QLM can track illegal computers that connect to the web service and logs information about these computers in the database. An illegal computer is defined as a computer that has a valid license key but whose license key is (a) not in the database or (b) in the database but registered for another computer. This situation can occur if a user with a valid license key requests that his license be released from computer A claiming to have uninstalled your program from computer A or claiming that computer A crashed. If the user subsequently attempts to connect to the web service via computer A, QLM detects this computer as an illegal computer and logs it in the database.
There are two ways to enable illegal computers detection in your application:
- The QLM API (in QlmLicenseLib.dll) includes a new method called IsIllegalComputer to detect illegal computers. This method should be ideally be called every time your application is launched.
- The QlmCustomerSite portal provides a web page that your application can connect to by invoking a url. For example:
is_avkey specifies the user's activation key
is_cpkey specifies the user's computer bound key
is_cpid specifies the unique computer identifier
is_cpname specifies the computer name
is_qlmversion specifies the version of the QLM engine
When your application is launched, connect to the page above to display license information to your end user. In addition to providing licensing information to the user, this page will detect illegal computers and log them in the database. The QlmCustomerSite portal can be found in the DeployToServer folder. The deployment procedure for this portal is identical to the one for the QLM web service. If you have installed the QLM web service using the setup program qlmwebsvcsetup.exe, then the QlmCustomerSite is already deployed on your server.
To view illegal computers, click on the Manage Keys tab then select the Illegal Computers button.
Note that QLM does not prevent users from running your application if an illegal computer is detected. Once you call the IsIllegalComputer function and determine that the computer is not authorized, you can take whatever action you deem appropriate in your application, such as exiting your application.