Introduction to Software Activation Methods
Software Activation is a technology designed to verify that a software product has been legitimately licensed for use.
The first commercially available ‘non-bundled’ software was sold by mail order in 1975 and developers did not need to worry about how to activate software. The programme arrived by post as lines of code printed on paper that had to be typed out manually. Fast-forward to 2021 and although leveraging software is much easier than it was 46 years ago, software activation solutions are inconvenient and slow and have fallen behind modern ways of working.
Traditional software activation methods that use a product key can introduce a lot of friction into a software business. However, the emergence of cloud computing systems has created new, more reliable ways to on-board legitimate end-users.
If you are a developer or an ISV, find out how implementing the right software activation methods could help you to future-proof your business.
What is Software Activation?
Software activation is a process designed to prevent a developer's software from being copied or used illegally. Products that require a software activation key usually cannot be installed or run until a valid activation code is entered, and it is therefore a way of enforcing software licence agreements with end-users. Sometimes the activation code is linked to the serial number of the device, a cd or an instance of the software.
The software activation key (or product activation key), is usually a string of characters that includes a mixture of letters and numbers. The most basic software activation methods involve a database of software activation codes. Codes are sent to the end users who enter them into the program or installer manually. Activation codes can be included with boxed software products, sent out with confirmation emails, or delivered through technology such as license servers.
How Software Activation Works
Software activation boils down to a simple license check. If a valid license is available the application starts. If not, the user is alerted to enter valid credentials or upgrade their account. The installed software either stores the product activation key locally and checks whether it is valid or invalid, or for more modern cloud-based activation methods, the software periodically checks online to determine access rights.
Outdated Software Activation Methods - a bad example
Pinnacle studio 24 is a creative video editing software. A perpetual license costs £114.95 without offering a free-trial - unlike most of its competitors. The boxed version of the software is physically shipped to the consumer and it comes with a time-consuming 12-step installation process.
The activation key, which has to be entered manually, is located on the disk drive and is therefore not available when the disk is in use during installation. The end user license agreement is signed by the user half-way through the installation process and users are also advised to switch off their virus protection software temporarily. Upgrading or re-installing the software includes locating and deleting hidden computer files.
If the verification mechanism fails due to detected changes in installed hardware or operating systems, the programme may stop working suddenly. In the event of a lost or damaged disk, or a key that stops working, a legitimate software user will have to wait for new software or product keys to be shipped, generating more frustration and potentially even incurring unnecessary financial loss.
For software developers this difficult activation process not only creates customer support tickets, but also ultimately does not offer much protection from copyright infringement. The ISV or developer also has no way of ever knowing whether distributed software has been activated.
Schrodinger's err...software
In the world's most famous thought experiment, physicist Erwin Schrödinger described how a cat in a box could be assumed to be both dead and alive until the box is opened and the actual state of the cat is confirmed. Software activation, at its very worst, plays out this uncertain predicament, potentially indefinitely.
With outdated software activation methods, such as boxed software products sold with an activation key inside the box, it may not be possible to verify the activation state of software. Developers can’t just look in the box - they don’t even know where the box is. This leaves ISVs and developers in the uncertain predicament of not knowing whether a software activation still needs to be supported.
A More Modern Way - Spotify
Spotify is an online music streaming service that provides a great example of good software activation. Users access the software via the web and can download the software for off-line listening on up to 3 devices. They can also run the software via the web app from almost anywhere in the world and a free-trial version is available before committing to buy the premium version.
Accounts are tied to a user’s digital identity via a verified email address and Installed software is node-locked to tightly control the number of permissible installations. The combination of node locking and identity-based licensing enables Spotify to not only track where their software is installed, but also who is using it. Floating software licensing ensures that concurrent usage is virtually impossible. Users are granted one license, which follows them seamlessly across devices and browsers, however because the Spotify app ‘calls home’ whenever an internet connection is available, users are prevented from running more than one instance of the software at a time.
End-users can self-manage their accounts through an online dashboard, and in the event that a device is no longer working, has been lost or stolen, or if they simply decide to transfer the download to different hardware, they can easily deactivate an installation at the click of a button and free-up the installation for a different device.
Once the 30-day trial period ends, users are automatically downgraded to the free plan and can continue listening without any disruption, however the premium features will no longer work until their account is upgraded. The Spotify software activation process is seamless, efficient, secure, automated, agile, fast and user-friendly. Unlike the Pinnacle example, there are no support tickets for developers or shipping physical hardware, free-trials can be used to increase conversion rates and up-sell products - without frustrating end-users.
The Basics of 10Duke Licensing
10Duke Licensing
With 10Duke it’s easy to replicate the world-class software activation process used by companies like Spotify, Netflix and many other leading-edge software service providers, simply by integrating our APIs into your software apps. Free-trials are supported, not just for new users, but also to showcase individual product features to existing customers, regardless of whether they are connected to the Internet or not. You can also integrate your preferred payment provider to accept online payments and automatically upgrade or down-grade accounts.
Automatic issuing and de-provisioning of licenses is a hassle-free way of ensuring that free-trials can be used to grow revenues, while at the same time ensuring that a software product has been legitimately licensed for use. Access to licensed applications is always secure and convenient, helping to protect the intellectual property of the software industry, but with the least impact on paying clients.
