Wednesday, February 25, 2009

Do You Think An Economic Downturn Will Increase Software Piracy And Illegal Use?


Grow Your Business with UniKey Time – the #1 driverless real Time software dongle (Software Protection & Licensing Solution ) on the Market.


Software Protection with UniKey Time hardware key (software dongle)
A real-time clock inside key for strong software protection,
video protection and content protection.

UniKey Time is specially designed for software vendors who needs to control and manage the software’s rental and selling in subscription or maintenance, it allows to pay per use, in this way software vendors can completely control the sales by charging the end users timely and periodically. This function is based on a real time clock deposited in the dongle indicating the specific time (hour, minute, second) and date (day, month, year).

Technical Specifications – UniKey Time
Security
********************************************************************
Unique ID 32-bit
User-defined algorithms 128 instructions
Hardware ID/SN Globally Unique Hardware ID
Password Convenient Password Generation Scheme
Software ID Hardware key User-Defined Software ID
UpdateTag 32 bits Tag for Remote Update
Network Function Accept upto 65535 remote access
Support Black/White list / Floating License
Suppot WinXP firewall / Subnet crossing enabled

Protection
*******************************************************************
Enveloper Protection
APIs Protection
Flash Protection with Enveloper
Video Protection with UniKey Video Protector
Utility Zero Configuration
Remote Update / Assist Tool / UniKey Tutor / UniKey Bunner
Cook-books / SDK

Supported licensing Models
****************************************************************
License module 64 license modules
Perpetual YES
Feature-based YES
Pay-per-use YES
Custom YES
Time-Based YES
Timing functions
Real time clock YES
Timing license module 16
Expiration function YES
Execution timing function YES
On-key clock counts date and time Y/M/D, H/M/S
Battery life 3 years warranty

Supported Platforms(Software vendor)
*****************************************************************
Supported programming languages 32 and 64-Bit
VB, VC, VFP, Delphi, BCB, PowerBuilder, LabView, WinDEV, Java, FileMaker,Clarion, Java, VS.Net, Fortran, Visual DataFlex and many more
Windows 98SE, NT, 2000, XP, 2003, Vista, (both 32-bit and 64 bit,),Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Development platforms supported Windows 98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,),Linux 2.2, 2.4 and on, MacOS X, FreeBSD

Supported Platforms(End-user)
*****************************************************************
Operating Systems supported Windows 98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,)
Linux 2.2, 2.4 and on, both 32-bit and 64bit, MacOS X, FreeBSD

Hardware Specification
******************************************************************
Memory 4K
Memory cell rewriters At least 1,000,000
Memory data retention At least 30 years
Max No. of features / applications enabled per key 64
Driver Driverless (HID device)
Physical specifications
Casing Metal Case
Default color Gray
Identification number① YES
Dimensions 57 X 16 X 8mm
Weight 9g
Min. Operating Voltage 5V
Current Consumption

Physical specifications
******************************************************************
Casing Metal Case
Default color Gray
Identification number① YES
Dimensions 57 X 16 X 8mm
Weight 9g
Min. Operating Voltage 5V
Current Consumption
# # #

SecuTech Solution Inc, the software security expert who provides UniKey software copy protection license control solution and free technical support or professional advise for customers.The UniKey dongle products(as known as USB hardware key, Security dongle, or software hardlock) act as the #1 driverless software copy protection dongle in the software industry.

Software Piracy , Software copy Protection & Security

SecuTech Solution Inc, the software security expert who provides UniKey software copy protection license control solution and free technical support or professional advise for customers.The UniKey dongle products(as known as USB hardware key)

What is Software Piracy?
Software piracy is the unauthorized duplication of computer software. Although most computer users today are aware that unauthorized use and duplication of software is
illegal, many show a general disregard for the importance of treating software as valuable
intellectual property.

According to the BSA (Business Software Alliance) and IDC 5th Annual Global Software
Piracy Study, revenue losses due to software piracy have increased and were nearly $48
billion in the year 2007.

Types of Software Piracy
Softlifting: purchasing a single licensed copy of software and loading it onto several
computers contrary to the license terms. For example, sharing software with friends, co-
workers and others.
Uploading and downloading: making unauthorized copies of copyrighted software available to end users connected by modem to online service providers and/or the Internet.
Software counterfeiting: illegally duplicating and selling copyrighted software in a form
designed to make it appear legitimate
OEM unbundling: selling standalone software that was intended to be bundled with specific

accompanying hardware
Hard disk loading: installing unauthorized copies of software onto the hard disks of
personal computers, often as an incentive for the end user to buy the hardware from that
particular hardware dealer
Renting: unauthorized selling of software for temporary use, like you would a video.

Why Protect Your Software?
Developing a software application involves a major investment of time, money and effort.
Software piracy (including illegal network licenses and unfulfilled upgrades) denies you
the revenue you deserve and harms your paying customers, who ultimately bear the cost of
illegal use of your products. Piracy limits your ability to be competitive, leading to higher-priced, less advanced products for your customers.

Intellectual Property Protection.
Strong intellectual property protection for software is an important part of any nation's eeconomic growth and development, and has numerous benefits:
Encourages individuals and businesses to create new software and new software
applications, as well as improving existing applications
Encourages an indigenous software industry
Ensures new ideas and technologies are widely distributed
Promotes investment in the national economy
Encourages technology transfers between nations
Increase your sales potential

With increased revenues, you are free to invest more in improving your product and
offering competitive prices, making it more accessible to a wider customer base.
UniKey, the Driverless dongle, reduces the huge work of technical support team for
software vendors.
Unikey has the lowest industry failure rates in the industry which is guaranteed with
lifetime warranty.
Unikey technical support team earns the highest rating of customer satisfaction in the
industry.
Unikey products cost about 50% less than others.

UniKey dongles are available in Four models for USB port to meet different requirements,
there are UniKey Time ( Real Time Version), UniKey PRO (Network Version ), UniKey STD
(Standalone Version), and UniKey Lite (Lite Version ).
UniKey Time is specially designed for software vendors who needs to control and manage the software''s rental and selling in subscription or maintenance , it allows to pay per use,
in this way software vendors can completely control the sales by charging the end users
timely and periodically. This function is based on a real time clock deposited in the
dongle indicating the specific time (hour, minute, second) and date (day, month, year).

The main difference between UniKey PRO and STD is that UniKey PRO can accept up to 65535 remote clients, while UniKey STD can only work with one remote client.

UniKey STD and UniKey PRO are two powerful software protection dongles (hardware key) with lifetime warranty, which has up to 4K bytes memory. The user-defined algorithm can easily have UniKey envloved with protected software and increase the security.

