1. A method of limiting access to the capabilities of software, hardware and firmware of an electronic device for the protection of intellectual 's rights, wherein the electronic device is turned off, if the electronic device microprocessor detects that an electronic device in which it is installed, there is no electronic hardware key, giving him a signal to continue operation of the electronic device, despite the fact that the dongle contains the operating system, which controls the electronic device controlling the electronic device all electronic computing processes and files, which interact with the electronic computing processes, despite the fact that control is to determine what can be given file and computing process they produced and what is not; files are objects of protection of the inventive method for the violations of intellectual property rights contained on the server that also contains data on all electronic key works by the claimed process, despite the fact that these files are distributed to customers in an encrypted vide.2. A method according to Clause 1, characterized in that the claimed method involves the use of at least one server that contains the files for protecting the inventive method, despite the fact that from the server containing the files, files are distributed to customers over the Internet in encrypted vide.3. The method of claim. 1, characterized in that each electronic key used by the claimed process is assigned a unique identification number applied external to the housing Electrical
展开▼