Product activation is an anonymous, secure, hassle-free process that deters unlicensed use of SIMUL8 software.
The use of all SIMUL8 Corporation products is governed by an End User License Agreement (EULA).
A User Begins Activation by Launching their Software
When your software is launched for the first time, the SIMUL8 activation technology creates a unique number that identifies the user’s computer. The hardware ID is a mathematically computed and cannot be used to identify the make or model of the user’s computer or its components.
The code is encrypted and securely stored on the user’s computer alongside the license file, which contains additional encrypted information about the permissions of the license number and the activation history. The Hardware ID is only used as an identifier for the machine.
A second number is also created, the Activation ID — the actual request to activate. The Activation ID is composed of the product’s license number, product name, product version, and language along with the operating system name, version, and language. The Activation ID is only used to identify an individual activation request and contains no personal or computer hardware information. The activation request is automatically sent to SIMUL8 Corporation servers via the internet using an HTTP request with SSL encryption.
If the user is not connected to the internet they can call our offices to activate via the internet.
We Process the Activation
When our server receives the activation request, it validates the request against predetermined business rules.
For example, the server may check for existing activations. If the request is valid, an activation code is sent to your computer. If not, an error message is sent.
Your Product is Enabled to Run
When the activation code arrives into their computer, it automatically unlocks (activates) the software. The entire process takes no more than a few minutes.
The SIMUL8 Corporation activation process is completely anonymous and never requests, collects, or transmits personal information. It does not scan the user’s hard drive, and none of the information collected can be used to identify individual hardware components.