Subscription and pay-per-use licensing models are becoming increasingly popular. They are attractive to customers, who only pay for software or services that they actively use, and they are popular with software vendors because they provide opportunities to fully monetise software.
If a customer reports that a dongle is lost or stolen, are they telling the truth or trying to get an extra licence? How can you balance good customer service with protecting your revenue?
This release includes everything you need to get started with DinkeyOMS, our new cloud-based licence management system for Dinkey Pro and Dinkey FD dongles.
This article explains the most common software licensing models and lists various ways you can enforce your software licence terms and conditions. Particular focus is given to how software protection systems can control the use of your software and the number of copies allowed.
USB MFA security keys are physical authentication devices that provide an additional layer of security beyond traditional passwords. They work using cryptographic protocols and by requiring the user to physically interact with the device in order to verify their identity.
In conjunction with S-Markt & Mehrwert savings banks in Germany can provide secure and convenient eID processes for their customers. The Feitian bR500 Bluetooth smart card reader makes this process possible on tablets and mobile.
FIDO, qui signifie Fast IDentity Online (Identification rapide en ligne) est un ensemble de normes d’authentification visant à renforcer le processus de connexion des utilisateurs aux services en ligne. Ces normes sont élaborées par l’Alliance FIDO et favorisent des processus d’authentification plus rapides et plus sûrs, l’objectif global étant d’éliminer complètement les connexions par mot de passe.
We are pleased to announce the release of our smartphone app for programming OATH OTP tokens. Using an NFC-enabled smartphone our programmable tokens can be flashed with new secret keys and settings. This allows hardware tokens to be used as a replacement for authenticator apps for 2FA/MFA on platforms including Microsoft Azure, Office365, AWS and Google.
The latest Dinkey Pro/FD release introduces support for Apple silicon.
L’ouverture de session Windows à l’aide de cartes à puce et de tokens améliore considérablement la sécurité de la connexion pour les comptes d’utilisateurs du domaine. Le présent article donne un aperçu de la connexion par carte à puce et des options matérielles disponibles chez Microcosm.
You have invested a significant amount of time and creativity in writing your killer application but you are worried about a competitor or hacker reverse-engineering your software and stealing your intellectual property. What is the best way to protect it?
It is common practice for software developers to release demo versions of their software so that potential customers can evaluate its functionality before purchasing it. This licensing model is usually known as trialware, demoware or "try before you buy". This article explores how software demos can be provided in a secure way while protecting IP and revenue streams.
La protection des logiciels fait référence aux mesures que peut prendre un développeur de logiciels pour empêcher l’utilisation non autorisée de son logiciel, en faisant respecter son contrat de licence et en utilisant des techniques d’anti-débogage et d’anti-ingénierie inverse pour protéger sa propriété intellectuelle (PI) contre le vol.
We're excited to bring you version 7.5 of the Dinkey Pro/FD SDK. Almost two years in the making, this release expands the capabilities of Dinkey Pro/FD in many different ways, allowing you to protect more software on more platforms than ever before.
With over 30 years experience in the software protection industry, Microcosm offers a range of copy protection solutions that delivers the perfect combination of security and ease of use. In this post we outline our history and describe our current software protection solutions.
Answers to common questions relating to importing, provisioning and managing OTP hardware tokens in 2FA and MFA environments.
Compte tenu du nombre important de normes relatives aux cartes à puce, il est important de comprendre leur signification et leur pertinence. Dans cet article, nous donnons un aperçu de plusieurs normes clés et du rôle qu’elles jouent dans l’écosystème de la carte à puce.
GIDS sets out the functionality of a physical identity device that can be used for authentication, such as a smart card or USB token.
PKCS#11 définit une API pour communiquer avec des jetons de sécurité cryptographiques ("tokens cryptographiques") tels que les cartes à puce, les clés USB et les modules de sécurité matérielle (HSM). Également connu sous le nom de "Cryptoki", PKCS#11 fait partie des normes de cryptographie à clé publique.
Microcosm is pleased to announce that Korum Secure is our new distributor in France.