UniKey Lite is the compact version of UniKey dongle product. It is simple and easy to be
used. UniKey Lite has 1K bytes memory and One Year Warranty only.
SecuTech UniKey copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user''s USB port. The innovative design of these devices enabled them to be much easier and less expensive than those of our competitors.

Whether you are new to the idea of Dongle security or knowledgeable about the potential
benefits – SecuTech is your trusted partner delivering the right amount of protection for
you and your company.
How Do I get Free UniKey evaluation Kit?
If you are interested in evaluating our products, you may request a FREE SDK
simply by completing the application form via www.eSecuTech.com.


About SecuTech Solution Inc.
SecuTech Solutions Inc. is a company specializing in software license management business systems focusing on the international market with their class leading UniKey product range. Having an extensive and in-depth range of experience within the Software Management Licensing market, SecuTech has drawn upon this experience to utilize today's cutting-edge technologies to introduce a COMPLETE and affordable solution for today's software vendor markets worldwide.


SecuTech Solution Inc.
Sales@eSecuTech.com
www.eSecuTech.com
©2009 SecuTech Solution Inc. All rights reserved.
# # #

SecuTech UniKey (#1 Driverless (HID) dongle) copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user's USB port.

Tuesday, February 24, 2009

On hardware-based software licensing key (USB dongle hardware key for software license management)


On hardware-based software licensing key

Software license is that the software publisher grants a license to use one or more copies of software, but that ownership of those copies remains with the software publisher. One consequence of this feature of proprietary software licenses is that virtually all rights regarding the software are reserved by the software publisher. Only a very limited set of well-defined rights are conceded to the end-user.

Software License Types
Individual licenses
 Individual (Single-user): This license type allows the software to be used on only one computer which is not accessed by other users over a network. The other users are not allowed to use software while connected to your computer. Types of individual licenses are:
 Perpetual license: allows the customer to install and use the software indefinitely without any limitation.
 Subscription license: Allows the user to use the software for a specific time period. At the end of the term the user has several options: (1) renew the subscription; or (2) purchase a perpetual license at a discounted cost; or (3) remove the software from the computer.
 Trial license: Allows software venders to release the software for a period time like a month as marketing tool. The end user can only use this software for only one month.
 Evaluation license: This license allows the expensive software to be evaluated with certain period.
 Demo license: This license allows end users to demonstrate the software with partial function or certain period.
 Feature based license: This license allows end users to use partial function of the software to save money than to use the whole package.
 Time limited rental license: This allows the end user to pay per time. The end user pre-pay a period of time that fits their needs. The end user can also renew before the license expired.
 Concurrent Use: This license type requires the end users purchase licenses for the maximum number of people who will be running the software simultaneously. However, end users can usually install the software on more computers than
Network/Multi-user licenses
 Server (Network): Licensed per server – This license type requires that you have a single copy of the software residing on the file server
 Per Seat (Machine): Licensed per machine/seat – This license requires that you purchase a license for each client computer and/or device where access to services is needed. This license is typically used in conjunction with a network license.

Add-on’s to existing or new licenses
 Upgrade: This license is acquired when a user has a previously acquired software license and would like to move up to a newer version.
 Student use:This allows students to use the software as long as they are students of the institutions. Students are required to uninstall software upon leaving the University.
 Secondary use: Allows the licensed end user to use the software on a second computer.
 Work-at-home rights: Allows Facult/Staff to use software at home. This is effective for as long as the primary work computer is licensed and as long as the person is an employee. Termination of employment also terminates this benefit.
 Home use: Similar to Work-at-home rights

How hardware based software license key works?
In order to improve the relationships between vendors and customers as well as grow revenue, software pricing and licensing policies are made more flexible. Hardware keys are made to feature secure software licensing options and offers multiple licensing molds locked into the hardware key to supply flexible licensing protection. Such as HASP from Aladdin, Sentinel from Safenet, UniKey from SecuTech.

Hardware key or software protection dongle is the hardware-based protection and licensing management tool. It is a USB key with memory that protects software against piracy and illegal use by allowing access and execution of the protected software only when the key is connected to the computer.

The hardware keys provide licensing method with envelope-base automatic implementation and API-based automatic implementation.

The only thing that would make hardware key better for software license management is if there were an industry-standard way to store multiple software licenses on one physical dongle (and transfer them securely if need be). Public computers could have those software installed on them at no cost to the business providing the computer, but they would only work when someone presented a valid license via their dongle. And the end user would never have to think about moving the licenses to a new computer or losing valuable software when they dispose of the old one.


About SecuTech Solution Inc.

SecuTech Solutions Inc. is a company specializing in software license management business systems focusing on the international market with their class leading UniKey product range. Having an extensive and in-depth range of experience within the Software Management Licensing market, SecuTech has drawn upon this experience to utilize today's cutting-edge technologies to introduce a COMPLETE and affordable solution for today's software vendor markets worldwide

SecuTech Solution Inc.
info@eSecuTech.com
www.eSecuTech.com

UniKey API protection scheme ensures the highest security for software vendors.


UniKey API protection scheme ensures the highest security for software vendors.

A question that regularly was come up is whether software could be one hundred percent secured by a dongle, or thought some dongles have been seriously cracked, why most expensive software still use dongle as their software protection solution? The truth is, most developers used the easiest way-enveloper to encrypt the application, which is the least method to use a dongle to protect software. Actually UniKey API protection scheme is the right way to ensure the highest security for software vendors.

UniKey dongles are available in standalone, network and real time. Using a software developer’s kit, software developers can protect applications with the right hardware key by calling for the dongle’s presentation.

UniKey provides two methods of protection schemes, envelope and API. UniKey Enveloper is automatically wrap up a program with only a click by a mouse, it is the fast way to protect executable files without needing for the source and additional coding work,

To ensure the highest security, the API implementation is strongly recommended by SecuTech’s experience technology expert, Raymond Chaw, ‘we have been helping customers to integrate UniKey and their software successfully with API application, I hope that our work can help software vendors gain more on revenue and reputation’, said Raymond.

An API, or Application Programming Interface, is a set of routines that an application uses to work with the operating system, allows data and messages to be encoded or encrypted so they can be stored and transmitted securely. With the help of UniKey API, software developers can easily achieve strong software protection and produce complicated software protection schemes via various combinations of the UniKey APIs.

We provide abundant APIs to operate the UniKey dongle. All the APIs are implemented in a DLL/LIB file. In the SDK, software developers can find samples in various programming languages.

