Are you looking for hardware protection
for your own software?
Other available solutions seem too complicated and/or too expensive? Use lockey!
40 zł (excl. VAT)
Offers a basic level of security for
It has 256 bytes of memory available after authentication. Allows, for example, storing license for the protected software. The data are kept in memory in encrypted form and impossible to decipher even by the manufacturer of the dongle. Data safety is strengthened by the use of AES algorithm.
45 zł (excl. VAT)
Hardware protection dongle with 4KB of
available memory, designed for programmers demanding more
Has 4 slots for securely storing encryption keys. It enables strong encryption of valuable data. For example can be used with encrypting project files of protected application, securing data transmission over network, generating digital signatures for documents.
65 zł (excl. VAT)
Software protection dongle created
especially for your Raspberry Pi B+/2/3.
4KB of non-volatile memory for secure storage, hardware based AES (Advanced Encryption Standard) data encryption/decryption, and battery supported RTC (real time clock), all accessible over secure transmission channel. Uses I2C bus for communication. Shares API with USB versions and can be used together on same system simultaneously.
Windows: XP, 7, 8, 8.1, 10 (x86/amd64),
Linux: Ubuntu 16.04 oraz inne (x86/amd64)
Raspberry Pi B+/2/3: Raspbian, Arch Linux operating systems
Raspberry Pi B+/2/3: Raspbian, Arch Linux operating systems.
Are you a programmer/developer?
Working on a new application project, spending your
valueable time? If so, there's to be moment coming when
you ask yourself:
- How do I protect my own software from software piracy?
- How do I ensure maximum profits from its sales?
Answer could be easy. We created lockey for this exact purpose: to secure your application and to do it fast and without the hassle.
The theft of software, commonly known
as piracy entails often enormous financial losses for
application developers and distributors.
Invested time and money spent on development in what is often a huge project are wasted, as revenues from sales don't reach satisfactory levels.
There are many methods, starting from
simple, software-only ones, to advanced, which often are
hardware based. There are many offers from different
companies, providing anti piracy protections.
Using hardware based solutions typically results in much higher level of security for protected applications or data.
The question is typically asked by a person when looking into the issue of software protection for the first time. Answer is actually pretty simple, and it's "no". There's no 100% proof method for protecting software. There're however solutions which hinder possible attempts to remove all license restrictions to a point where doing so is no more worth the effort. The big part in that have strong cryptographic algorithms. Their use can result in an unprecedented level of application protection and make the hacking no more viable even if only for the time needed to conduct an effective attack.
Properly used hardware-based protection, for example lockey, will greatly minimalise the risk of losses due to the illegal use of pirated copies of your created software. A relatively small investment in security can quickly multiply the profits from the sale of protected software.
The current scale of software piracy
is best illustrated by the data from the BSA (NINTH ANNUAL BSA AND IDC GLOBAL
SOFTWARE) portal that studies this problem.
Unfortunately the facts are inexorable and statistics do not inspire with optimism. The cost of software security can be really small when compared to losses due to software piracy.