HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International.

Slides:



Advertisements
Similar presentations
Microsoft Windows NT Embedded 4.0
Advertisements

Software Bundle ViPNet Secure Remote Access Arrangement using ViPNet Mobile © Infotecs.
 Physical Logical Access  Physical and Logical Access  Total SSO and Password Automation  Disk/Data Encryption  Centralized management system  Biometric.
3 Section C: Installing Software and Upgrades  Web Apps  Mobile Apps  Local Applications  Portable Software  Software Upgrades and Updates  Uninstalling.
© 2007 Aladdin Knowledge Systems Ltd. All rights reserved. Aladdin, Aladdin Knowledge Systems, the Aladdin Knowledge Systems logo, HASP, HASP SRM, HASP.
Using Cryptographic ICs For Security and Product Management Misconceptions about security Network and system security Key Management The Business of Security.
A. Frank 1 Internet Resources Discovery (IRD) Peer-to-Peer (P2P) Technology (1) Thanks to Carmit Valit and Olga Gamayunov.
Kalpesh Patel Ramprabhu Rathnam
Activating Pilot Account ( first time users ) Web-based Activation Browse to 1. Click on the link on the lower right that says.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
Microsoft ® Application Virtualization 4.5 Infrastructure Planning and Design Series.
Microsoft Office Access 2007 A rich client for Windows SharePoint Services 3.0 Mark Bower Senior Consultant Microsoft UK
© 2010 VMware Inc. All rights reserved VMware ESX and ESXi Module 3.
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW Understand the difference between service.
11 MAINTAINING THE OPERATING SYSTEM Chapter 5. Chapter 5: MAINTAINING THE OPERATING SYSTEM2 CHAPTER OVERVIEW  Understand the difference between service.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: February 2010.
UniKey Software Protection Solutions, Products & Services All Rights Reserved © SecuTech Solution Inc.
Introduction to HASP ® Software DRM Solutions, Products, Benefits All Rights Reserved © Aladdin Knowledge Systems.
Simplex Time Recorder’s PayBay Attendance System Product Description Copyright © 2010 Simplex Time Recorder.
WEB329 ASP.NET: A Lap Around the New Enhancements for Web Developers in Microsoft Visual Studio 2005 Omar Khan Lead Program Manager Web Platform and Tools.
Windows Vista: Volume Activation 2.0
New SonicWALL Security ESA 3300 & ESA 4300 Appliances For SonicWALL Sales and SonicWALL Partners Allen Schoonmaker Product Line Manager
Security Measures Using IS to secure data. Security Equipment, Hardware Biometrics –Authentication based on what you are (Biometrics) –Biometrics, human.
Xilinx at Work in Hot New Technologies ® Spartan-II 64- and 32-bit PCI Solutions Below ASSP Prices January
Linux Operations and Administration
Advanced Access Content System (AACS) Industry Briefing July 14, 2004.
Introduction to Windows XP Professional Chapter 2 powered by dj.
Laptops, Notebooks, & Tablets, Oh My! Kathleen Hamby M.S. CBPA Governors State University.
Microsoft ® Application Virtualization 4.6 Infrastructure Planning and Design Published: September 2008 Updated: November 2011.
Tutorial 11 Installing, Updating, and Configuring Software
systemhound © Raxco Software Belgium systemhound PC inventory software.
Credit Card Processing Gail “Montreal” Shoffey Keeler August 14, 2007.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Hands-On Virtual Computing
1 © All rights reserved. U.S International Tech Support
1 Guide to Novell NetWare 6.0 Network Administration Chapter 13.
By Anthony W. Hill & Course Technology1 Common End User Problems.
Digital Planet: Tomorrow’s Technology and You
1 SCO Update Service Kerri Wallach, SCO Services Product Manager April 16, 2003.
Presentation Software as a Service Applications Software-as-a-Service Partner Enablement Program Enabling ‘Software as a Service’
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
DEV 303 Visual Studio "Whidbey" Enterprise Tools: Source Control and Work Item Tracking Brian Harry Product Unit Manager Microsoft Visual Studio.
Digital Rights Management and Watermarking of Multimedia Content for M-Commerce Applications Frank Hartung and Friedhelm Ramme, Ericsson Research, IEEE.
Chapter 3 Installing and Learning Software. 2Practical PC 5 th Edition Chapter 3 Getting Started In this Chapter, you will learn: − What is in an application.
"The majority of users in a typical enterprise simply want frequent, location-independent access to a few key applications, such as , calendar and.
Report Sharp-Shooter is released in the following editions: 1) 2) 3) 4) 5) 6)
Microsoft Management Seminar Series SMS 2003 Change Management.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
© Copyright 2011 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Restricted Module 7.
© 1stworks Corp. The Connected Community 85% of US corporations have a PC 75% of these PCs have an Internet connection 50% of US households have a PC 80%
About Softex Mission Statement: “To provide innovative security software products and solutions for computing devices” Softex was founded in 1992 by IBM.
Institute for the Protection and Security of the Citizen HAZAS – Hazard Assessment ECCAIRS Technical Course Provided by the Joint Research Centre - Ispra.
Windows Small Business Server 2003 R2 Powering Small Businesses.
The overview How the open market works. Players and Bodies  The main players are –The component supplier  Document  Binary –The authorized supplier.
Workflow in Microsoft Office SharePoint Server Jessica Gruber Consultant Microsoft Corporation.
Page ADP Technology Training. 2 Page2 Confidential Copyright © 2007 Pearson Education, Inc. and/or one or more of its direct or indirect affiliates. All.
Panasonic UC Pro - Activation Keys installation -
IPEmotion License Management PM (V1.2).
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
Business System Development
Guide to Linux Installation and Administration, 2e
People used to install software on their computers
Customized Solutions to your needs
Chapter 3 Installing and Using Software
Computer Maintenance Software Configuration: Evaluating Software Packages, Software Licensing, and Computer Protection through the Installation and Maintenance.
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
® IRL Solutions File Number Here.
Presentation transcript:

