Softlok 2
Bookmark or share

Bookmark Digg Reddit Ma.gnolia Stumble Upon Facebook Twitter Google Yahoo! MyWeb Furl" BlinkList Technorati Mixx Windows Live

Please login


Keep me logged in

Forgot your password?
Shop securely on our site

Softlok 2

How does it work?
Softlok 2 keys contain a 240 byte password protected read/write data area that can be accessed from a protected software application. The software application can verify and use this data as required. The simplest method is to stop execution if the key is not present or valid but the flexibilty of the design allows protection and license control to be implemented within the application in many ways. An easy to use API can be incorporated into most 32 bit Windows applications.


Typical protection and license control scenarios include:

  • Counters
  • License Expiry
  • Module Control
  • Software Leasing
  • Usage Metering
  • Distribution Authorization
  • Field Upgrades
  • Network License Control

<<Previous     Continue>>