The Key system is the technology to exploit the unique characteristics
of devices (or called hardware signatures) to create the unique, uncopyable
protection Key. While the protected application is enforced to detect the Key,
it essentially ties the application to the Key device. In addition, the Key
system also holds the properties that define the license or limits of the
application. The Key system supports several types of devices, including
computer, USB flash drive, and mobile device. Hence, it allows you to implement
the software protection as Machine License, USB License, and Mobile License,
respectively.
Technically, the Key system is implemented as a hidden system directory
consisting of encrypted files. To safeguard against hacking attempts, several
tamper proofing techniques and algorithms are employed in both the Key and the
software protection system. Any action to backup, copy, or modify the Key will
cause it to be seen as corrupted. As a result, the protected application will
be non-functioning and a remake of the Key will be needed.
See Also