Linux server, I want to implement encryption software authorized by the way: the dongle, soft lock (account number and authorization code), cloud lock.
It authorized the use of three different ways of distinction.
Security Key: can be applied completely offline environment, we do limit time inferior.
Soft Lock: Lock into account soft and authorization code, offline and online can be used, without hardware. We need to activate the network once, whether online activation (the machine itself can be networked), or offline activation (with a networked machine to activate)
Cloud lock: You must use networking to software licensing.
Description Soft lock authorization code
Shield launched a number of thoughtful soft lock authorization code, you can achieve the needs of two parts, first: encryption security, protection code to prevent decompile, disassemble or prevent; second: authorized security, implement authorization control software, the software is free to prevent copy use.
Support: windows and Linux systems
Mode: limit and permanent authorization
The advantage of using soft lock authorization code
Offline
Simple deployment
Safety
Simple management
manual
After pondering registered developer account, apply to become an official developer, you can download the custom SDK
Issued authorization code on the authorization ponder cloud management platform, to create a product (generation license id), sales templates, send an authorization code.
Program to do the encryption, encryption tied license id
Authorization code to bind to the linux server