We have strong anti-debug code, a hallmark of all our software protection systems. Customisable protection via a web-based interface. This list is not exhaustive. This is not possible with any other dongle protection system. Extremely Secure Dongle hardware is based on smart card technology that is proven to be very secure and is widely used in the security industry. Branding and Customisation Our products use the specifications listed below as standard, but we are able to supply tokens in other configurations to meet the needs of your project.
|Date Added:||21 September 2006|
|File Size:||53.63 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
By careful monitoring of the usage of each installation of your software, it achieves what has up to now been thought impossible: We have thousands of customers in countries all over the world who microvosm Microcosm products to protect their software. This list is not exhaustive.
We supply full sample code and detailed programming notes in a large number of programming languages. Extremely Secure Dongle hardware is based on smart card technology that is proven to be very secure and is widely used in the security industry. More recently, it has expanded its security products by producing SmartSign, a multi-factor authentication system that supports using mobile devices to control access to web pages.
Strong Encryption Communication between your software and the dongle uses very strong encryption techniques: It therefore acts like you would: CopyMinder is effectively keeping an microcosn on each installation of your software. This is not possible with any other dongle protection system. Resilient to hardware failures. All of our OTP tokens can be customised with your logo or other artwork. Previous software-based copy protection systems were much less flexible: If you purchased your Microcosm product through one of our partnersplease contact them for support.
You can still place orders online on uxb days. Use this token for challenge-response authentication, e-signature generation and transaction signing.
Please get in touch to discuss your requirements. For example, you can encrypt all the parameters you pass to our API.
See the table below for further details of the different customisation options available for our OTP tokens. We have strong anti-debug code, mkcrocosm hallmark of all our software protection systems. Buy c Mini OTP tokens. This is lacking in many dongle systems but it is often the weakest part that hackers exploit.
Microcosm – The Software Protection Experts
Please note that you will not be able to place orders or receive technical support by phone on the following dates:. While you might not be able to prevent your software being copied you can prevent it being used. These support pages are for Microcosm customers. If your problem occurs while using one of the SDK utilities, try to reproduce the problem using the latest version of that program.
Buy c OTP Tokens.
Reverse engineering is the process by which a hacker is able to work out what your code is doing just by analysing the compiled code in the executables that you release. Driverless Our dongles use drivers built-in to the operating system so there is no need to install drivers.
If you cannot use the latest version for some reason, make sure that you mention which version you are using when contacting our support team. Our microocosm are some of the lowest in the industry.
Microcosm Ltd – Wikipedia
Our products use the specifications listed below as standard, but we are able to supply tokens in other configurations to meet the needs of your project. It can also protect PDF documents for use on Windows. CopyMinder is much more subtle, flexible and intelligent so it provides even stronger security without hassle for you or your customers.
OTP tokens come in two types: Time-based OTP tokens generate codes that are valid only for a certain amount of time eg, 30 or 60 seconds micrrocosm, after which a new code must be generated.