggregated and reported as
evidence of usage for licensing negotiations.
*Microsoft Office is a trademark of the Microsoft Corporation