Select Integration Task

Select the task you want to perform.

Protect Code and Enforce Licensing

Select this option to apply the shell protection (wrapper) method to protect your application against illegal copy, and protect the code against tampering and reverse engineering.

 

The shell protection provides copy protection by enforcing the application to detect the Key, which ties it to a specific computer or USB License Key. In addition, it provides code protection by employing techniques including code encryption, anti-debugging/anti-tracing, and anti-tampering.

Protect Code only

Select this option to apply the shell protection (wrapper) method to protect the code of your application against tampering and reverse engineering. The shell protection provides code protection by employing techniques including code encryption, anti-debugging/anti-tracing, and anti-tampering.

 

If you use the KeyCheck API to integrate the software protection and licensing system into your application, it is recommended to use this option to protect your code, and to enhance the security of your application.

Create System Image for Instant KeyCheck API

Select this option if you want to use the Instant KeyCheck API to integrate the software protection and licensing system into your application. You can specify the protection settings and options, which are then dumped and saved as an encrypted binary file (.SIF). The generated SIF file is the needed parameter for the Instant KeyCheck API.

Generate Initiate Codes for KeyCheck API

Select this option if you want to use the KeyCheck API to integrate the software protection and licensing system into your application. You can specify the protection settings and options to generate the initiate codes, including InitLicenseKey and KeyValueCode.

 

InitLicenseKey contains initial properties (including Key Properties). It is the needed parameter when implementing Machine License and Mobile License. The KeyCheck API uses it to create the Harddisk Key when the protected application is started for the first time.

 

KeyValueCode contains the 10 key-value pairs. Using the KeyCheck API, you can increase security of the application by using KeyValueCode to create a series of random challenge-response authentication from the application to the Harddisk Key, USB License Key, or Mobile Key.

Build End-User Utilities for Network Key

Select this option to build the end-user utilities for Network Key, which include the Register, Transfer, Remake, and Destroy utility programs.

 

The Register utility must be provided to the user (or administrator) for installing the network license on the server. The Transfer, Remake, and Destroy are optional that allow the user to transfer, remake, and destroy the network license, respectively.