One method assigns a product key based on a unique feature of the purchaser's computer hardware, which cannot be as easily duplicated since it depends on the user's hardware. In addition, with improved communication from the rise of the Internet, more sophisticated attacks on keys such as cracks (removing the need for a key) and product key generators have become common.īecause of this, software publishers use additional product activation methods to verify that keys are both valid and uncompromised.
Standard key generation, where product keys are generated mathematically, is not completely effective in stopping copyright infringement of software, as these keys can be distributed. This function manipulates the key sequence according to a mathematical algorithm and attempts to match the results to a set of valid solutions.
This sequence is typically entered by the user during the installation of computer software, and is then passed to a verification function in the program. Product keys consist of a series of numbers and/or letters. It certifies that the copy of the program is original.
Product key on a Proof of License Certificate of Authenticity for Windows Vista Home PremiumĪ product key, also known as a software key, serial key or activation key, is a specific software-based key for a computer program.