HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007...
-
Upload
abigail-park -
Category
Documents
-
view
219 -
download
1
Transcript of HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007...
HASPHASP®® SRM SRM
Enabling Business Growth throughEnabling Business Growth throughSoftware Rights ManagementSoftware Rights Management
All Rights Reserved © 2007 Aladdin Knowledge Systems.
Yariv Drory
International Technical Support Manager
June 2007
HASP Software Rights Management
• Hardware-based and software-based protection & licensing system
• The industry’s first all-in-one solution
• Advantages of both worlds gives numerous options for: – Strong protection against software piracy– Unmatched protection for your intellectual property– Flexible and secure licensing & distribution
Hardware-Based vs. Software-Based Solutions Feature Hardware-based Solution Software-based Solution
Software and IP Protection
Secure Licensing
Trialware
Portability
Licensing for MultipleFeatures/Modules
Enables ESD
Doesn’t Require Online Connectivity
Super-Distribution
Not Affected by PC Changes
Vendor Has Full Control
Affordability of Solution
Now Combine the Advantages of Both into a Single Solution!
How HASP SRM Works: Vendor Site
DeveloperProtects Software
ProtectedSoftware
PM Defines License
LicensedSoftware
PM Defines HASP Key
Type
Software Protected with HASP HL or HASP SL
Ship Software to End-User
Product Key
Boxed Delivery
Electronic Delivery
SoftwareVendor
How HASP SRM Works: End User Site
3467 A3C8 2319 F49B
Protected
Software
HASP SRM Business Studio Server
Protection with HASP SRMHASP SRM Envelope in Action (end user site)
Envelope-protected Software
Trialware
Provisional Mode
Decrypted Data
AES
HASP HL
HASP SL
Encrypted Data
Software locked to any key with any license
Module
Rental
Subscription
Floating
hasp_login()
hasp_decrypt()
Protection with HASP SRMHASP SRM API
Single runtime API
Toolbox – tutorial & code generator
Encrypt / Decrypt data
Universal API for all HASP locks
Cross-platform (2nd release)
Access to memory & secure
storage
Backward compatible to
HASP HL
Automatic & customizable
licensing
HASP SRM Product Activation
• Machine fingerprint is a hash generated from the PC's hardware
configuration, determined by:
– CPU, BIOS and motherboard, hard disk, optical drives (CD or DVD-ROM),
MAC address, PCI information (e.g. storage controller, display adapter).
• Server validates that Product Key has been used on number of PCs as
specified by ISV
End User
EntersProduct Key
3467 A3C8 2319 F49B
Product Key and
Machine Fingerprint
Sent to Server
HASP SRM Business Studio
Server
HASP SL & License Sent Back
Validation
HASP SRM Product Activation
• Product Activation can be done over Internet or via file (email)
• SSL-based secure communication
• Degree of tolerance enables changing hardware components
• Prevents hard disk cloning (2nd release)
End User
EntersProduct Key
3467 A3C8 2319 F49B
Product Key and
Machine Fingerprint
Sent to Server
HASP SRM Business Studio
Server
HASP SL & License Sent Back
Validation
Licensing with HASP SRM
• All licenses can be locked to HASP HL or HASP SL
• Out-of-the-box or customized
• Supported licenses:
Try-Before-You-Buy
Rental/Subscription
Module/Feature-Based
Floating
Floating & Time-Based
Volume
Orders & Fulfillment with HASP SRM
-User name-HASP HL ID-Product key-Licenses-Memory data
HASP SRM Business StudioTM
Client Server
Generates licenses, product keys, upgrades
Role-based tool
SQL Server 2005 Express Edition
Tracks user & registration info
Infrastructure for backend integration
(2nd release)
Questions?
Summary: Choices & Flexibility with SRM
• Protect Once: Get paid for every software copy: Envelope or API
• Deliver Many: Create attractive packages and pricing models withsecure flexible licensing & secure remote update: automatic or customized
• Cross-LockingTM: New business opportunities: HASP HL or HASP SL
• Distribution: Reach the market quickly with Web download or sell traditionally (shrink-wrapped)
• Activation: Security in the field: Server-based or HASP HL-based
Mix and Match to create the optimum DRM solution that meets your business needs
Protection Licensing Distribution