UniKey API is easy, secure and portable. If a DLL is required for development language, the appropriate DLL(s) can be copied to the same directory as the sample source code.


About SecuTech Solution Inc.

SecuTech Solutions Inc. is a company specializing in software license management business systems focusing on the international market with their class leading UniKey product range. Having an extensive and in-depth range of experience within the Software Management Licensing market, SecuTech has drawn upon this experience to utilize today's cutting-edge technologies to introduce a COMPLETE and affordable solution for today's software vendor markets worldwide

SecuTech Solution Inc.
info@eSecuTech.com
www.eSecuTech.com

Tuesday, February 17, 2009

Software protection and International Legal Protection for Software Chart

This report summarizes the legal protection available for computer software in most significant markets around the world as of June 2008. It also identifies changes in the availability of legal protection since the 2007 version of this report. The methods of protection covered are copyright, trademark, patent and contract.

The accompanying chart summarizes whether software is currently within the subject matter protected under the copyright or patent law of each country listed. Since the extent of copyright protection for a software work also depends on mutual membership in an international convention or a bilateral agreement, the chart identifies convention memberships. Certain bilateral agreements between the United States and other countries are identified as well. Thus, for both U.S. and foreign software, the current availability of subject matter protection in a particular country can be determined from the chart. Local counsel should be consulted, however, before distributing software in a particular market, to confirm and update this information and to advise on the practicality of enforcement, evidentiary considerations and other protection mechanisms.

Not all national laws or convention memberships provide retroactive protection for previously published or unpublished software, so the effective date of the law and the membership can be critical in determining whether a particular work is protected. Such issues of timing are beyond the scope of this report.

Summary

Although the availability of legal protection for software has increased rapidly around the world over the past fifteen years, the scope and the feasibility of enforcement of that protection continues to vary significantly by country. The use of the Special 301 provisions of the 1988 U.S. Trade Act has resulted in greater protection for software, as well as other intellectual property, in several countries. The Business Software Alliance and the Software & Information Industry Association have been effective forces for monitoring software piracy around the world, promoting legislative and attitudinal changes and taking legal actions to enforce copyright protection. The accession of the United States to the Berne Convention, the NAFTA provisions and the establishment of the World Trade Organization (as a successor to the GATT), which fosters the protection of intellectual property rights through the TRIPS Agreement, were important milestones in the use of multilateral agreements for dealing with protection for software. These multilateral efforts are intended to promote adequate and effective protection of intellectual property rights while ensuring that national laws enforcing such rights do not themselves become barriers to trade. In most countries, the only meaningful remedy is to seek an order to stop or enjoin further infringing activities, with only limited prospects for collecting damages.

UniKey e-Learning protection — A special version of software license solution released

UniKey e-Learning protection — A special version of software license solution released

Canada, SecuTech Solution Inc. released a special version of software license solution—UniKey Special for e-Learning. This solution is specially made for e-Learning providers to offer people to learn anytime and anywhere online, including training, the delivery of just-in-time information and guidance from experts.

This solution combines a hardware key-UniKey, providing licensing method with envelope-base automatic implementation and API-based implementation.

UniKey Special for e-Learning consists of several parts, such as Flash (swf and flv) protection, Authorware protection, Director protection, Realbasic protection, Video (avi, rm,rmvb, and mpeg) protection, e-Book protection, and general API protection for various programming languages.

UniKey Speical for e-Learning solution provides supports for numerous language to meet the flexibility of learning, training, and education software.



In order to improve the relationships between vendors and customers as well as grow revenue, UniKey special for e-learning solution is made more flexible in licensing.

Subscription license: Allows the user to use the software for a specific time period. At the end of the term the user has several options: (1) renew the subscription; or (2) purchase a perpetual license at a discounted cost; or (3) remove the software from the computer.

Evaluation license: This license allows the expensive software to be evaluated with certain period.
Feature based license: This license allows end users to use partial function of the software to save money than to use the whole package.


About SecuTech Solution Inc.
SecuTech Solutions Inc. is a company specializing in software license management business systems focusing on the international market with their class leading UniKey product range. Having an extensive and in-depth range of experience within the Software Management Licensing market, SecuTech has drawn upon this experience to utilize today's cutting-edge technologies to introduce a COMPLETE and affordable solution for today's software vendor markets worldwide.


SecuTech Solution Inc.
Sales@eSecuTech.com
www.eSecuTech.com
©2009 SecuTech Solution Inc. All rights reserved.


Press contact
PR@eSecuTech.com
Phone: +1 888 259 5825 ext 9
Fax: +1 888 259 5825 ext 0
Add: 480,rue Montcalm, Berthierville
Quebec, J0K 1A0,
Canada

Monday, February 16, 2009

Software Piracy , Software copy Protection & Security

Software Piracy , Software copy Protection & Security

What is Software Piracy? Software piracy is the unauthorized duplication of computer software. Although most computer users today are aware that unauthorized use and duplication of software is illegal, many show a general disregard for the importance of treating software as valuable intellectual property.

According to the BSA (Business Software Alliance) and IDC 5th Annual Global Software Piracy Study, revenue losses due to software piracy have increased and were nearly $48 billion in the year 2007.

Types of Software Piracy
Softlifting: purchasing a single licensed copy of software and loading it onto several computers contrary to the license terms.
For example, sharing software with friends, co- workers and others.
Uploading and downloading: making unauthorized copies of copyrighted software available to end users connected by modem to online service providers and/or the Internet.
Software counterfeiting: illegally duplicating and selling copyrighted software in a form designed to make it appear legitimate
OEM unbundling: selling standalone software that was intended to be bundled with specific accompanying hardware Hard disk loading: installing unauthorized copies of software onto the hard disks of personal computers, often as an incentive for the end user to buy the hardware from that particular hardware dealer Renting: unauthorized selling of software for temporary use, like you would a video.

Why Protect Your Software? Developing a software application involves a major investment of time, money and effort. Software piracy (including illegal network licenses and unfulfilled upgrades) denies you the revenue you deserve and harms your paying customers, who ultimately bear the cost of illegal use of your products.

Piracy limits your ability to be competitive, leading to higher-priced, less advanced products for your customers. Intellectual Property Protection.

Strong intellectual property protection for software is an important part of any nation's eeconomic growth and development, and has numerous benefits: Encourages individuals and businesses to create new software and new software applications, as well as improving existing applications Encourages an indigenous software industry Ensures new ideas and technologies are widely distributed Promotes investment in the national economy Encourages technology transfers between nations Increase your sales potential With increased revenues, you are free to invest more in improving your product and offering competitive prices, making it more accessible to a wider customer base.

