Professional Documents
Culture Documents
Protecting Your Software With Hasp HL and HASP4 Parallel
Protecting Your Software With Hasp HL and HASP4 Parallel
Software with
HASP HL and
HASP4 Parallel
V2.0
Contents
Introduction ....................................................................................................................................1
Accessing HASP4 and HASP HL Keys.........................................................................................2
Using the HASP Driver..................................................................................................................3
Using the HASP Envelope .............................................................................................................4
Using the HASP API......................................................................................................................4
Programming the Memory of HASP Keys.....................................................................................7
COPYRIGHTS AND TRADEMARKS
The HASP® HL system and its documentation are copyrighted (C) 1985 to present by
Aladdin Knowledge Systems Ltd. All rights reserved.
All other trademarks, brands, and product names used in this guide are trademarks of their
respective owners.
Introduction
Thank you for choosing HASP HL to protect your software against unauthorized use. This short guide
describes how to combine HASP4 parallel keys with HASP HL keys to protect your software.
Refer to this guide only if you wish to protect your software with both types of keys: HASP HL with its
advanced technology (refer also to the HASP HL Software Protection and Licensing Guide), and HASP4
parallel. If you are using HASP HL as a HASP4 key, continue using the HASP4 software and tools, and
refer to the HASP4 Programmer’s Guide for documentation.
The following table lists the various HASP4 models and their compatible HASP HL models:
1
To protect your software with HASP HL and HASP4 Parallel keys you need to combine the two
technologies and use tools that are available for both. These are described in the next sections of this
guide:
HASP HL is fully backward compatible to HASP4. This means that any HASP4-protected application can
run with a HASP HL key without requiring you to modify or upgrade your software or drivers. Although
HASP HL is backward compatible to HASP4, their access mechanisms are different.
¾ To access a HASP HL key you need its corresponding MASTER HASP HL key.
According to the type of keys you order, these are your access rules:
If you have a Developer Kit and are evaluating a demo HASP HL and demo HASP4 parallel keys:
• HASP HL demo keys do not require a Master key. Therefore to access your HASP HL just use the
HASP HL tools supplied on the HASP HL software CD.
• To access your HASP4 parallel demo key use the passwords in the following table, according to the
HASP4 demo model you received:
2
HASP4 Demo Key HASP4 Passwords
HASP4 Std (DEMO3A) 5932-25657
HASP4 M1 (DEMOMA) 15417-9632
HASP4 M4 (DEMOMA) 15417-9632
HASP4 Time (DEMOMA) 15417-9632
HASP4 Net (DEMOMA) 15417-9632
If you have a Starter Kit and are using coded HASP HL and coded HASP4 parallel keys:
• To access your coded HASP HL keys use the Master key supplied in your kit.
• To access your coded HASP4 parallel keys use the HASP4 passwords supplied with your HASP4
keys.
If you are an existing HASP4 customer switching to HASP HL, and want to continue using your
HASP4 parallel keys:
• To access your coded HASP HL keys use the Master key supplied with your keys.
• To access your coded HASP4 parallel keys use the HASP4 passwords you have used so far.
NOTE:
Your Master HASP HL key and HASP4 Passwords should be supplied to you with your keys.
If you are missing one or both, please contact your local HASP representative.
When combining HASP HL and HASP4 technologies you need to install the HASP HL driver which
communicates with both HASP HL and HASP4 keys. The HASP HL driver can be found on the HASP
HL software CD.
3
Using the HASP Envelope
The Envelope is an automatic tool that enables protecting your software in seconds while providing a high
level of security. We recommend you always use the Envelope to provide your software extra security
measures that prevent illegal use, reverse engineering, code debugging, and other types of attacks.
The HASP HL Envelope does not support HASP4 keys. Therefore, if you’re combining HASP4 and
HASP HL you need to wrap your application files with the HASP4 Envelope. Applications protected
with the HASP4 Envelope will communicate with HASP HL keys as though they are HASP4 keys.
Although the HASP4 Envelope uses the HASP4 technology to secure your software, it is an extremely
strong and robust tool.
To obtain the latest version of the HASP4 Envelope contact you local HASP representative or download it
from the Aladdin support web page at: http://www.hasp.com/h4. Select “HASP Development and
Production Tools” and download the “HASP Envelope”.
The HASP HL API lets you customize your protection and insert calls to your protection keys throughout
your application source code.
The HASP HL API supports HASP4 keys. Therefore if you’re combining HASP HL and HASP4 parallel
keys you can use one set of API calls – the HASP HL API.
Implementing the HASP HL API is a simple process requiring the following steps:
4
The HASP HL API functions are not dependent on the key models accessed or the platforms on which
they run. The login function is the gateway to HASP HL API implementation. To search for and
communicate with a HASP HL or a HASP4 parallel key, a successful login session must be established.
In order to login to a HASP key, you need to specify your Vendor Code (accessed from your Master key),
and a Feature ID into which you login. Only after a successful login call is executed, other functions can
be used to communicate with the key.
HASP_ PROGNUM_OPT_CLASSIC.
5
Once you have logged into a HASP HL key and established a session, there is a wide range of HASP HL
API functions that you can utilize in building a solid protection scheme. For more about the HASP HL
API refer to the “HASP HL Software Protection and Licensing” Guide.
6
Step 3 – Closing the session with the HASP key.
Call the hasp_logout() to end the session with the HASP key.
The HASP HL and HASP4 range of software provide you with the necessary tools used to license and
program the memory of HASP keys. HASP HL keys generally have a greater memory capacity than
HASP4 keys.
HASP HL
Model Memory Number of Licenses
Size
HASP HL Pro 112 bytes 16
HASP HL Max 4032 bytes 112
HASP HL Time 4032 bytes 8 (limited date) + 104 (limited activations)
HASP HL Net 4032 bytes 112
HASP4
Model Memory Number of Licenses
Size
HASP4 M1 112 bytes 16
HASP4 M4 496 bytes 112
HASP4 Time 512 bytes 8
HASP4 Net 496 bytes 112
HASPEdit is used to program and store licenses in the memory of HASP4 keys. For more information on
using this tool, please refer to pages 73-105 in the HASP4 Programmer’s Guide. To obtain the latest
version of the HASPEdit contact you local HASP representative or download it from the Aladdin support
web page at: http://www.hasp.com/h4. Select “HASP Development and Production Tools” and download
“HASP Edit”.
7
HASP HL Factory is used to program and store licenses in the memory of HASP HL keys. You can find
Factory on the HASPHL software CD. For more information on this tool, please refer to pages 109-126 in
the HASP HL Software Protection and Licensing Guide.
The feature IDs and program numbers that you use in HASP HL to assign licenses correspond to the
Program Numbers used with HASP4 parallel keys. For example, if you assigned your application or
module Feature ID 3 in HASP HL, the corresponding HASP4 Program Number must be 3.