HALLOGRAM PUBLISHING
SHOPPING CARTSITE MAPCONTACT USPRODUCTS
HOMEBARCODESDEVELOPER TOOLSUSER TOOLSTRAINING
Softlok

logo.jpg

token2.gif

Softlok 2 keys have been designed to provide software developers with a secure and reliable solution to profit protection, license control and distribution authorization. Softlok 2 keys simply attach to the parallel printer port of the users IBM PC or compatible, without affecting printer operations. Although normally transparent in operation, if the key is removed, the software application will not execute. It is simple and secure while still allowing the user to make backups. A network version, NetSoftlok 2, is also available that can ensure the licensing requirements of network software.

Softlok 2 keys utilize our proprietary ASIC chip to produce a small and low power unit. These keys contain a password-protected data area utilised from within the software application. The reliability, ease of use and sensible pricing of the product is proven by our ever increasing client list of both small and multinational companies.

How can we protect our software?
The flexible design of the Softlok 2 key allows it to be used in many sophisticated ways. The table below shows some examples on how to implement that protection:

  • Counters
  • License expiry
  • Software module control
  • "Pay as you use" software
  • Usage metering
  • Distribution authorisation
  • Field upgrades etc.
  • Network license control

How are the keys programmed?
Softlok 2 keys are easy to implement into your applications using drivers supplied for use with most compilers. The software developer can program the keys as required with our user friendly software, Keybase. Individual keys or common key configurations can be stored in the custom database thus reducing programming time and effort. Unlike some other keys, both the password and the data can be changed later from your protected application software.

Once the protection is incorporated into the application, the developer simply includes a programmed Softlok 2 key with each package sold.

Protecting your software with the Softlok 2 is both straightforward and a cost effective solution.

sckeybase.gif

Excellent support software provided


Softlok 2 Technical Overview

The Softlok 2 key contains 240 bytes of secure memory. Access to this memory for reading or writing is only possible with the correct password. This password is user definable and consists of 8 bytes (64 bits).

To access the key from your application the following Softlok 2 API calls are provided:
  • Read Data
    Reads data from the non-volatile memory. Requires the password.
  • Write Data
    Writes data to the non-volatile memory. Requires the password.
  • Read ESN
    Reads the unique electronic serial number built into every Softlok 2 key. Requires the password.
  • Change Password
    Changes the password. Requires the existing password.

These four functions are all that are needed to implement the kind of protection you want.

As there are no hardwired passwords, no fixed algorithms, and no constant method of removing the Softlok 2 protection from your software, implementation is both swift and secure.

About the Softlok 2 routines
The routines provided by us are in the form of a small object file or a dynamic link-library, so they are easy to incorporate into your project. The complexity of key access is hidden by the use of the simple API consisting of just four functions. Device drivers are supplied for Windows 95, 98 and NT along with sample installation code. The drivers are dynamically loading and do not require re-booting after installation. Implementing Softlok 2 protection is simple and straightforward.

Compiler/Language (Win NT, Win 95 & Win 98)

  • Microsoft Visual C/C++ 6.0
  • Microsoft Visual C/C++ 5.0
  • Microsoft Visual C/C++ 4.2
  • Microsoft Visual Basic 6.0
  • Microsoft Visual J++ 6.0
  • Microsoft Visual FoxPro 6.0
  • Microsoft Access 97
  • Microsoft Word 97
  • Microsoft Excel 97
  • Borland C/C++ Builder 4.0
  • Borland C/C++ Builder 3.0
  • Borland C/C++ Builder 2.0
  • Borland C/C++ Builder 1.0
  • Borland C/C++ 5.0
  • Borland Delphi 5.0
  • Borland Delphi 4.0
  • Borland Delphi 3.0,
  • Borland J++ Builder 3.0
  • Paradox 8.0
  • Generic 32 bit DLL

These are the commonly used compilers. We also support many more obscure compilers/languages.

Keybase -- The Support Software
Keybase can be used to program the Softlok 2 key's initial contents, both data area and password. The custom database supports a user hierarchy allowing three different modes of operation: administrator, programmer & production. These modes have various access rights to key access and database management.

With these features you can create a database for your product range utilising Softlok 2 protection. If you have distributors for your software, they may initialise the keys to your specification, but cannot view or modify the password and data on the key, or the database itself.

NetSoftlok 2 -- The network version of Softlok 2
Softlok 2 keys are normally connected to the computer running the protected application. A netwrok version of Softlok 2, NetSoftlok 2, is also available allowing the key to be installed on a server to control and administer client licenses. Client machines can even access the NetSoftlok 2 via the internet if required.

Technical Specification

  • For IBM PC, PS/2 and compatibles
  • Support for Windows 95, 98 and NT
  • Uses parallel port
  • Transparent to printer and other parallel port devices
  • Cascadeable
  • User defineable 64 bit password
  • 240 bytes of nonvolatile secure memory
  • Dynamically loading device drivers
  • Network version available (TCP/IP support)
  • Data retention at least 40 years
  • Minimum of 100,000 write cycles per location (typically 1,000,000)
  • Unlimited read cycles
  • Memory read and write from protected application
  • Small size -- 45mm X 54mm X 16mm
  • CE compliant -- fully shielded design
  • Excellent documentation and support


Softlok
Softlok NetSoftlok 5 Users $69
Softlok NetSoftlok 10 Users $99
Softlok NetSoftlok 20 Users $129
Softlok NetSoftlok 50 Users $179
Softlok NetSoftlok 100 Users $229
Softlok NetSoftlok Unlimited Users $249


Home || Shopping Cart || Site Map || Newsletter/Blog
Search HALLoGRAM || Request More Information
CALL TOLL FREE 1-866-340-3404

SEARCH
14,500+ PRODUCTS:

Order Softlok

SIMILAR PRODUCTS
  • Security Components

  • OTHER PRODUCTS
  • Sitlok Website Security System

  • PRODUCTS FOR
  • MS-Access
  • ActiveX/OCX Controls
  • C/C++
  • Clipper
  • dBASE
  • Delphi
  • FoxPro/VFP
  • Java
  • Macintosh
  • Oracle
  • Paradox
  • PowerBuilder
  • Visual Basic
  • Visual Objects

  • Keystone Training Videos

  • Copyright �2000 HALLoGRAM Publishing, Aurora CO. All Rights Reserved
    All products mentioned in this site are trademarks of their respective owners
    Prices are subject to change without notice
    dmcakegrim