UniKey, the Driverless dongle, reduces the huge work of technical support team for software vendors.
Unikey has the lowest industry failure rates in the industry which is guaranteed with lifetime warranty.
Unikey technical support team earns the highest rating of customer satisfaction in the industry.
Unikey products cost about 50% less than others.

UniKey dongles are available in Four models for USB port to meet different requirements, there are UniKey Time ( Real Time Version), UniKey PRO (Network Version ), UniKey STD (Standalone Version), and UniKey Lite (Lite Version ).

UniKey Time is specially designed for software vendors who needs to control and manage the software''s rental and selling in subscription or maintenance , it allows to pay per use, in this way software vendors can completely control the sales by charging the end users timely and periodically. This function is based on a real time clock deposited in the dongle indicating the specific time (hour, minute, second) and date (day, month, year).

The main difference between UniKey PRO and STD is that UniKey PRO can accept up to 65535 remote clients, while UniKey STD can only work with one remote client. UniKey STD and UniKey PRO are two powerful software protection dongles (hardware key) with lifetime warranty, which has up to 4K bytes memory.

The user-defined algorithm can easily have UniKey envloved with protected software and increase the security. UniKey Lite is the compact version of UniKey dongle product. It is simple and easy to be used. UniKey Lite has 1K bytes memory and One Year Warranty only.

SecuTech UniKey copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user''s USB port.

The innovative design of these devices enabled them to be much easier and less expensive than those of our competitors. Whether you are new to the idea of Dongle security or knowledgeable about the potential benefits – SecuTech is your trusted partner delivering the right amount of protection for you and your company.

How Do I get Free UniKey evaluation Kit?
If you are interested in evaluating our products, you may request a FREE SDK simply by completing the application form via http://www.esecutech.com/.

About SecuTech Solution Inc. SecuTech Solutions Inc. is a company specializing in software license management business systems focusing on the international market with their class leading UniKey product range. Having an extensive and in-depth range of experience within the Software Management Licensing market, SecuTech has drawn upon this experience to utilize today's cutting-edge technologies to introduce a COMPLETE and affordable solution for today's software vendor markets worldwide. SecuTech Solution Inc. Sales@eSecuTech.com www.eSecuTech.com ©2009 SecuTech Solution Inc. All rights reserved.
# # #
SecuTech UniKey (#1 Driverless (HID) dongle) copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user's USB port.


How Do I get Free UniKey evaluation Kit?If you are interested in evaluating our products, you may request a FREE SDK simply by completing the application form at http://www.esecutech.com/.
SecuTech Solution Inc.480, rue Montcalm, BerthiervilleQuebec,Canada J0K 1A0Tel: 888-259-5825 ex 9Fax: 888-259-5825 ex 0 http://www.esecutech.com/

SecuTech Solution Inc, the software security expert who provides UniKey software copy protection license control solution and free technical support or professional advise for customers.The UniKey dongle products(as known as USB hardware key, Security dongle, or software hardlock) act as the #1 driverless software copy protection dongle in the software industry.

Thursday, February 12, 2009

Introducing UniKey Lite security keys - the cheapest dongle in the world


Hardware-Based Protection
SecuTech UniKey copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user's USB port. The innovative design of these devices enabled them to be much easier and less expensive than those of our competitors.
Whether you are new to the idea of Dongle security or knowledgeable about the potential benefits – SecuTech is your trusted partner delivering the right amount of protection for you and your company.
UniKey Lite
A real budget solution for strong software protection,




#1 Driverless (HID) dongle in Software and content protection!

l Highest Security
-Vendor selectable secret and private key
-Each UniKey dongle features a unique ID number.
-Best-in-class tools for automatic protection (Envelop, without source modification)
-We have seen some other brand dongles become available from some "cloning" companies that can essentially create duplicates, Not UniKey so far.

l Secure & Flexible Licensing
* UniKey Lite supports the following licensing models:
- Perpetual: Once purchased, the software can be used indefinitely.
- Feature-Based: Enable or disable product features based upon user needs and budget.
- Pay-Per-Use: Use the UniKey Lite memory counters to charge users for the number of times they use the application or certain features.
* Flexibility to build custom licenses: Use the UniKey Lite counters, secure memory, and unique ID to create the license models that best fit business needs.
* Flexibility to update UniKey Lite keys remotely: A powerful
Remote Update System sends encrypted and RSA digitally-signed license terms to users — ensuring secure updates of keys and licenses in the field.

l Free UniKey Support (No other vendor offers this type of service.)
Our technical professionals work closely with UniKey customers to ensure the highest levels of customer satisfaction and understanding of our products. Serving customers in over 50 countries and providing solutions to thousands of governments, companies, resellers, individual developers, institutions worldwide, SecuTech offers excellent Free Technical support for our industry.

l Low cost UniKey.
l Flexible OEM service
- Labeling service
- OEM case service

l Limitation
- UniKey Lite is only available as bulk in Min. quantities of 1000.
- UniKey Lite is only available in a few selected countries.①


Technical Specifications – UniKey Lite
Security
Unique ID
32-bit
Hardware ID/SN
Globally Unique Hardware ID
Password
Convenient Password Generation Scheme
Software ID
Hardware key User-Defined Software ID
UpdateTag
32 bits Tag for Remote Update
Protection
Enveloper Protection
APIs Protection
Flash Protection with Enveloper
Video Protection with UniKey Video Protector
Utility
Zero Configuration
Remote Update / Assist Tool / UniKey Tutor / UniKey Bunner
Cook-books / SDK
Supported licensing Models
License module
64 license modules
Perpetual
YES
Feature-based
YES
Pay-per-use
YES
Custom
YES
Supported Platforms(Software vendor)
Supported programming languages
32 and 64-Bit
VB, VC, VFP, Delphi, BCB, PowerBuilder, LabView, WinDEV, Java, FileMaker,Clarion, Java, VS.Net, Fortran, Visual DataFlex and many more
Windows 98SE, NT, 2000, XP, 2003, Vista, (both 32-bit and 64 bit,),
Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Development platforms supported
Windows 98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,),
Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Supported Platforms(End-user)
Operating Systems supported Windows
98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,)
Linux 2.2, 2.4 and on, both 32-bit and 64bit, MacOS X, FreeBSD
Hardware Specification
Memory
1K
Memory cell rewriters
At least 1,000,000
Memory data retention
At least 30 years
Max No. of features / applications enabled per key
64
Driver
Driverless (HID device)
Physical specifications
Casing
Injection molded plastic
Default color
Black
Identification number②
YES