HASP ® SRM Enabling Business Growth through Software Rights Management All Rights Reserved © 2007 Aladdin Knowledge Systems. Yariv Drory International Technical Support Manager June 2007

HASP Software Rights Management Hardware-based and software-based protection & licensing system The industry’s first all-in-one solution Advantages of both worlds gives numerous options for: –Strong protection against software piracy –Unmatched protection for your intellectual property –Flexible and secure licensing & distribution

Hardware-Based vs. Software-Based Solutions FeatureHardware-based SolutionSoftware-based Solution Software and IP Protection Secure Licensing Trialware Portability Licensing for Multiple Features/Modules Enables ESD Doesn’t Require Online Connectivity Super-Distribution Not Affected by PC Changes Vendor Has Full Control Affordability of Solution Now Combine the Advantages of Both into a Single Solution!

How HASP SRM Works: Vendor Site Developer Protects Software Protected Software PM Defines License Licensed Software PM Defines HASP Key Type Software Protected with HASP HL or HASP SL Ship Software to End-User Product Key Boxed Delivery Electronic Delivery Software Vendor

How HASP SRM Works: End User Site 3467 A3C F49B Protected Software HASP SRM Business Studio Server

Protection with HASP SRM HASP SRM Envelope in Action (end user site) Envelope-protected Software Trialware Provisional Mode Decrypted Data AES HASP HL HASP SL Encrypted Data Software locked to any key with any license Module Rental Subscription Floating

hasp_login() hasp_decrypt() Protection with HASP SRM HASP SRM API Single runtime API Toolbox – tutorial & code generator Encrypt / Decrypt data Universal API for all HASP locks Cross-platform (2 nd release) Access to memory & secure storage Backward compatible to HASP HL Automatic & customizable licensing

HASP SRM Product Activation Machine fingerprint is a hash generated from the PC's hardware configuration, determined by: –CPU, BIOS and motherboard, hard disk, optical drives (CD or DVD-ROM), MAC address, PCI information (e.g. storage controller, display adapter). Server validates that Product Key has been used on number of PCs as specified by ISV End User Enters Product Key 3467 A3C F49B Product Key and Machine Fingerprint Sent to Server HASP SRM Business Studio Server HASP SL & License Sent Back Validation

HASP SRM Product Activation Product Activation can be done over Internet or via file ( ) SSL-based secure communication Degree of tolerance enables changing hardware components Prevents hard disk cloning (2 nd release) End User Enters Product Key 3467 A3C F49B Product Key and Machine Fingerprint Sent to Server HASP SRM Business Studio Server HASP SL & License Sent Back Validation

Licensing with HASP SRM All licenses can be locked to HASP HL or HASP SL Out-of-the-box or customized Supported licenses: Try-Before-You-Buy Rental/Subscription Module/Feature-Based Floating Floating & Time-Based Volume

Orders & Fulfillment with HASP SRM -User name -HASP HL ID -Product key -Licenses -Memory data HASP SRM Business Studio TM Client Server Generates licenses, product keys, upgrades Role-based tool SQL Server 2005 Express Edition Tracks user & registration info Infrastructure for backend integration (2nd release)

Questions?

Summary: Choices & Flexibility with SRM Protect Once: Get paid for every software copy: Envelope or API Deliver Many: Create attractive packages and pricing models with secure flexible licensing & secure remote update: automatic or customized Cross-Locking TM : New business opportunities: HASP HL or HASP SL Distribution: Reach the market quickly with Web download or sell traditionally (shrink-wrapped) Activation: Security in the field: Server-based or HASP HL-based

Mix and Match to create the optimum DRM solution that meets your business needs Protection LicensingDistribution