Solutions for Online Distribution
FL ProActive is for professional protection of programs distributed via the Internet from illegal usage, industrial or home-made copying, professional cracking and reverse engineering
FL ProActive combines both reliable and friendly protection technologies with DRM. It allows implement several models of product licensing (demo, try&buy, try&die, buy only, subscription, rent) and ensures compulsory program activation by the end user.
A license is bound to the configuration of the computer onto which the program is installed, which, thus, ensures the end user respects the license conditions.
| |
White Paper
FL ProActive
ZIP,
82 KB |
FL ProActive features:
- Program protection and control over its usage and distribution
- Wide range of licensing models
- Silent program activation with minimum or no user interaction
- Fast releases of the program
Protection can be comfortably applied to a program via Internet directly from customer’s side
- Individual treatment of partners and distributors
Modeling of trading networks; distinguishing rights to applying protection and distribution
- Ability to change the way a program is distributed in the future
- Regional settings
This allows determining regions where selling of the protected program is legal
- Protection settings flexibility
There are a number of ways available to defining protection settings of a protected program to the end user’s computer
- Protection settings tuning taking into account the protected program’s architecture and preferred way of its distribution
- Limiting of the protected program’s functionality
- Private web-office
This gives the following benefits:
- Manager serial numbers and get their usage reports
- Control of the product’s usage and distribution
- Set limits on the protected program taking into account the business model
- Protection of program’s updates
- Protection of an unlimited number of executable files
- Deactivation of a licensed program by the end user New!
The end user is enabled to transfer the protected program from one computer onto another via deactivating and further activating the program with the same serial number. This applies also to the case when the end user reinstalls OS or modifies computer hardware configuration. This ensures the end user feels comfortable using the protected program.
For what products is it recommended?
This solution aims to protecting any programs (games, MMOG, utilities, etc.) distributed via the Internet.
It is recommended also for protection of promo- and demo of software, beta version of products for external testing and etc.
The FL ProActive comes in two flavors to satisfy different groups of customers:
| Basic | Pro |
What to use | To protect inexpensive programs distributed via Internet | To protect any kind of programs distributed via Internet |
Protection level | min | min-max |
Licensing models available | Buy only | Demo; Try&Die; Try&Buy; Buy only; Rent; Subscription |
Base features:
- Specification of the type of the key
- Specification of how many times a program can be activated (defaults to 10)
- Specification of the minimum time before program reactivation
- Specification of the level of binding | + | + |
Scope limits:
- Specification of a serial number time scope
- Specification of the start date of the license
- Specification of the end data of license
- Specification of the license validity scope | + | + |
Regional settings: Specification of a list of countries where the license can be activated | - | + |
Setting program functionality limits | - | + |
Additional features
- Specification of the maximum number of workstations the program can be activated simultaneously
- Specification of the maximum number of program’s runs
- Specification of how long the program can work without restart | + | + |
Custom logic of program functioning depending on a serial number’s part | - | + |
Editing of serial numbers/Serial number generation parameters This allows changing of the distribution policy of the program already released, changing of parameters by certain end users, etc. | - | +* |
Serial number Black Listing Allows creating black list of compromised serial numbers so that to help block activation of protected programs. | + | + |
Serial number generation by time report Allows to get a report of serial number generation during a specified period | + | + |
Serial number generation by program report Allows to get a report of serial number generation for a certain protected program | + | + |
Serial number activation statistics report Allows to get a report of when each serial number has been activated | + | + |
Serial number activation statistics by scope Allows to get a report of activated serial number during certain period | + | + |
Deactivation of a program by end user | + * | + * |
Applying protection by StarForce engineers without code modifications | + * | + * |
Applying protection by StarForce engineers with code modifications | + * | + * |
Twenty-four-hours StarForce support service | + | + |
Crack-proof guarantee during certain period of time | - | +* |
« + » – available « - » – unavailable « +*» – extra fee
|