Century Longmai – Digital Security Logo Century Longmai – Digital Security Retina Logo Century Longmai – Digital Security Sticky Logo Century Longmai – Digital Security Sticky Logo Retina
  • PRODUCTSLongmai product portfolio
    • mToken PKI Authentication
      • mToken CryptoID-FIPS Token
      • mToken K1-HID Token
      • mToken K2-CCID Token
      • mToken K3-Auto Plug & Play Token
      • mToken K5-Mobile PKI Token
      • mToken K9-Bio Token
      • mToken UKey
      • mToken TF-Smart Card MicroSD
    • mLock Software Protection
      • mLock X1-Smart STD
      • mLock X3–Smart Code
      • mLock X5-Supporting Linux OS
      • mLock Smart UDisk
      • mLock Time
    • mOTP Authentication Token
      • mOTP m100
      • mOTP m200
      • mOTP m300
    • meDocs e-Document Management
      • meDocs-M
      • meDocs-P
    • mCard Smart Card
      • mCard CPK
      • mCard JavaCard
    • mReader Smart Card Reader
      • mReader W100
    • mFIDO FIDO Authentication
      • mFIDO U2
      • mFIDO U4
    • mNFC NFC Readers
      • mNFC N100
      • mNFC N200
  • SOLUTIONS & SERVICES
    • Identity & Access
      • Access Control
      • License Control
      • mCard CPK solution
      • Online IA
    • Government
      • eDocument Security
      • eHealthCare
      • Online Gaming Security
      • Wireless Digital Signature
    • Financial
      • eBanking
      • eCommerce
      • Mobile Payment
    • Personal e-Document Security
    • ODM/OEM Services
  • ABOUT US
    • Who We Are
    • What We Do
    • Who We Work With
    • Contact Info
    • Corporate Program
    • Jobs/Careers
    • FAQs
    • Press Release
    • Technologies
      • Bluetooth LE
      • BYOD
      • Cryptography
      • Glossary Terms
      • mCard Java Card
      • Internet of Things
      • One Time Password
      • Other Technologies
  • PRODUCTSLongmai product portfolio
    • mToken PKI Authentication
      • mToken CryptoID-FIPS Token
      • mToken K1-HID Token
      • mToken K2-CCID Token
      • mToken K3-Auto Plug & Play Token
      • mToken K5-Mobile PKI Token
      • mToken K9-Bio Token
      • mToken UKey
      • mToken TF-Smart Card MicroSD
    • mLock Software Protection
      • mLock X1-Smart STD
      • mLock X3–Smart Code
      • mLock X5-Supporting Linux OS
      • mLock Smart UDisk
      • mLock Time
    • mOTP Authentication Token
      • mOTP m100
      • mOTP m200
      • mOTP m300
    • meDocs e-Document Management
      • meDocs-M
      • meDocs-P
    • mCard Smart Card
      • mCard CPK
      • mCard JavaCard
    • mReader Smart Card Reader
      • mReader W100
    • mFIDO FIDO Authentication
      • mFIDO U2
      • mFIDO U4
    • mNFC NFC Readers
      • mNFC N100
      • mNFC N200
  • SOLUTIONS & SERVICES
    • Identity & Access
      • Access Control
      • License Control
      • mCard CPK solution
      • Online IA
    • Government
      • eDocument Security
      • eHealthCare
      • Online Gaming Security
      • Wireless Digital Signature
    • Financial
      • eBanking
      • eCommerce
      • Mobile Payment
    • Personal e-Document Security
    • ODM/OEM Services
  • ABOUT US
    • Who We Are
    • What We Do
    • Who We Work With
    • Contact Info
    • Corporate Program
    • Jobs/Careers
    • FAQs
    • Press Release
    • Technologies
      • Bluetooth LE
      • BYOD
      • Cryptography
      • Glossary Terms
      • mCard Java Card
      • Internet of Things
      • One Time Password
      • Other Technologies

Software License Protection

There are mainly two ways to protect your IP from misuse:

  1. Hardware-based protection – a hardware device is integrated with software and used to protect and license an application.
  2. Software-based protection – a software license key, number or password is input or generated by the user’s computer to protect and license an application.

