CRYPTLEX DOCUMENTATION

Node Locked Licensing

Software licensing helps you to effectively maximize your software revenue by protecting you against software piracy. Node locked licensing gives you complete control over how many times a customer installs your software. It is most effective for preventing casual piracy.

How node locked licensing works?

The basic concept of node locked licensing is that your application should contact any online activation server, to confirm the validity of the product key provided by the user to activate your product. It should make sure it uses asymmetric and symmetric cryptographic algorithms to encrypt the data exachanged between your application and activation server. The whole process is explained briefly in the following steps:

1. LexActivator sends an activation request

  • User provides a product key
  • LexActivator generates multiple unique machine fingerprints
  • It encrypts fingerprint, product key and some other data and sends it to the Cryptlex servers
  • Encryption is done using standard asymmetric and symmetric algorithms

2. Cryptlex Server validates the activation request and sends back an activation response

  • Server decrypts the data and verifies the info present in the request
  • If product key is valid stores the machine fingerprint
  • Generates and sends back an encrypted and cryptographically signed activation response

3. LexActivator receives the activation response

  • It verifies the signature of the response
  • Decrypts the response
  • Depending on the decrypted response informs your application whether to allow or disallow the user