Softlok 2

How does it work?
Softlok 2 keys contain a 240 byte password protected read/write data area that can be accessed from a protected software application. The software application can verify and use this data as required. The simplest method is to stop execution if the key is not present or valid but the flexibilty of the design allows protection and license control to be implemented within the application in many ways. An easy to use API can be incorporated into most 32 bit Windows applications.

Typical protection and license control scenarios include:

  • Counters
  • License Expiry
  • Module Control
  • Software Leasing
  • Usage Metering
  • Distribution Authorization
  • Field Upgrades
  • Network License Control

<<Previous     Continue>>