We introduce a novel software-protection method, which can be fully implemented with today's technologies, that provides traitor tracing and license-enforcement functionalities, and requires no additional hardware nor inter-connectivity other than those needed to execute the respective protected software. In [1] authors introduce the secure triggers and show that it is secure, modulo the existence of an ind-cpa secure block cipher. In this work, we present a framework for license enforcement and fingerprinting of computer programs in which these capabilities are coupled with secure triggers to produce a secure software protection system.