FEATURES
- Software-based protection - licence files are bound to machine's unique digital fingerprint.
- Each product uniquely identified and individually protected - protected applications cannot be activated by third parties.
- Distribute your unregistered products as time limited trials or feature limited demos.
- Day metering, unit metering, expiration control, feature control, network user control.
- Distribute licence activation keys via telephone, fax, email or via the web.
- Sheriff Licence Generator app gives complete control over licence policy - floating network licences or locked to specific machine, exportable/non-exportable keys, movable/immovable licence files, reusable/one-time licence key.
- Licence keys are managed using Sheriff Licence Administrator application. Administrator enables users to monitor network users, export licences temporarily, move licence files permanently, license new products or re-license existing products (if publisher permits).
- Full-featured API with over two dozen functions. Incorporate functionality of Generator and/or Administrator in your app via Sheriff API and Extended API.
- Version and feature access control - enables different program features to be activated.
- 'Publisher data' enables you to store your own data with the licence key.
- Sheriff ISR enables customised licence key distribution from a web site via ASP, providing automatic or manual licensing options.
- Protection can be implemented via traditional Windows DLL, ActiveX control or static library.
- Demos for Visual C++ and Visual Basic.
- Security measures include encrypted licence key & database, encrypted communications channels, system clock verification, anti-debug and anti-spoofing, API challenge functions.
- Can be used on any network regardless of network type or protocol.
- Floating network licences up to permitted maximum or restrict access to just one machine ('standalone' licence).
- Automatic reclaim of inactive network licences.
- Verify termination procedure - ensure that user has terminated an existing licence.
- Status verification prior to issuing a new key - ensures new key is installed on the same machine.
- Publisher and user activities recorded to local log files. Comments can be appended to publisher's log.
- Not affected by defragmentation tools.
- A single, royalty-free payment for each product you need to protect.
- Unlimited evaluation period.
- Software-based protection - licence files are bound to machine's unique digital fingerprint.
- Each product uniquely identified and individually protected - protected applications cannot be activated by third parties.
- Distribute your unregistered products as time limited trials or feature limited demos.
- Day metering, unit metering, expiration control, feature control, network user control.
- Distribute licence activation keys via telephone, fax, email or via the web.
- Sheriff Licence Generator app gives complete control over licence policy - floating network licences or locked to specific machine, exportable/non-exportable keys, movable/immovable licence files, reusable/one-time licence key.
- Licence keys are managed using Sheriff Licence Administrator application. Administrator enables users to monitor network users, export licences temporarily, move licence files permanently, license new products or re-license existing products (if publisher permits).
- Full-featured API with over two dozen functions. Incorporate functionality of Generator and/or Administrator in your app via Sheriff API and Extended API.
- Version and feature access control - enables different program features to be activated.
- 'Publisher data' enables you to store your own data with the licence key.
- Sheriff ISR enables customised licence key distribution from a web site via ASP, providing automatic or manual licensing options.
- Protection can be implemented via traditional Windows DLL, ActiveX control or static library.
- Demos for Visual C++ and Visual Basic.
- Security measures include encrypted licence key & database, encrypted communications channels, system clock verification, anti-debug and anti-spoofing, API challenge functions.
- Can be used on any network regardless of network type or protocol.
- Floating network licences up to permitted maximum or restrict access to just one machine ('standalone' licence).
- Automatic reclaim of inactive network licences.
- Verify termination procedure - ensure that user has terminated an existing licence.
- Status verification prior to issuing a new key - ensures new key is installed on the same machine.
- Publisher and user activities recorded to local log files. Comments can be appended to publisher's log.
- Not affected by defragmentation tools.
- A single, royalty-free payment for each product you need to protect.
- Unlimited evaluation period.