FEATURES

  • Software-based protection - licence files are bound to machine's unique digital fingerprint.
  • Each product uniquely identified and individually protected - protected applications cannot be activated by third parties.
  • Distribute your unregistered products as time limited trials or feature limited demos.
  • Day metering, unit metering, expiration control, feature control, network user control.
  • Distribute licence activation keys via telephone, fax, email or via the web.
  • Sheriff Licence Generator app gives complete control over licence policy - floating network licences or locked to specific machine, exportable/non-exportable keys, movable/immovable licence files, reusable/one-time licence key.
  • Licence keys are managed using Sheriff Licence Administrator application. Administrator enables users to monitor network users, export licences temporarily, move licence files permanently, license new products or re-license existing products (if publisher permits).
  • Full-featured API with over two dozen functions. Incorporate functionality of Generator and/or Administrator in your app via Sheriff API and Extended API.
  • Version and feature access control - enables different program features to be activated.
  • 'Publisher data' enables you to store your own data with the licence key.
  • Sheriff ISR enables customised licence key distribution from a web site via ASP, providing automatic or manual licensing options.
  • Protection can be implemented via traditional Windows DLL, ActiveX control or static library.
  • Demos for Visual C++ and Visual Basic.
  • Security measures include encrypted licence key & database, encrypted communications channels, system clock verification, anti-debug and anti-spoofing, API challenge functions.
  • Can be used on any network regardless of network type or protocol.
  • Floating network licences up to permitted maximum or restrict access to just one machine ('standalone' licence).
  • Automatic reclaim of inactive network licences.
  • Verify termination procedure - ensure that user has terminated an existing licence.
  • Status verification prior to issuing a new key - ensures new key is installed on the same machine.
  • Publisher and user activities recorded to local log files. Comments can be appended to publisher's log.
  • Not affected by defragmentation tools.
  • A single, royalty-free payment for each product you need to protect.
  • Unlimited evaluation period.