Free Newsletter
Register for our Free Newsletters
Zones
Access Control
Alarms
Biometrics
Detection
Deutsche Zone (German Zone)
Education, Training and Professional Services
Government Programmes
Guarding, Equipment and Enforcement
Industrial Computing Security
IT Security
Physical Security
Surveillance
View All
Other Carouselweb publications
 
 
 
 
 
 
 
 
News

Intellectual property protection for Java applications

Aladdin Knowledge Systems : 12 August, 2008  (New Product)
V3.50 of HASP SRM offers a range of enhancements including key memory management improvements and file wrapping
Aladdin Knowledge Systems has announced the release of Aladdin HASP SRM v 3.50, adding automatic file wrapping for Java applications, enhanced security and ease-of-use to Aladdin’s award-winning, fully-integrated hardware- and software- based copy protection and licensing solution.

The HASP SRM Java Envelope provides advanced protection for Java Archive (JAR) files through strong encryption, protecting against reverse engineering at the class-level through the encryption of user-selected class files. Within just minutes, the HASP SRM v 3.50 Java Envelope automatically “wraps” Java applications in HASP SRM’s award-winning copy protection without requiring any changes to the source code itself.

A cross-platform environment based on intermediate code, Java is highly prone to reverse-engineering, making Envelope protection critical to securing intellectual property. Unlike other software DRM solutions, the HASP SRM Java Envelope does not require the conversion of Java files into another format in order to implement HASP SRM software- or hardware-based locking. HASP SRM v 3.50 is the only automatic file wrapping system that supports both hardware and software locking.

“Aladdin’s commitment to supporting all major development environments and operating systems is clearly displayed in the newest version of HASP SRM,” said Laila Arad-Allan, vice president of software digital rights management at Aladdin Knowledge Systems. “Java applications are frequently used in mobile phones, smart card devices, and embedded software development for medical machinery, parking pay stations, Web cameras and games. The widespread use of Java poses an increased risk to these segments, making intellectual property protection an absolute necessity wherever Java applications are included.”

HASP SRM v 3.50 provides software developers with enhanced security, adding clone detection to software-based licenses to preserve revenue through detection of fraudulent software licenses. Once detected, software publishers can choose to cease functionality of the duplicate software license until the user contacts the software publisher to validate the license.

New features and granular, role-based tools provide enhanced visibility, allowing software publishers to make informed decisions quickly and easily, and improve productivity by giving more independence to order entry and fulfillment roles:.

* Improved Key Memory Management: Enhanced key memory management tools enable order entry representatives to use pre-defined default memory values or overwrite new information to the key memory when the order is placed with no fear of impacting the key’s functionality.

* Business Studio GUI Enhancements: In response to customer requests, the Business Studio interface has been updated to include a number of new ease-of-use functions including the ability to multi-select from a list, search directly from the “Customer Name” field in the order form without the need to open a new search, new easy-to-find buttons that replace drop-down menus, and the ability to copy & paste product keys for use in emails, on labels, etc.

* Update Handling Improvements: Additional user-requested functionality has been added to the Business Studio API that enables order fulfillment staff to streamline simple updates to software in the field; including the ability to wipe licenses clean before installing a license update.


Bookmark and Share
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com