文档章节

加密狗产品

东风125
 东风125
发布于 2015/12/02 10:39
字数 620
阅读 44
收藏 0

##SmartDongle 2

SmartDongle2 is our newest product with updated firmware and enhanced security. The enhanced security is achieved through “security loops” which determines the number of times the mathematical calculation is performed internally. The higher the number of loops, the more secure it is. However, the tradeoff is that each additional loop adds processing time (approximately .14 seconds per loop). Currently, we have two products: SmartDongleLL and SmartDongle2. If you have not read about each, you might want to take a moment so you can decide which SmartDongle will work best for your project.

###Securing Executables We have 2 different ways of securing executables. One way is to encrypt the executable using AES128 encryption and storing the key on a SmartDongle. We then provide you with two files. One is a program that reads the SmartDongle, gets the key from the SmartDongle, decrypts the original executable and loads it into memory and executes it.

The other way is to get the serial number from a USB flash, perform some arithmetic on that number, and use the result as the encryption key. We then encrypt your executable and save it onto the same USB flash drive. On that drive we put the startup code. Your users would double click on the startup code which will get the serial number from the USB flash drive, do the same arithmetic and then decrypt your executable and load it into memory and transfer control to it.

##keylok

Hardware-based protection uses a physical device, commonly known as a dongle, USB hardware key or security key. To implement, the dongle's firmware is integrated with the software. Afterwards, the software only runs if the dongle is physically present on the computer or machine. Additionally, the dongle controls how the end-user actually uses the software, referred to as software licensing. Whether it's time or usage-based restrictions or limiting the modules and features available, the end-user's access is managed and enforced by the dongle.

Industry experts generally agree that hardware-based protection provides superior security since a physical piece of hardware has to be bypassed to misuse the software. Particularly vulnerable are those products sold in high-risk markets, high-value software, certain software classes/industries that are targeted by hackers and innovative, leading-edge software.

Click on the KEYLOK Triangle to explore four more reasons to consider hardware-based security.

##securemetric

SecureDongle was built based on advanced microprocessor smart chip which has been certified by EAL4+ and ITSEC. The smart chip based hardware architecture ensures complete security against risk of Dongle hardware being cloned or duplicated. In addition to hardware advantage, SecureDongle was also built with a very user friendly interfaces on its bundled firmware and utilities. Unlike many other competing products where their shortcomings are summarized as below:

Non-Smart Chip based Usually based on common low cost EEPROM where the main protection algorithms rely more on the firmware that is bundle together rather than on the hardware. This type of hardware architecture can easily be duplicated by many Dongle Duplication Experts.

Smart Chip based There are few smart chip based dongles available on the market and most of them is very complicated to integrate; a fresh dongle user might need to spend weeks to months in order to be able to come up with a good protection.

Maximum Security: SecureDongle offers a combination of advanced smart card level hardware security together with advanced software protection firmware with is also integrated with advanced anti-cracking algorithms and mechanisms.

Minimum Learning: SecureDongle SDK offers comprehensive but user friendly tools, utilities, tutorials and API samples where even a fresh developer can master it within days.

Minimum Investment: SecureDongle offer the most cost effective option in the industry, so why pay more!

© 著作权归作者所有

上一篇: HttpHelper
东风125
粉丝 6
博文 73
码字总数 12747
作品 0
朝阳
高级程序员
私信 提问
[转]加密狗原理介绍

  来源:http://blog.csdn.net/kerneltang/archive/2004/02/25/22156.aspx   本人就现今全球软件保护行业较普遍采用的方法之一使用“硬件加密狗”的方式方法谈谈自己的一点看法。   在...

夏春涛
2007/06/02
0
0
java 有没有好用的加密狗

现在需要一款好用的加密狗,编程语言是java,试用了深思洛克和飞天诚信的产品,前者太复杂,后者很多文件不能加密,也试用了hasp的max加密狗,但是war包50M就貌似不行了,各位大神 有没有好用...

jonneyQ
2013/10/21
666
1
加密狗的一些介绍

加密狗是目前流行的一种软件加密工具。它是插在计算机接口上的软硬件结合的软件加密产品。一般有USB口和并口两种,又称USB加密狗和并口加密狗,目前流行的一般是USB加密狗,并口加密狗在前几...

东风125
2015/12/02
258
0
用加密狗控制软件的授权(C#)

加密狗授权方式介绍 每只加密狗都有一个固定的序列号,并且一般是无法修改的。软件运行时读取加密狗的序列号进行判断,序列号通过验证后才能正常使用软件。 选购一套加密狗开发套件 我选购了...

彭博
2012/03/09
1.6K
0
B/S结构当中,加密狗登录验证算安全么?

目前在开发招财猪进销存,打算用加密狗来做验证,可以简单归纳为一组固定24位ID和两组随机28位字符在加密狗和服务端验证,成功以后才能正常登录,而且登录成功以后,每一步操作都要监测加密狗...

铂金小猪
2014/03/28
935
5

没有更多内容

加载失败,请刷新页面

加载更多

六、Spring Cloud之配置中心config

前言 前面我们讲了微服务的注册中心、负载均衡、熔断处理、网管服务。接下来我们讲配置中心,为什么要用配置中心呢? 其实我们接触一段时间就可以发现,我们的项目还是非常多的,每个项目都有...

quellanan2
17分钟前
33
0
在Android的EditText视图中允许多行?

如何在Android的EditText视图中允许多行? #1楼 这对我有用 ,实际上这两个属性很重要: inputType和lines 。 此外,您可能需要一个滚动条,下面的代码显示了如何制作一个: <EditText ...

技术盛宴
21分钟前
25
0
分享自己写的JS版日期格式化和解析工具类,绝对好用!

前言 本来想模仿Java里面的SimpleDateFormat()对象的,但是感觉这样用起来不方便,所以还是直接写成单独的方法算了。 原文链接 日期格式化 2.1. 使用说明 formatDate(date, fmt),其中fmt支持...

SuShine
31分钟前
42
0
快递鸟api物流查询接口实现订阅物流轨迹单号查询功能对接调用

背景: 分享一篇关于在电商系统中同步物流轨迹到本地服务器的文章,当前方案使用了快递鸟集成api做为数据来源接口,这个接口是免费使用的,不过提供的功能还是非常强大的,有专门的售后维护团...

程序的小猿
35分钟前
46
0
Day08多态,abstract,接口

1.A:多态的概述:事物存在的多种形态。 B:多态前提:要有继承关系,方法重写和父类引用子类对象。 父类引用子类对象:Animal a = new Cat(); a.eat(); //效果等同于c.eat(); 2.多态中的...

Lao鹰
41分钟前
32
0

没有更多内容

加载失败,请刷新页面

加载更多

返回顶部
顶部