Hardware-based protection uses a physical device such as mLock dongle key. To implement, the dongle’s firmware is integrated with the software. Afterwards, the software only runs if the dongle is physically present on the computer or machine. Additionally, the dongle controls how the end-user actually uses the software, referred to as software licensing. Whether it’s time or usage-based restrictions or limiting the modules and features available, the end-user’s access is managed and enforced by the dongle. Industry experts agree that hardware-based protection provides superior security since a physical piece of hardware has to be bypassed to misuse the software.

 

mLock Software Protection Dongle against software license piracy

If you are a software developer or distributor and want to survive in today’s competitive software market, then, ensuring software code and license protection is no longer optional. The future of software delivery is clear.

Are you looking for a solid cost effective yet easy to implement software piracy protection solution? mLock is your answer! Longmai mLock is an advanced smart card chip based and USB dongle technology dedicated for Software Piracy Protection against the Top Piracy Threats in the Industry. The driverless technique is applied to mLock model to provide an intuitive user experience while enforcing software licensing protection. You can use our mLock, the proven hardware dongle solution for copy protection to integrate USB device for anti-piracy.

 

Other Benefits of Usng mLock

  • Greater Security for Your Intellectual property (IP)- External hardware devices provide an indisputable increase in security as the dongle firmware is integrated with application software. The security algorithms run on dongle chip, instead of the computer’s memory.
  • Flexible Licensing- Your customers demand flexibility in their software licensing options. mLock dongles accommodate virtually unlimited creativity in implementing product licensing. Using the device’s memory, it is simple to establish and enforce licenses based on usage, number of users, features, modules, etc.
  • Fast and Easy Implementation – Implementing Longmai’s security dongles is simple and time saving. We provide sample code and a comprehensive API. All communication with our API is conducted via links to object files or DLLs. Integrating our API calls into your code is easy to accomplish yet delivers powerful security results without degrading your application performance.
  • Dongle Portability – Today end-users are more mobile than ever. mLock dongles (particluary mini dongle) is highly portable, giving the end-users the unlimited flexibility to move between computers and geo-locations. End user can install software on multiple machines (supports for cross-platform OS) without violating the licensing agreement since the software won’t run without the dongle present.

 

Related Links

  • Compare our mLock Product Models

Century Longmai mLock is your first or next step for licensing solution that offers you a hardware-based license delivery, locking, and management solution at reduced total costs.

Несколько раз в своей работе мне довелось защищать программное обеспечение от несанкционированного использования. Это были наукоемкие приложения с большим количеством вычислений. Защищал я такие приложения при помощи программируемых USB ключей, когда часть вычислительной логики переносилась в USB ключ. До этого имел дело с ключами SenseLock, Astroma и Guardant. Совсем недавно познакомился с ключами X-Pro3 китайской фирмы Longmai. Первое впечатление от ключей очень хорошее..
Viktar Marmysh, Prime Radiant in Minsk, Belarus
At Prime Radiant, we are tasked to protecting robust enterprise and government software applications from unauthorized use even on a daily basis. In most cases, we protect these software applications using programmable USB dongles through transferring part of the computational logic to the USB key. In contrast to SenseLock, Astroma and Guardant, software dongles from Longmai are 32-bit – greatly simplifies the process of transferring key arguments and receiving return values. In addition, the SDK supplied with Longmai dongle includes detailed documentation and various helpful tools to perform routine operations faster and effeciently.
Viktar Marmysh, Prime Radiant in Minsk, Belarus

Like this:

Like Loading...

Related

Share This Story, Choose Your Platform!

FacebookTwitterLinkedinGoogleplusEmail

Related Posts

  • We’re Exhibiting at GISEC Global 2025!

    April 28th, 2025 | 0 Comments
  • Longmai Technology be the first to start mToken FIPS 140-3 high security certification

    February 18th, 2024 | 3 Comments
  • Versasec Announces Support for Longmai mTokens

    June 23rd, 2018
Copyright © 2013 - Century Longmai. All Rights Reserved Privacy Terms | 中文网站
%d