![]() ![]() Possible instructions are addition, multiplication, shift, compare, etc. This method for software protection is almost impossible to crack. You may write simple algorithms that are securely stored in the dongle, and then call those algorithms from time-to-time in your application. ROCKEY can execute various simple instructions which are stored in the dongle. Programs can only read these modules using a self-defined algorithm (a small program stored in the dongle), or can decrease the counter by one. The modules can also contain a down counter. ![]() There are 64 modules (internal secured 16-bits variables) in which for example encryption-data can be stored that is used by the algorithms. Users can read and write to this space at any time. This memory space of 1000 bytes can be used by the developer to store any kind of data. The User ID is a 32-bits memory allocation that may be used to store an application serial number or other identification information. The Hardware ID is an unique 32-bits serial number, which cannot be changed. The basic passwords allow end users to access all necessary ROCKEY functions, and the advanced passwords are only needed for the software developer to use some of the configuration functions. ![]() The first two are basic passwords, the last two are advanced passwords. When developers purchase ROCKEY, they will get four 16-bit passwords. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |