Frequently Asked Questions

Find answers to common questions about our software licensing system and how it can help protect your software products.

General Questions

What is Shieldz?

Shieldz is a comprehensive software licensing system that helps developers protect their software products. It provides secure license management, activation, and validation features to prevent unauthorized use of your software.

How does the licensing system work?

Our licensing system uses a combination of secure encryption, hardware fingerprinting, and online validation to ensure your software is only used by authorized users. When a user activates your software, they receive a unique license key that's tied to their specific hardware and account.

What types of licenses do you support?

We support various license types including perpetual licenses, subscription-based licenses, trial licenses, and floating licenses. You can also create custom license types with specific features and restrictions based on your needs.

Can I transfer my license to another computer?

Yes, you can transfer your license to another computer. The process involves deactivating the license on the current computer and activating it on the new one. This can be done through our user dashboard or directly in the application.

What happens if I need to reinstall my operating system?

Before reinstalling your operating system, you should deactivate your license. After the reinstallation, you can reactivate your license on the same computer. Our system recognizes hardware changes and allows for a certain number of reactivations.

How do I manage multiple licenses?

Our dashboard provides comprehensive license management tools. You can view all your licenses, their status, and manage them individually or in bulk. You can also set up automated notifications for license expiration and usage monitoring.

Technical Questions

How do I integrate Shieldz into my application?

Integration is straightforward with our comprehensive SDK. We provide detailed documentation and code examples for various programming languages. The basic integration involves adding our client library, implementing license validation, and handling activation flows.

What happens if a user's internet connection is lost?

Our system includes offline validation capabilities. Once activated, your software can continue to function without an internet connection for a configurable period. You can set up offline grace periods and implement fallback validation methods.

How secure is the licensing system?

We employ multiple layers of security including strong encryption, anti-tampering measures, and secure communication protocols. Our system is regularly audited and updated to protect against the latest security threats.

What programming languages do you support?

We provide SDKs and libraries for major programming languages including C++, C#, Java, Python, JavaScript, and more. Our REST API allows integration with any language that can make HTTP requests.

How do I handle license validation in my code?

Our SDK provides simple methods for license validation. You can validate licenses at startup, during specific operations, or periodically. The SDK handles all the complex security checks and provides clear status responses.

What is hardware fingerprinting?

Hardware fingerprinting creates a unique identifier based on various hardware components of the user's computer. This helps prevent unauthorized copying of licenses while allowing legitimate transfers when needed.

Pricing and Plans

What pricing plans are available?

We offer flexible pricing plans based on your needs. Our plans range from basic starter packages for individual developers to enterprise solutions for large organizations. Each plan includes different features and support levels.

Can I upgrade or downgrade my plan?

Yes, you can change your plan at any time. When upgrading, you'll only pay the difference for the remaining period. When downgrading, the new rate will apply at the start of your next billing cycle.

Do you offer refunds?

We offer a 30-day money-back guarantee for all our plans. If you're not satisfied with our service, you can request a refund within this period. Enterprise plans may have different refund policies based on the agreement.

What payment methods do you accept?

We accept all major credit cards, PayPal, and bank transfers for enterprise customers. All payments are processed securely through our payment partners.

Do you offer volume discounts?

Yes, we offer volume discounts for larger purchases. The discount increases with the number of licenses purchased. Contact our sales team for custom enterprise pricing.

What's included in the enterprise plan?

The enterprise plan includes unlimited licenses, priority support, custom integrations, dedicated account manager, advanced analytics, and custom security features. Contact us for detailed enterprise features.

Support and Maintenance

What kind of support do you provide?

We provide comprehensive support through multiple channels including email, live chat, and documentation. Our support team is available 24/7 for enterprise customers, and we offer different support levels based on your plan.

How often do you update the system?

We regularly release updates to improve security, add new features, and fix bugs. Updates are typically released monthly, with critical security updates being released as soon as possible. All updates are backward compatible.

Do you provide training or documentation?

Yes, we provide extensive documentation, video tutorials, and code examples. Enterprise customers also receive personalized training sessions and dedicated technical support to help them get the most out of our system.

How do I report a bug or issue?

You can report issues through our support portal, email, or directly in the application. Our support team will acknowledge your report within 24 hours and work to resolve it based on its priority level.

What is your SLA for support?

Our standard SLA guarantees response within 24 hours. Enterprise customers receive priority support with response times as low as 1 hour for critical issues. We also provide uptime guarantees for our services.

Do you offer custom development services?

Yes, we offer custom development services for enterprise customers who need specific features or integrations. Our development team can work with you to create tailored solutions that meet your unique requirements.

Security and Compliance

How do you protect user data?

We implement industry-standard security measures including encryption at rest and in transit, regular security audits, and strict access controls. All data is stored in secure, redundant data centers with 24/7 monitoring.

Is your system GDPR compliant?

Yes, our system is fully GDPR compliant. We provide tools for data portability, right to be forgotten, and consent management. We also maintain detailed records of data processing activities.

How do you handle data breaches?

We have a comprehensive incident response plan that includes immediate notification of affected users, investigation of the breach, and implementation of preventive measures. We also maintain cyber insurance coverage.

Do you offer compliance reporting?

Yes, we provide detailed compliance reports for various standards including GDPR, CCPA, and industry-specific regulations. These reports can be generated on demand or scheduled for regular delivery.

How do you ensure system uptime?

Our system is built with redundancy and high availability in mind. We use multiple data centers, load balancing, and automatic failover systems to ensure 99.9% uptime. We also provide real-time status monitoring.

What backup systems do you have in place?

We maintain multiple backup systems including daily full backups and continuous incremental backups. Data is stored in geographically distributed locations with encryption and strict access controls.

Integration and API

What API endpoints are available?

We provide a comprehensive REST API with endpoints for license management, user management, analytics, and system configuration. All endpoints are documented in our API reference with examples and authentication details.

How do I authenticate API requests?

API requests are authenticated using API keys and tokens. We support various authentication methods including OAuth 2.0, API keys, and JWT tokens. Each method is documented with security best practices.

Do you provide webhook support?

Yes, we support webhooks for various events including license activation, deactivation, expiration, and system alerts. You can configure webhook endpoints and customize the events you want to receive.

How do I handle API rate limits?

Our API includes rate limiting with clear headers indicating limits and remaining requests. We provide guidance on implementing retry logic and backoff strategies to handle rate limits gracefully.

Can I integrate with my existing systems?

Yes, our system is designed to integrate with common development tools, CI/CD pipelines, and business systems. We provide integration guides and examples for popular platforms and frameworks.

What monitoring tools do you provide?

We provide comprehensive monitoring tools including real-time analytics, usage statistics, and system health metrics. You can also integrate with popular monitoring platforms through our API.