


Softlok 2 keys have been designed to provide software
developers with a secure and reliable solution to profit
protection, license control and distribution authorization.
Softlok 2 keys simply attach to the parallel printer port
of the users IBM PC or compatible, without affecting
printer operations. Although normally transparent in
operation, if the key is removed, the software application
will not execute. It is simple and secure while still
allowing the user to make backups. A network version,
NetSoftlok 2, is also available that can ensure the
licensing requirements of network software.
Softlok 2 keys utilize our proprietary ASIC chip to produce a small and low power
unit. These keys contain a password-protected data area utilised from within the
software application. The reliability, ease of use and sensible pricing of the product is
proven by our ever increasing client list of both small and
multinational companies.
How can we protect our
software?
The flexible design of the Softlok 2 key allows it to be used in many sophisticated
ways. The table below shows some examples on how to implement
that protection:
- Counters
- License expiry
- Software module control
- "Pay as you use" software
- Usage metering
- Distribution authorisation
- Field upgrades etc.
- Network license control
How are the keys programmed?
Softlok 2 keys are easy to implement into your applications using drivers supplied for
use with most compilers. The software developer can program the keys as required
with our user friendly software, Keybase. Individual keys or common key
configurations can be stored in the custom database thus reducing programming
time and effort. Unlike some other keys, both the password and the data can be
changed later from your protected application software.
Once the protection is incorporated into the application, the developer simply
includes a programmed Softlok 2 key with each package sold.
Protecting your software with the Softlok 2 is both straightforward and a cost effective
solution.
Excellent support software provided
Softlok 2 Technical Overview
The Softlok 2 key contains 240 bytes of secure memory. Access to this memory for
reading or writing is only possible with the correct password. This password is user
definable and consists of 8 bytes (64 bits).
To access the key from your application the following Softlok 2 API calls are
provided:
- Read Data
Reads data from the non-volatile memory. Requires the
password.
- Write Data
Writes data to the non-volatile memory. Requires the
password.
- Read ESN
Reads the unique electronic serial number built into every
Softlok 2 key. Requires the password.
- Change Password
Changes the password. Requires the existing password.
These four functions are all that are needed to implement the kind of protection you
want.
As there are no hardwired passwords, no fixed algorithms, and no constant method
of removing the Softlok 2 protection from your software, implementation is both swift
and secure.
About the Softlok 2 routines
The routines provided by us are in the form of a small object file or a dynamic
link-library, so they are easy to incorporate into your project. The complexity of key
access is hidden by the use of the simple API consisting of just four functions.
Device drivers are supplied for Windows 95, 98 and NT along with sample installation
code. The drivers are dynamically loading and do not require re-booting after
installation. Implementing Softlok 2 protection is simple and
straightforward.
Compiler/Language (Win NT, Win 95 &
Win 98)
- Microsoft Visual C/C++ 6.0
- Microsoft Visual C/C++ 5.0
- Microsoft Visual C/C++ 4.2
- Microsoft Visual Basic 6.0
- Microsoft Visual J++ 6.0
- Microsoft Visual FoxPro 6.0
- Microsoft Access 97
- Microsoft Word 97
- Microsoft Excel 97
- Borland C/C++ Builder 4.0
- Borland C/C++ Builder 3.0
- Borland C/C++ Builder 2.0
- Borland C/C++ Builder 1.0
- Borland C/C++ 5.0
- Borland Delphi 5.0
- Borland Delphi 4.0
- Borland Delphi 3.0,
- Borland J++ Builder 3.0
- Paradox 8.0
- Generic 32 bit DLL
These are the commonly used compilers. We also support many more obscure
compilers/languages.
Keybase -- The Support Software
Keybase can be used to program the Softlok 2 key's initial contents, both data area
and password. The custom database supports a user hierarchy allowing three
different modes of operation: administrator, programmer & production. These modes
have various access rights to key access and database
management.
With these features you can create a database for your product range utilising
Softlok 2 protection. If you have distributors for your software, they may initialise the
keys to your specification, but cannot view or modify the password and data on the
key, or the database itself.
NetSoftlok 2 -- The network version of
Softlok 2 Softlok 2 keys are normally connected to the computer running the protected
application. A netwrok version of Softlok 2, NetSoftlok 2, is also available allowing the
key to be installed on a server to control and administer client licenses. Client
machines can even access the NetSoftlok 2 via the internet if required.
Technical Specification
- For IBM PC, PS/2 and compatibles
- Support for Windows 95, 98 and NT
- Uses parallel port
- Transparent to printer and other parallel port devices
- Cascadeable
- User defineable 64 bit password
- 240 bytes of nonvolatile secure memory
- Dynamically loading device drivers
- Network version available (TCP/IP support)
- Data retention at least 40 years
- Minimum of 100,000 write cycles per location (typically 1,000,000)
- Unlimited read cycles
- Memory read and write from protected application
- Small size -- 45mm X 54mm X 16mm
- CE compliant -- fully shielded design
- Excellent documentation and support
Home ||
Shopping Cart ||
Site Map ||
Newsletter/Blog
Search HALLoGRAM ||
Request More Information CALL TOLL FREE 1-866-340-3404
|