How 10Duke license activation works
End-users access your software products through a simple online user-interface. The interface is provided by 10Duke, but is white-labelled and can be completely customised to suit the individual requirements of each ISV or software developer. You decide what information to collect from anyone that accesses your products, whether payment details are required in order to access a free-trial, when and how the license agreement is signed and much more.
The 10Duke Identity Provider API takes care of user account creation. In order to create an account, users are required to provide an email address and a password, and the interface can be set-up to increase online security by enforcing password best practices. For enterprise licensing environments, account creation can be strictly limited to a specific corporate domain or even a specific email address. Social sign-in can be enabled for corporate and personal users, making it easy for your customers to sign-in to your applications using their favourite social log-ins like Facebook, Twitter and Google. You can also allow your customers to serve themselves when they forget passwords or login details, rather than them having to wait for a response from your IT team.
The 10Duke Identity Provider (IdP) is responsible for authenticating the users held within its database any time they try to log in to an application. The IdP sends information to other applications so that they can determine whether software should be allowed to run. From here the 10Duke Entitlements API takes over.
The Entitlements API works in tandem with the IdP by checking the permissions of authenticated users and allowing features and functions to run only when the correct permissions are in place. Granular licensing permissions can be set and managed through an online admin console in order to fine tune licenses to best reflect how customers use software. In effect, that software activation and the issuing of a license are bundled into the same step, making it much easier for you to administer and for your customers to access your application.
Conclusion
If you are not using web-based licensing, then you are not really protecting software at all. Product activation keys are not effective in preventing copyright infringement or preventing unlicensed usage. They are also somewhat inconvenient for end-users as well as software developers and can easily be shared or misplaced. By creating a difficult and time-consuming software activation process, legitimate software users are punished even though copyright infringements are not prevented. If you have created a successful software product, there is a good chance that someone will try to crack it using a key generator, and they will more than likely succeed eventually. What’s worse, you have no way of knowing if this happens.
When you tie software activation to a digital identity you hold your end-users more accountable, but at the same time grant them more freedom and a more modern user experience. Traditional software activation methods do not offer the same degree of flexibility as 10Duke’s identity-based access and can sometimes even prevent legitimate users from accessing a product.
Software activation at its very best involves eliminating software downtime and reduces friction when onboarding new users. It also removes uncertainty and speculation for ISVs - no more Schrodinger's cat! With a cloud and ID-based software licensing solution from 10Duke, you remain in complete control of your software products. Your software IP is protected and you can maintain oversight regarding who is accessing what and when.
Click here to learn about 10Duke Enterprise.
Are you a software developer looking to sell more? Learn more from our guides:
Should You Build Or Buy a Licensing System?
How to Monetize Software Products?
Guide to Software Licensing – Basics Explained
Software Licensing Solutions – Buyer’s Guide
Software Licensing Models – Ultimate Guide
What Is Software License Management?
Customer Identity and Access Management – What should a good CIAM solution provide?
You might also be interested in:
6th August 2024
6th August 2024
Categories
- General
Software License Enforcement: Complete Guide
Discover the importance of software license enforcement and learn how modern solutions can protect intellectual property.
Do you like it?
Read more
30th July 2024
30th July 2024
Categories
- Software Licensing
Key Factors in Choosing a Software Licensing Solution for Stripe Integration
Discover key factors for choosing a Stripe-compatible software licensing solution.
Do you like it?
Read more
18th July 2024
18th July 2024
Categories
- Software Licensing
Choosing the Right Software Licensing Solution if You’re Using FastSpring
Integrating a software licensing solution with FastSpring is a crucial step for software vendors looking to streamline their sales process.
Do you like it?
Read more
8th July 2024
8th July 2024
Categories
- Software Licensing
Key Consideration for Software Licensing Solutions: Salesforce
Integrating software licensing with Salesforce CRM? Discover key considerations including license types, security, scalability, and API limits.
Do you like it?
Read more
28th June 2024
28th June 2024
Categories
- Software Licensing
Simplify Software Licensing Integration with Licensing SDKs
Discover how third-party licensing solution SDKs can streamline integration and reduce development costs for for software businesses.
Do you like it?
Read more
24th June 2024
24th June 2024
Categories
- Software Licensing
Password Management For Software Licensing Migrations
Learn best practices for migrating user profiles, enforcing mandatory password resets, and securely handling existing password hashes.
Do you like it?
Read more
6th June 2024
6th June 2024
Categories
- Software Licensing
Offline Licensing: A Guide for Software Vendors
Discover offline licensing for air-gapped systems, using JWTs and removable media.
Do you like it?
Read more
28th February 2024
28th February 2024
Categories
- Software Licensing
Login-based licensing means to license and control access to software based on user login credentials, simplifying product access.
Do you like it?
Read more
9th January 2024
9th January 2024
Categories
- Identity and Access Management
Why Implement Multi-Factor Authentication (MFA)? A Key to Enhanced Digital Security
Multi Factor Authentication (MFA) involves two or more methods of authentication in order for an individual user to be given access to a system.
Do you like it?
Read more
Software Activation is a technology that verifies a software product has been legitimately licensed for use. Learn how to do it effectively.