Dimensions
57 X 16 X 8mm
Weight
9g
Min. Operating Voltage
5V
Current Consumption
<= 50 mA Operation Temperature 0C to 70C Storage Temperature -10C to 85C Humidity Rating 0-70% without condensation Certification Safety certification CE / FCC Environmental Certification / Compliance ROHS Manufacturer’s Warranty Covers manufacturing & Material defects 1 Year Customization OEM Case / Color③ Black / Blue / Green / White Label④ YES ① UniKey Lite is only available in China, Malaysia, Indonesia, Egypt, Iran, and South Africa. ② Each UniKey has a unique digital number on USB Plug. ③ No light for Blue / Green / White OEM key. Minimum order of: 10,000 pieces ③ Your LOGO / Serial number on the back of UniKey case. Minimum order of: 1,000 pieces. Label size: 0.74cm*2.34 cm Worldwide +1 888 259 5825 Australia +61-3-6544-4455 Brazil +55-11-2165-7077 France +03-44-54-96-39 India +91-2322-227-889 Japan +81-3-5524-3391 Serbia +381-11-26-52-395 Turkey +90-216-572-00-33 Vietnam +84-16-8998-8137 Distributors and resellers located worldwide. Order your Free Software Development Kit now! Phone +1 888 259 5825 Sales@eSecuTech.com





©2008 by SecuTech Solution Inc, All rights reserved.

Introducing UniKey STD security keys - #1 driverless dongle in the world


Hardware-Based Protection
SecuTech UniKey copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user's USB port. The innovative design of these devices enabled them to be much easier and less expensive than those of our competitors.
Whether you are new to the idea of Dongle security or knowledgeable about the potential benefits – SecuTech is your trusted partner delivering the right amount of protection for you and your company.

UniKey STD
The ideal solution for strong software protection,
video protection and content protection.



#1 Driverless (HID) dongle in Software and content protection!

l Highest Security
-Vendor selectable secret and private key
-Each UniKey dongle features a unique ID number.
-Best-in-class tools for automatic protection (Envelop, without source modification)
-We have seen some other brand dongles become available from some "cloning" companies that can essentially create duplicates, Not UniKey so far.

l Secure & Flexible Licensing
* UniKey STD supports the following licensing models:
- Perpetual: Once purchased, the software can be used indefinitely.
- Feature-Based: Enable or disable product features based upon user needs and budget.
- Pay-Per-Use: Use the UniKey STD memory counters to charge users for the number of times they use the application or certain features.
* Flexibility to build custom licenses: Use the UniKey STD counters, secure memory, and unique ID to create the license models that best fit business needs.

* Flexibility to update UniKey STD keys remotely: A powerful Remote Update System sends encrypted and RSA digitally-signed license terms to users — ensuring secure updates of keys and licenses in the field.

l Free UniKey Support (No other vendor offers this type of service.)
Our technical professionals work closely with UniKey customers to ensure the highest levels of customer satisfaction and understanding of our products. Serving customers in over 50 countries and providing solutions to thousands of governments, companies, resellers, individual developers, institutions worldwide, SecuTech offers excellent Free Technical support for our industry.

l Life time warranty on UniKey
UniKey STD/PRO has the lowest industry failure rates in the industry which is guaranteed with lifetime warranty.

l Low cost UniKey.
UniKey products cost about 50% less than others.

Technical Specifications – UniKey STD
Security
Unique ID
32-bit
User-defined algorithms
128 instructions
Hardware ID/SN
Globally Unique Hardware ID
Password
Convenient Password Generation Scheme
Software ID
Hardware key User-Defined Software ID
UpdateTag
32 bits Tag for Remote Update
Network Function
Accept One Remote Access
Protection
Enveloper Protection
APIs Protection
Flash Protection with Enveloper
Video Protection with UniKey Video Protector
Utility
Zero Configuration
Remote Update / Assist Tool / UniKey Tutor / UniKey Bunner
Cook-books / SDK
Supported licensing Models
License module
64 license modules
Perpetual
YES
Feature-based
YES
Pay-per-use
YES
Custom
YES
Supported Platforms(Software vendor)
Supported programming languages
32 and 64-Bit
VB, VC, VFP, Delphi, BCB, PowerBuilder, LabView, WinDEV, Java, FileMaker,Clarion, Java, VS.Net, Fortran, Visual DataFlex and many more
Windows 98SE, NT, 2000, XP, 2003, Vista, (both 32-bit and 64 bit,),
Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Development platforms supported
Windows 98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,),
Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Supported Platforms(End-user)
Operating Systems supported Windows
98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,)
Linux 2.2, 2.4 and on, both 32-bit and 64bit, MacOS X, FreeBSD
Hardware Specification
Memory
4K
Memory cell rewriters
At least 1,000,000
Memory data retention
At least 30 years
Max No. of features / applications enabled per key
64
Driver
Driverless (HID device)

Physical specifications
Casing
Injection molded plastic
Default color
Black
Identification number①
YES
Dimensions
57 X 16 X 8mm
Weight
9g
Min. Operating Voltage
5V
Current Consumption
<= 50 mA Operation Temperature 0C to 70C Storage Temperature -10C to 85C Humidity Rating 0-70% without condensation Certification Safety certification CE / FCC Environmental Certification / Compliance ROHS Manufacturer’s Warranty Covers manufacturing & Material defects Life time Customization OEM Case / Color② Black / Blue / Green / White Label③ YES Generic Case④ YES ① Each UniKey has a unique digital number on USB Plug. ② No light for Blue / Green / White OEM key. Minimum order of: 1000 pieces ③ Your LOGO / Serial number on the back of UniKey case. Minimum order of: 500 pieces. Label size: Small: 0.62cm*1.38 cm / Large: 0.74cm*2.34 cm ④
Contact SecuTech for detail. Worldwide +1 888 259 5825 Australia +61-3-6544-4455 Brazil +55-11-2165-7077 France +03-44-54-96-39 India +91-2322-227-889 Japan +81-3-5524-3391 Serbia +381-11-26-52-395 Turkey +90-216-572-00-33 Vietnam +84-16-8998-8137 Distributors and resellers located worldwide.
Order your Free Software Development Kit now! Phone +1 888 259 5825 Sales@eSecuTech.com


©2008 by SecuTech Solution Inc, All rights reserved.

Introducing UniKey PRO security keys - #1 driverless Network dongle in the world

Hardware-Based Protection

SecuTech UniKey copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user's USB port. The innovative design of these devices enabled them to be much easier and less expensive than those of our competitors.
Whether you are new to the idea of Dongle security or knowledgeable about the potential benefits – SecuTech is your trusted partner delivering the right amount of protection for you and your company.

