Key System

The Key system is the technology to exploit the unique characteristics of devices (or called hardware signatures) to create the unique, uncopyable protection Key. While the protected application is enforced to detect the Key, it essentially ties the application to the Key device. In addition, the Key system also holds the properties that define the license or limits of the application. The Key system supports several types of devices, including computer, USB flash drive, and mobile device. Hence, it allows you to implement the software protection as Machine License, USB License, and Mobile License, respectively.

 

Technically, the Key system is implemented as a hidden system directory consisting of encrypted files. To safeguard against hacking attempts, several tamper proofing techniques and algorithms are employed in both the Key and the software protection system. Any action to backup, copy, or modify the Key will cause it to be seen as corrupted. As a result, the protected application will be non-functioning and a remake of the Key will be needed.

See Also

·         Key and License Types

·         Structure of the Key