Blog

Showing 1-20 of 30 items.

How to implement subscription and pay-per-use licensing with dongles

Subscription and pay-per-use licensing models are becoming increasingly popular. They are attractive to customers, who only pay for software or services that they actively use, and they are popular with software vendors because they provide opportunities to fully monetise software.

Read more…

Solving the lost dongle problem

Martin Payne |
Dinkey Pro/FD DinkeyOMS

If a customer reports that a dongle is lost or stolen, are they telling the truth or trying to get an extra licence? How can you balance good customer service with protecting your revenue?

Read more…

Dinkey Pro version 8.0 released

This release includes everything you need to get started with DinkeyOMS, our new cloud-based licence management system for Dinkey Pro and Dinkey FD dongles.

Read more…

A guide to software licensing

This article explains the most common software licensing models and lists various ways you can enforce your software licence terms and conditions. Particular focus is given to how software protection systems can control the use of your software and the number of copies allowed.

Read more…

MFA using USB security keys

Nick Smith |
Authentication FIDO IT Security Hardware

USB MFA security keys are physical authentication devices that provide an additional layer of security beyond traditional passwords. They work using cryptographic protocols and by requiring the user to physically interact with the device in order to verify their identity.

Read more…

eID for German savings banks using the Feitian bR500 with electronic ID cards

Nick Smith |
Authentication e-ID Smart Card Readers

In conjunction with S-Markt & Mehrwert savings banks in Germany can provide secure and convenient eID processes for their customers. The Feitian bR500 Bluetooth smart card reader makes this process possible on tablets and mobile.

Read more…

What is FIDO authentication?

Nick Smith |
Authentication e-ID FIDO

FIDO, which stands for Fast IDentity Online, is a set of authentication standards aimed at strengthening the user login process to online services. The standards are developed by the FIDO Alliance and promote faster, more secure authentication processes with the overall goal of eliminating password-based logins altogether.

Read more…

Smartphone app for programming OATH OTP tokens via NFC

Nick Smith |
IT Security Hardware NFC One-Time Password OTP

We are pleased to announce the release of our smartphone app for programming OATH OTP tokens. Using an NFC-enabled smartphone our programmable tokens can be flashed with new secret keys and settings. This allows hardware tokens to be used as a replacement for authenticator apps for 2FA/MFA on platforms including Microsoft Azure, Office365, AWS and Google.

Read more…

Dinkey Pro/FD version 7.6 released

The Dinkey Pro/FD Team |
ARM Copy Protection Dinkey Pro/FD Linux macOS Shell Software Protection

The latest Dinkey Pro/FD release introduces support for Apple silicon.

Read more…

Windows smart card logon using Feitian ePass2003 PKI cards and tokens

Nick Smith |
Authentication PKI Smart Cards

Windows logon using smart cards and tokens significantly improves the login security for domain user accounts. This post provides an overview of smart card logon and the hardware options available from Microcosm.

Read more…

How to protect your software intellectual property

Martin Payne |
IP Protection Software Protection

You have invested a significant amount of time and creativity in writing your killer application but you are worried about a competitor or hacker reverse-engineering your software and stealing your intellectual property. What is the best way to protect it?

Read more…

How to copy-protect demos and trial software

It is common practice for software developers to release demo versions of their software so that potential customers can evaluate its functionality before purchasing it. This licensing model is usually known as trialware, demoware or "try before you buy". This article explores how software demos can be provided in a secure way while protecting IP and revenue streams.

Read more…

What is software protection?

Software protection refers to measures that can be taken by a software developer to prevent unauthorised use of their software, enforcing their licensing agreement and using anti-debugging and anti-reverse engineering techniques to protect their intellectual property (IP) against theft.

Read more…

Dinkey Pro/FD version 7.5 released

The Dinkey Pro/FD Team |
ARM Copy Protection Dinkey Pro/FD Linux macOS Shell Software Protection

We're excited to bring you version 7.5 of the Dinkey Pro/FD SDK. Almost two years in the making, this release expands the capabilities of Dinkey Pro/FD in many different ways, allowing you to protect more software on more platforms than ever before.

Read more…

Microcosm, the software copy protection experts

Nick Smith |
Copy Protection Software Protection

With over 30 years experience in the software protection industry, Microcosm offers a range of copy protection solutions that delivers the perfect combination of security and ease of use. In this post we outline our history and describe our current software protection solutions.

Read more…

One-time password: frequently asked questions

Nick Smith |
HOTP One-Time Password OTP TOTP

Answers to common questions relating to importing, provisioning and managing OTP hardware tokens in 2FA and MFA environments.

Read more…

Smart card standards: what do they all mean?

Nick Smith |
NFC Smart Cards Standards

With so many smart card related standards in existence it is important to understand what they mean and how they are relevant. In this article we provide an overview of several key standards and what part they play in the smart card eco-system.

Read more…

Generic Identity Device Specification (GIDS) for smart card authentication

Nick Smith |
Authentication GIDS PKI Smart Cards

GIDS sets out the functionality of a physical identity device that can be used for authentication, such as a smart card or USB token.

Read more…

What is PKCS#11?

Nick Smith |
PKCS#11 PKI

PKCS#11 defines an API to communicate with cryptographic security tokens such as smart cards, USB keys and Hardware Security Modules (HSMs). Also known as "Cryptoki", PKCS#11 is part of the Public Key Cryptography Standards.

Read more…

Introducing our new partner, Korum Secure

Microcosm is pleased to announce that Korum Secure is our new distributor in France.

Read more…