UniKey PRO
Net-version dongle of UniKey STD.

#1 Driverless (HID) dongle in Software and content protection!

l Highest Security
-Vendor selectable secret and private key
-Each UniKey dongle features a unique ID number.
-Best-in-class tools for automatic protection (Envelop, without source modification)
-We have seen some other brand dongles become available from some "cloning" companies that can essentially create duplicates, Not UniKey so far.

l Secure & Flexible Licensing
* UniKey PRO supports the following licensing models:
- Perpetual: Once purchased, the software can be used indefinitely.
- Feature-Based: Enable or disable product features based upon user needs and budget.
- Pay-Per-Use: Use the UniKey PRO memory counters to charge users for the number of times they use the application or certain features.
* Flexibility to build custom licenses: Use the UniKey PRO counters, secure memory, and unique ID to create the license models that best fit business needs.

* Flexibility to update UniKey PRO keys remotely: A powerful Remote Update System sends encrypted and RSA digitally-signed license terms to users — ensuring secure updates of keys and licenses in the field.

l Free UniKey Support (No other vendor offers this type of service.)
Our technical professionals work closely with UniKey customers to ensure the highest levels of customer satisfaction and understanding of our products. Serving customers in over 50 countries and providing solutions to thousands of governments, companies, resellers, individual developers, institutions worldwide, SecuTech offers excellent Free Technical support for our industry.

l Life time warranty on UniKey PRO
UniKey STD/PRO has the lowest industry failure rates in the industry which is guaranteed with lifetime warranty.

l Low cost UniKey.
UniKey products cost about 50% less than others.


Technical Specifications – UniKey PRO
Security
Unique ID
32-bit
User-defined algorithms
128 instructions
Hardware ID/SN
Globally Unique Hardware ID
Password
Convenient Password Generation Scheme
Software ID
Hardware key User-Defined Software ID
UpdateTag
32 bits Tag for Remote Update
Network Function
Accept upto 65535 remote access
Support Black/White list
Floating License
Suppot WinXP firewall
Subnet crossing enabled
Protection
Enveloper Protection
APIs Protection
Flash Protection with Enveloper
Video Protection with UniKey Video Protector
Utility
Zero Configuration
Remote Update / Assist Tool / UniKey Tutor / UniKey Bunner
Cook-books / SDK
Supported licensing Models
License module
64 license modules
Perpetual
YES
Feature-based
YES
Pay-per-use
YES
Custom
YES
Supported Platforms(Software vendor)
Supported programming languages
32 and 64-Bit
VB, VC, VFP, Delphi, BCB, PowerBuilder, LabView, WinDEV, Java, FileMaker,Clarion, Java, VS.Net, Fortran, Visual DataFlex and many more
Windows 98SE, NT, 2000, XP, 2003, Vista, (both 32-bit and 64 bit,),Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Development platforms supported
Windows 98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,),Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Supported Platforms(End-user)
Operating Systems supported Windows
98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,)
Linux 2.2, 2.4 and on, both 32-bit and 64bit, MacOS X, FreeBSD
Hardware Specification
Memory
4K
Memory cell rewriters
At least 1,000,000
Memory data retention
At least 30 years
Max No. of features / applications enabled per key
64
Driver
Driverless (HID device)






Physical specifications
Casing
Injection molded plastic
Default color
Black
Identification number①
YES
Dimensions
57 X 16 X 8mm
Weight
9g
Min. Operating Voltage
5V
Current Consumption
<= 50 mA Operation Temperature 0C to 70C Storage Temperature -10C to 85C Humidity Rating 0-70% without condensation Certification Safety certification CE / FCC Environmental Certification / Compliance ROHS Manufacturer’s Warranty Covers manufacturing & Material defects Life time Customization OEM Case / Color② Black / Blue / Green / White Label③ YES Generic Case④ YES ① Each UniKey has a unique digital number on USB Plug. ② No light for Blue / Green / White OEM key. Minimum order of: 1000 pieces ③ Your LOGO / Serial number on the back of UniKey case. Minimum order of: 500 pieces. Label size: Small: 0.62cm*1.38 cm / Large: 0.74cm*2.34 cm ④ Contact SecuTech for detail. Worldwide +1 888 259 5825 Australia +61-3-6544-4455 Brazil +55-11-2165-7077 France +03-44-54-96-39 India +91-2322-227-889 Japan +81-3-5524-3391 Serbia +381-11-26-52-395 Turkey +90-216-572-00-33 Vietnam +84-16-8998-8137 Distributors and resellers located worldwide. Order your Free Software Development Kit now! Phone +1 888 259 5825 Sales@eSecuTech.com





©2008 by SecuTech Solution Inc, All rights reserved.

Introducing UniKey Time security keys - #1 driverless real time dongle in the world

Hardware-Based Protection
SecuTech UniKey copy protection products were augmented by the introduction of driverless UniKey Dongles that maintained the same high level of security by means of a small hardware key that fitted into the user's USB port. The innovative design of these devices enabled them to be much easier and less expensive than those of our competitors.
Whether you are new to the idea of Dongle security or knowledgeable about the potential benefits – SecuTech is your trusted partner delivering the right amount of protection for you and your company.

UniKey Time
A real-time clock inside key for strong software protection,
video protection and content protection.

UniKey Time is specially designed for software vendors who needs to control and manage the software’s rental and selling in subscription or maintenance, it allows to pay per use, in this way software vendors can completely control the sales by charging the end users timely and periodically. This function is based on a real time clock deposited in the dongle indicating the specific time (hour, minute, second) and date (day, month, year).
#1 Driverless (HID) dongle in Software and content protection!

l Highest Security
-Vendor selectable secret and private key
-Each UniKey dongle features a unique ID number.
-Best-in-class tools for automatic protection (Envelop, without source modification)
-We have seen some other brand dongles become available from some "cloning" companies that can essentially create duplicates, Not UniKey so far.

l Secure & Flexible Licensing
* UniKey Time supports the following licensing models:
- Time based: Software vendors can completely control the sales by charging the end users timely and periodically by indicating the specific time (hour, minute, second) and date (day, month, year).
- Perpetual: Once purchased, the software can be used indefinitely.
- Feature-Based: Enable or disable product features based upon user needs and budget.
- Pay-Per-Use: Use the UniKey Time memory counters to charge
users for the number of times they use the application or certain features.
* Flexibility to build custom licenses: Use the UniKey Time counters, secure memory, and unique ID to create the license models that best fit business needs.
* Flexibility to update UniKey Time keys remotely: A powerful Remote Update System sends encrypted and RSA digitally-signed license terms to users — ensuring secure updates of keys and licenses in the field.

