Copy Protection
					
					
				
				SOL vs. TRADITIONAL COPY PROTECTION SCHEMES
Over the last 15 years, we have developed other applications that we have tried to 
					protect using various methods. SOL was developed as a result of our desire for a better 
					system. We would like to share our experiences with using other, traditional copy protection schemes:
				
Copy Protection Scheme 1: Software Based - Machine ID Protection
The software is installed using the machine ID (mac address, volume no., etc.) 
					of a client’s computer so that the software cannot be installed on another 
					computer. The client contacts the developer with the machine ID (often 16 or more digits). Then, the 
					developer runs a license program provided by the copy protection manufacturer to generate an unlock code 
					(often 24 or more digits). Client enters unlock code at setup and the program is installed 
					(the unlock code only works for one computer).
					
					Problems with this scheme:
					
						1) If a client's hard drive crashes, the unlock information is lost and the 
						machine ID changes. The client must contact the developer (with the new machine ID) to 
						re-install the software. The developer has no way to know if the new machine ID is from a 
						crashed computer or from a new computer. Therefore, a client could lie about the hard drive 
					    crashing to install the software on a second computer without having to purchase a second license (and 
						third, fourth, etc.).
						
						2) Clients frequently replace older computers forgetting that there is 
						copy-protected software on them. You may have implemented a “transfer process” so that your 
						client can uninstall the license from one computer and transfers it to a new computer. 
						Unfortunately, clients often forget to use your transfer process before replacing the computer. Again, your 
						client could end up with an extra license if he or she "makes up a story" about 
						replacing a computer.
						
						3) If a client uses a Citrix network (or similar), they can install the 
						software on one machine but spawn it to multiple terminals. Therefore, they can have unlimited users 
						for the price of just one license.
						
						4) Even without a hard drive crash, Windows updates and virus protection 
						software often corrupt the unlock information (or, your clients simply forget how to transfer 
						a license and call you). You may be able to confirm that the machine ID is the same and that 
						only one machine is licensed, but it is still a big inconvenience for you and your 
						client to constantly regenerate unlock codes (especially if the unlock codes are 24 digits long 
						compared with the simple LOGIN-INFO that SOL uses). Also, with this scheme, you need to run an 
						.EXE to generate unlock codes which means that you need to be at your computer.
						
						5) This scheme may be inconvenient for your clients because it ties the 
						software to one computer. For example, a client wants to use the software at the office and at 
						home. Or, the licensed computer is tied up by a co-worker who isn't even using your software.
						You can give them two unlock codes, but then they essentially have two licenses for the price of one.
						
						6) This scheme might offer a network license system so that the program can be 
						shared over a LAN and not be tied to one computer. However, the setup for this is 
						often complicated and difficult to maintain. Since all office networks are different, you may end 
						up spending too much time diagnosing network problems and not even getting the software to 
						work.
						
						
| In summary, the machine ID copy protection scheme: 
 | 
Copy Protection Scheme 2: Hardware Key or “Dongle”
A small device called a “dongle” is attached to a computer’s 
					serial port or inserted into a USB slot. If the dongle is absent, the software 
					runs in demo mode or not at all.
					
					Problems with this scheme:
					
					1) This scheme delays the time between purchase and use for end-users since the 
					dongle has to be mailed before the software will work. It is impossible to do a purely 
					automated, Internet sale.
					
					2) If the end-user loses the dongle, the developer would most likely just send 
					another -- if the end-user lies (rare, but possible) about losing the dongle, they gain another 
					license. For example, you may have a $3000 software product protected by a dongle. You can’t 
					really expect the client to pay another $3000 if they lose the dongle. On the other hand, if you send 
					another dongle and they later "find" the first one, they now have 2 copies of your 
					software for the price of one.
					
					Note: see SOLKey under "License Options." With SOLKey, you store your 
					dongle serial numbers in your client database. If a client loses a dongle, you can deactivate it and 
					issue another. Therefore, if the client later "finds" the first dongle, it will not 
					work.
					
					3) If a client uses a Citrix network (or similar), they can place the dongle on 
					one machine but spawn your application to multiple terminals. Therefore, they can have 
					unlimited users for the price of just one license.
					
					4) End-Users don’t like dongles  they lose track of them in a large 
					office, forget them if traveling, run out of USB ports on their computer, etc.
					
					5) Some dongles have network options, but again, they may not easily work on 
					all networks.  The developer may end up spending a large amount of time getting it to work 
					over a client’s network.
					
				
| In summary, the dongle protection scheme: 
 | 
	
					However, if you want to offer your clients dongles, you can use SOLKey to safeguard
					them from being lost.
					
					
				
The SOL Copy Protection Solution
1) SOL is unaffected by a client’s hard drive crash or if they get a new 
					computer -- the client simply reinstalls the software. The LOGIN-INFO you issue to them is all they 
					need to use the software no matter how many times they reinstall. With a SOL network license 
					(SOLNet), the number of installations is irrelevant because they can’t have more concurrent 
					users than you’ve assigned. Likewise, with a SOL time/unit license (SOLMeter), the number of installations 
					is irrelevant because their usage is logged regardless of the number of computers used.
					
					2) SOL works in a Citrix environment controlling the number of concurrent users 
					or logging the time used. It doesn’t matter if multiple copies of your software are 
					spawned since all use is controlled and logged in the SOL Internet database outside the Citrix network.
					
					3) With SOL, you will not be bothered to regenerate unlock codes. You issue 
					your client LOGIN-INFO and that is all they need regardless of the number of installations. 
					Issuing LOGIN-INFO can be done while traveling since it requires only an Internet browser. Even 
					better, you can automate your web site so that it sets up new clients without your 
					intervention. Either way, your client can begin using your software immediately!
					
					4) SOL is the easiest network solution. Since there is no network setup on the 
					client’s server, you don’t need to have knowledge of all the different networks out there. 
					Your clients simply install your software and enter LOGIN-INFO. They can work at the office, from home, or 
					on the road needing only an Internet connection. (If your clients need to work periodically 
					without an Internet connection, you can issue them hardware keys and use SOLKey to safeguard them 
					from being lost.)
					
					
| In summary, the SOL copy protection system: 
 | 

HOME COPY PROTECTION
					COPY PROTECTION  LICENSE	OPTIONS
					LICENSE	OPTIONS DEMO/SIGN-UP
					DEMO/SIGN-UP  FAQ
					FAQ CONTACT
					CONTACT








