• Secure feature activation

    Secure feature activation

    New business models such as “pay per use” or supplementary charges for subsequently sold features are an important trend in many industries. Product costs can also be lowered by using standardized hardware, with product features increasingly being differentiated using software.

Consequently, reliable software activation – and deactivation – of features becomes a central challenge as the risk of unauthorized use of such features increases. Preventing unauthorized feature use is crucial in order to protect the business models affected.

updates
updates

Integrated solution

ESCRYPT’s solution allows simple, yet effective control of the feature activation process. It is based on advanced cryptographic key management that interacts perfectly with a security software component on the embedded device.

User requests to activate features are received by the ESCRYPT backend software over a secure data connection. A real-time authorization check is carried out before the activation is confirmed and transmitted remotely or offline to the embedded device. On the device itself, the license code is verified with the help of CycurLIB.

We ensure that only paid features are used:

New business models thanks to controlled feature activation

Reduction in the number of variants of hardware, resulting in lower production costs

All necessary security products and services from a single source

Risk-appropriate, cost-effective key management solutions for embedded systems designed by experts

Flexible, individual integration into existing solutions

Holistic service: from designing the security concept to implementing the processes at the customer and operating the requisite backend IT systems

Language:
ISO 9001-2008 Home