Can a user copy the program to an identical PC and get a free license?

No. CrypKey SDK or Instant is hardware-locked using our “Clone Buster” technology to ensure there is an unchangeable difference between two computers with identical hardware. This is further enhanced using a signature with a random coding marker when the software is activated on a host PC.

Can I add time or runs to a license?

Yes. The Site Key Generator (SKG) has the intelligence to identify whether the user’s site code is from a time-or-run-limited license. If it is, you can increment the clock or counter by an amount you specify using the Add_to_Exisiting_License. A lease could be extended by two months or 50 runs, for example, without determining the previous authorization limit.

Won’t our customers be annoyed when they have to contact us?

No. CrypKey users regularly tell us that not only is it not a problem, it’s a great added benefit. When your customers call you for authorization, they’re ready to purchase the product and this is the ideal time to walk them through its operation and sell the product. They will appreciate your assistance. Customers are usually very happy with phone contact and relieved that they don’t have yet another dongle to worry about. Also you can turn on features at the time of authorization that will help you sell more features than originally ordered. If you really don’t want the phone contact, use fax or email to exchange the alphanumeric site code and site key. It doesn’t matter if you are not immediately available to return the site key, since the next time the user turns on his or her computer, the site code will be the same as the last time (for a single authorization). The site key you give the user will be valid, even if he or she gets it a week later. If you are interested in automating this licensing process, please take a look at Casper. Inexpensive automated hosting packages using Casper are available or you can purchase the server software to host Casper yourself. If you require a customized or integrated licensing process our Site Key Generator Library can be used to by your development staff to accomplish this.

Can I de-authorize an authorized license?

Yes. There is a unique feature (called “Kill License”) which can be invoked in the event that a user is known to be violating the terms of an agreement with you or if he/she decides to return your software after unlimited authorization has been granted. If the user chooses to kill the license of the software, they will be issued a code that they need to transmit to you. Once the user has transmitted that code, you can enter it into the SKG and press “check”. This will give confirmation that the license has indeed been removed.

Can a user move a license to another PC?

Yes. Using a USBKey or a place on the network, a simple transfer process effectively authorizes the target computer after first disabling the license on the source computer. Duplication of the transfer USBKey is irrelevant, since the new authorization is unique to the target computer.

How do CrypKey products handle product update releases?

By default, once the software is authorized, your customer can simply install the new version over the old and the software will continue to work with the existing license. You also have the option of requiring a new authorization.

How do I know whom I have authorized?

CrypKey’s Site Key Generator keeps a log file of your authorizations that is appended with every authorization. It records the time, date, side code/key and the nature of the authorization. Some CrypKey users use if for following up with trial customers because it is a complete chronological summary of contact with the best quality leads. For more sophisticated tracking of licensing check out the the Casper eRegister (web activation server product)

Which parts of a computer does CrypKey use to uniquely identify it?

CrypKey Intelligent Hardware Sensing (CIHS) is a complex, stable and robust system that locks the license you provide to your customer to the Windows PC it is installed on. CIHS initially surveys up to 7 hardware identifiers on the customer’s PC. Based on those hardware numbers a mathematical calculation is performed and a resultant “locking code” becomes the lock for your software. A built-in tolerance factor allows your customer to make minor changes to the hardware without impacting the license while stopping major hardware changes such as copying to other computers.

How do I decide which CrypKey product is right for me?

Instant Offers Basic Protection. Generally, if you want to have a simple “Run/Don’t Run” check and perhaps also offer a “Ready-To-Try” program on your website, CrypKey Instant is all you need. The primary advantage of CrypKey Instant is it’s quick to implement. The protection process takes only minutes and there is no need to re-compile the executable. CrypKey Instant takes care of the interface, logic and control. All you need do is run it on your software and it outputs a protected executable with automatic installation. You are not required to write code, make calls to CrypKey’s libraries.and there is no need to access the source code. SDK Provides Greater Control. If you require more control and integration in the inner workings of your program, CrypKey SDK is the right choice. The primary advantage of CrypKey SDK is its flexibility. CrypKey SDK lets you control what CrypKey does and when it does it, based on your own program requirements. For example, you will need CrypKey SDK if you want to meter the use of a calculation within the program. Or you may want to make the security interface seamlessly consistent with the rest of your program. If you expect your software to be targeted by hackers, you will want as much security as CrypKey can provide. CrypKey Instant and CrypKey SDK include CrypKey Stealth.