l Free UniKey Support (No other vendor offers this type of service.)
Our technical professionals work closely with UniKey customers to ensure the highest levels of customer satisfaction and understanding of our products. Serving customers in over 50 countries and providing solutions to thousands of governments, companies, resellers, individual developers, institutions worldwide,

l Flexible Customization service


Technical Specifications – UniKey Time
Security
Unique ID
32-bit
User-defined algorithms
128 instructions
Hardware ID/SN
Globally Unique Hardware ID
Password
Convenient Password Generation Scheme
Software ID
Hardware key User-Defined Software ID
UpdateTag
32 bits Tag for Remote Update
Network Function
Accept upto 65535 remote access
Support Black/White list / Floating License
Suppot WinXP firewall / Subnet crossing enabled
Protection
Enveloper Protection
APIs Protection
Flash Protection with Enveloper
Video Protection with UniKey Video Protector
Utility
Zero Configuration
Remote Update / Assist Tool / UniKey Tutor / UniKey Bunner
Cook-books / SDK
Supported licensing Models
License module
64 license modules
Perpetual
YES
Feature-based
YES
Pay-per-use
YES
Custom
YES
Time-Based
YES
Timing functions
Real time clock
YES
Timing license module
16
Expiration function
YES
Execution timing function
YES
On-key clock counts date and time
Y/M/D, H/M/S
Battery life
3 years warranty
Supported Platforms(Software vendor)
Supported programming languages
32 and 64-Bit
VB, VC, VFP, Delphi, BCB, PowerBuilder, LabView, WinDEV, Java, FileMaker,Clarion, Java, VS.Net, Fortran, Visual DataFlex and many more
Windows 98SE, NT, 2000, XP, 2003, Vista, (both 32-bit and 64 bit,),Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Development platforms supported
Windows 98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,),Linux 2.2, 2.4 and on, MacOS X, FreeBSD
Supported Platforms(End-user)
Operating Systems supported Windows
98SE, NT, 2000, XP, 2003, Vista,(both 32-bit and 64 bit,)
Linux 2.2, 2.4 and on, both 32-bit and 64bit, MacOS X, FreeBSD



Hardware Specification
Memory
4K
Memory cell rewriters
At least 1,000,000
Memory data retention
At least 30 years
Max No. of features / applications enabled per key
64
Driver
Driverless (HID device)
Physical specifications
Casing
Metal Case
Default color
Gray
Identification number①
YES
Dimensions
57 X 16 X 8mm
Weight
9g
Min. Operating Voltage
5V
Current Consumption
<= 50 mA Operation Temperature 0C to 70C Storage Temperature -10C to 85C Humidity Rating 0-70% without condensation Certification Safety certification CE / FCC Environmental Certification / Compliance ROHS Manufacturer’s Warranty Covers manufacturing & Material defects 3 Years Customization OEM Color② Silver gray / Blue Label③ Laser Marking ① Each UniKey has a unique digital number on USB Plug. Worldwide +1 888 259 5825 Australia +61-3-6544-4455 Brazil +55-11-2165-7077 France +03-44-54-96-39 India +91-2322-227-889 Japan +81-3-5524-3391 Serbia +381-11-26-52-395 Turkey +90-216-572-00-33 Vietnam +84-16-8998-8137 Distributors and resellers located worldwide. ② Minimum order of: 500 pieces ③ Your LOGO / Serial number on the case. Minimum order of: 100 pieces. Order your UniKey Time Software Development Kit now! Phone +1 888 259 5825 Sales@eSecuTech.com
©2008 by SecuTech Solution Inc, All rights reserved.

How UniKey Hardware Keys Help Us Improve The Product’s Security.[By Michael Ricci]

How UniKey Hardware Keys Help Us Improve The Product’s Security.
Better security through UniKey


When we began work on the UniKey security keys (http://www.esecutech.com/), our Engineers were to find a device that would be an adequate deterrent to software piracy thefts. While we understand that complete security is impossible in open systems like PCs, we wanted to make it hard enough to break that would-be hackers would look elsewhere.

Software license is that the software publisher grants a license to use one or more copies of software, but that ownership of those copies remains with the software publisher. One consequence of this feature of proprietary software licenses is that virtually all rights regarding the software are reserved by the software publisher. Only a very limited set of well-defined rights are conceded to the end-user.

In an effort to show that UniKey security keys were more than smoke-and-mirrors, I submitted an article to my blog that gave significant details on how the UniKey USB security key worked (http://softwarecopyprotectionsecuritykeys.blogspot.com/). There are some real ferrets out there.

I was not disappsointed. UniKey responded with a variety of suggestions and judgements. The most common response we got from UniKey support team is that there is a technical support ticket system to help me work with them. While there are many articles at their website www.esecutech.com/ indicating how easy it is to integrate the keys, the articles I read assume that your questions are available. In our case, the questions are not available.

Let's assume that enterprising intruders are able to analyze the data on the USB bus, collect a sufficient number of values, and apply the appropriate effort to determine the key values. Is the usefulness of the UniKey over? Not really. An intruder cannot use information to clone another key.It is impossible (even with that information) for a program communicating with a UniKey by using the correct keys to change the key values on the device. The keys are not stored in memory that can be accessed by any program, even if it knows the keys. The bottom line is that this approach cannot change a hardware key for product A to be modified to become a key for product B.

UniKey dongles are driverless dongles and available in standalone, network and real time. Using a software developer’s kit, software developers can protect applications with the right hardware key by calling for the dongle’s presentation. UniKey API protection scheme ensures the highest security for software vendors.

We appreicate the HID technology which let us forget the dongle NOT FOUND problem of other brand dongles, and we also appreciate the review and feedback we received from UniKey technical support Team and other UniKey end users. It help us a lot to improve our software’s security. The software development customers don't have to change the code with Unikey envelop secuirty technology, and the security is improved. We aren't so naïve as to believe that UniKey provides an unbreakable solution, but we do believe that the time and effort required to crack and bypass the security is sufficiently high that intruders will look for easier targets.

SecuTech Solution Inc. offers several ready license protection solutions along with UniKey. UniKey takes the role of hardware ID and works as the container of digital credentials. UniKey Software Protection System provides a completed set of tools and samples for software vendors to control their software's distribution.

