Select the task you want to perform.
Select this option to apply the shell protection (wrapper) method to
protect your application against illegal copy, and protect the code against
tampering and reverse engineering.
The shell protection provides copy
protection by enforcing the application to detect the Key, which ties it to
a specific computer or USB License Key. In addition, it provides code
protection by employing techniques including code encryption,
anti-debugging/anti-tracing, and anti-tampering.
Select this option to apply the shell protection (wrapper) method to
protect the code of your application against tampering and reverse engineering.
The shell protection provides code protection
by employing techniques including code encryption, anti-debugging/anti-tracing,
and anti-tampering.
If you use the KeyCheck API to integrate the
software protection and licensing system into your application, it is
recommended to use this option to protect your code, and to enhance the
security of your application.
Select this option if you want to use the Instant KeyCheck
API to integrate the software protection and licensing system into your
application. You can specify the protection settings and options, which are
then dumped and saved as an encrypted binary file (.SIF). The generated SIF
file is the needed parameter for the Instant KeyCheck
API.
Select this option if you want to use the KeyCheck API to integrate the software protection and
licensing system into your application. You can specify the protection settings
and options to generate the initiate codes, including InitLicenseKey
and KeyValueCode.
InitLicenseKey contains initial properties
(including Key Properties). It is the needed parameter when implementing
Machine License and Mobile License. The KeyCheck API
uses it to create the Harddisk Key when the protected
application is started for the first time.
KeyValueCode contains the 10 key-value
pairs. Using the KeyCheck API, you can increase
security of the application by using KeyValueCode to
create a series of random challenge-response authentication from the
application to the Harddisk Key, USB License Key, or
Select this option to build the end-user utilities for Network Key,
which include the Register, Transfer, Remake,
and Destroy utility programs.
The Register utility must be provided to the user (or administrator)
for installing the network license on the server. The Transfer, Remake, and Destroy
are optional that allow the user to transfer, remake, and destroy the network
license, respectively.