Softlok 2
Bookmark or share

Bookmark Digg Reddit Del.icio.us Ma.gnolia Stumble Upon Facebook Twitter Google Yahoo! MyWeb Furl" BlinkList Technorati Mixx Windows Live

Please login
Username

Password

Keep me logged in


Forgot your password?
Shop securely on our site



Softlok 2

How does it work?
Softlok 2 keys contain a 240 byte password protected read/write data area that can be accessed from a protected software application. The software application can verify and use this data as required. The simplest method is to stop execution if the key is not present or valid but the flexibilty of the design allows protection and license control to be implemented within the application in many ways. An easy to use API can be incorporated into most 32 bit Windows applications.

tokens

Typical protection and license control scenarios include:

  • Counters
  • License Expiry
  • Module Control
  • Software Leasing
  • Usage Metering
  • Distribution Authorization
  • Field Upgrades
  • Network License Control

<<Previous     Continue>>