Wednesday, February 11, 2009

UniKey e-Learning protection — A special version of software control license solution


SecuTech Solution Inc. released a special version of software license solution—UniKey e-Learning protection. This solution is specially made for e-Learning providers to offer people to learn anytime and anywhere online, including training.

SecuTech Solution Inc. released a special version of software license solution—UniKey e-Learning protection. This solution is specially made for e-Learning providers to offer people to learn anytime and anywhere online, including training, the delivery of just-in-time information and guidance from experts.

e-Learning solution provides supports for multiple platforms and numerous language to meet the flexibility of online learning, training, and monitoring.

This solution combines a hardware key-UniKey providing licensing method with envelope-base automatic implementation and API-based automatic implementation.

In order to improve the relationships between vendors and customers as well as grow revenue, UniKey e-learning solution is made more flexible in licensing

Subscription license: Allows the user to use the software for a specific time period. At the end of the term the user has several options:

(1) renew the subscription; or

(2) purchase a perpetual license at a discounted cost; or

(3) remove the software from the computer.


Trial license: Allows software venders to release the software for a period time like a month as marketing tool. The end user can only use this software for only one month.
Evaluation license: This license allows the expensive software to be evaluated with certain period.


Demo license: This license allows end users to demonstrate the software with partial function or certain period.


Feature based license: This license allows end users to use partial function of the software to save money than to use the whole package.


Time limited rental license: This allows the end user to pay per time. The end user pre-pay a period of time that fits their needs. The end user can also renew before the license expired.


Concurrent Use: Thislicense type requires the end users purchase licenses for the maximum number of people who will be running the software simultaneously.

However, end users can usually install the software on more computers than Server (Network): Licensed per server – This license type requires that you have a single copy of the software residing on the file server .

The hardware key -- Unikey is to feature secure software licensing options and offers multiple licensing molds locked into the hardware key to supply flexible licensing protection.
-------------------------------------------------------------------------------------

As I know, UniKey is special designed for eLearning solution which is the cheapest dongle in UniKey family.

____________________________________________________________

Software copy Protection Dongle hardware key and security Technologies

Software is Intellectual Property. Highly valuable, it must be protected from unauthorized use in order to ensure new and existing revenue streams. software piracy continues to increase globally. The effects of this increase are devastating.

Not only does software piracy reduce revenues, it also results in less R&D, and in less investment in marketing and channel development. The only way to stop software piracy before it happens is to implement a strong software DRM solution to protect your software from unauthorized use.

The development of UniKey is based on the customers' suggestions together with the market study on software Developers. This new HID technology will definitely added stronger momentum to make UniKey USB Key ahead of other similar products in the market. UniKey is advanced software protection HID hardware USB Key that attaches to USB port of a computer.

UniKey Software Copy Protection To ensure you get paid for every software copy being used. UniKey creates a robust link between the software application and UniKey Protection hardware Key – preventing software piracy and ensuring authorized use of the software.

During runtime the protected software sends encrypted strings to the protection hardware key (UniKey STD, UniKey PRO and UniKey Time) which decrypts the strings and produces a response that cannot be imitated. If the response from the protection key is correct, the application will run. If the protection key is not present or the response from the key is incorrect, the application will not run.

With so many competing products available in today competitive market, choosing the RIGHT product require proper evaluation and careful evaluation. Below are some of the Tips or consideration criteria of which are very crucial while making such decision:-

Why Chooses UniKey?

1. Driverless dongle, reduces the huge work of technical support team for software vendors. Close to 90% dongle problems are caused by the dongle driver. Thanks to the HID technology, your operation system will install the UniKey driver automatically. Software users really enjoy the convenience brought by the driverless technology.

2. Enhanced convenience and Ease-of-use Features dramatically saves enegry. Numerous sample codes in various languages ease the implementation. Featuring easy-to-use tools for developers, product managers, order processing and production, UniKey ensures a short learning curve, and optimum use of employee time and core competencies.

3. Outstanding levels of technical support through effective team work. Unikey technical support team earns the highest rating of customer satisfaction in the industry. SecuTech’s industry-leading technical support is available 24 hours a day, 365 days a year and is included in all licenses.

4. Envelop is easy and powerful for busy customers Thanks to the UniKey Enveloper developer team. UniKey protects software without any additional programming work. The UniKey Enveloper also utilizes anti-debug and anti-dump technologies to prevent it being cracked. A strong algorithm with a key length of 128-bits encrypts the application protected by the UniKey Enveloper.

5. Unikey has the lowest industry failure rates in the industry which is guaranteed with lifetime warranty. The low failure rate can be attributed to SecuTech’s responsibility and hardworking. SecuTech is committed to maintaining its highest quality by achieving the lowest failure rate for the years to come while further reducing cost to keep the advantages for long.

6. On-key clock counts date and time. With a real time clock inside, UniKey Time allows to pay-per-time, in this way software vendors can completely control the sales by charging the end users timely and periodically. This function is based on a real time clock deposited in the dongle indicating the specific time (hour, minute, second) and date (day, month, year).

7. OEM enables flexibility of case, label and color. SecuTech provides the opportunities and facilities to make customer’s own key and software, as well as providing the facilities for OEM casing and labeling.

8. UniKey Lite is the budget solution for low price software. UniKey Lite is a cost-effective solution for strong Software Copy Protection. It is ideal for less-complex licensing, without component licensing, and where algorithm is not required.

9. Customization offers clients integration and tailored solutions SecuTech offers tailored solutions for software vendors who are developing a specific software application on software protection. SecuTech OEM partners use UniKey hardware components to create their customized products, which they market and sell as their own. SecuTech is responsive to change request to accommodate new market requirements.

10. UniKey offers superior reliability and an extremely level of security UniKey reaches maximum Security and flexibility! It provides the highest level of software copy protection with remote update. Based on the on-chip encryption engine and 128-bit AES Encryption Algorithm, it implements data encryption and decryption.

UniKey Tips Easy Solution

• Driverless technology reduces customers’ support work
• UniKey Time is with a real time clock inside
• Both automatic (envelope without source modification) and APIs protection
• Numerous sample codes in various programming languages Greater Flexibility
• Protect software, flash (swf and flv) and video files
• Protection in local computers or over a network
• Support all popular operating systems, including Windows, Linux, MacOS and Free BSD
• Remote update and real time functionality
• OEM enables flexibility of case, label, and color A Cost-effective Choice • Competitive pricing
• Experienced and efficient FREE technical support
• Life time warranty
• Secure & Flexible Licensing
• Highest Security

How Do I get Free UniKey evaluation Kit? If you are interested in evaluating our products, you may request a FREE SDK simply by completing the application form at www.eSecuTech.com.