Dongle Protection Research and Emulation Service 

Twitter LinkedIn YouTube E-mail RSS
Home Information Keylok II

Keylok II

Keylok key features list is placed below:

  • memory read access via 3 codes
  • memory write access via 3 codes
  • 128 bytes memory
  • expiration date

Client ID, Read and Write codes depends from two Validate codes.
The Validate codes depends from two Master codes.

Algorithm for calculate all codes is known.

Universal solution for this key available on request. Please contact us by e-mail for details.

List of software which protected via Keylok dongle.

© team, 2005-2015