Dinkey Pro/FDHardware-based Copy Protection and Licensing
Dinkey Pro/FD is a sophisticated system designed to protect your software from illegal copying and enforce the terms of your software's licence.
Use Dinkey Pro/FD to lock your software to a dongle so that each time you run your protected program, it will check for the presence of the dongle. If the right dongle is found, the program will be executed, otherwise it will not run.
Dinkey Pro/FD can be used to protect both 32-bit and 64-bit software for Windows, Mac OS X and Linux on any x86 or x64 platform. PDF documents can also be protected for use on Windows.
We believe Dinkey Pro and FD dongles are the best in the industry and here is why:
Our dongles use drivers built-in to the opeating system so there is no need to install drivers.
Supported on Windows, Mac OS X and Linux operating systems on x86 and x64 platforms.
Dongle hardware is based on smart card technology that is proven to be very secure and is widely used in the security industry. Common Criteria EAL4+ Certification.
Communication between your software and the dongle uses very strong encryption techniques: a mixture of RSA encryption and strong 128-bit encryption. Using RSA encryption means that even if a hacker discovered the public key in our software then they could not work out the private key in the dongle. This means it is not possible to emulate the hardware dongle.
We offer many techniques to improve the security between your code and our code. This is lacking in many dongle systems but it is often the weakest part that hackers exploit. For example, you can encrypt all the parameters you pass to our API. This is not possible with any other dongle protection system. We have strong anti-debug code, a hallmark of all our software protection systems.
Shell wrapper protects and encrypts 32-bit and 64-bit Windows executables and DLLs (including .NET assemblies) automatically, without having to modify any source code. It can also protect PDF documents for use on Windows.
Protect Data Files
If you use our Shell wrapper to protect your application then you can also encrypt data files that are accessed by this application.
The Plus and Net model dongles can be used to encrypt or decrypt data you pass to them. All encryption is executed in the dongle itself.
Many Languages Supported
We supply full sample code and detailed programming notes in >a large number of programming languages.
Free Technical Support
Technical support is offered free of charge as standard - forever!
Our prices are some of the lowest in the industry.
We have thousands of customers in countries all over the world who trust Microcosm products to protect their software.
Our Dongle Range
We offer two different types of dongles: Dinkey Pro and Dinkey FD. Each dongle type is available in three different models: Lite, Plus and Net.
The flexibility of the Dinkey Pro/FD allows you to protect software that will work with any and all combinations of type and model.
Dinkey Pro is a range of driverless USB security keys combining robust security with great functionality. Based on smart card technology, the Dinkey Pro uses powerful encryption algorithms and strong authentication techniques.
Dinkey FD Dinkey FD security keys combine a Dinkey Pro dongle and an 8GB flash drive in the same USB device.
Lite dongles allow you to protect your software simply and quickly without the need to program dongles.
Plus dongles not only allow you to protect your software, but also to enforce licence terms and store your own secure data. You can set an expiry date, use an execution counter or control the use of various features in your software. You also have the facility to alter these protection parameters remotely just by issuing a secure update code by e-mail or phone. For example, you can extend an expiry date, enable or disable different features or convert trials to full licences.
Net dongles have all the features of the Plus, and in addition allow you to use one dongle per network instead of one dongle per machine. In addition, you can control the number of network users using your protected software at any one time.