Subscribe

RSS Feed (xml)

Tuesday, December 10, 2019

ROCKEY4ochure

If you order your research paper from our custom writing service you will receive a perfectly written assignment on ROCKEY4ochure. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality ROCKEY4ochure paper right on time. Out staff of freelance writers includes over 120 experts proficient in ROCKEY4ochure, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your ROCKEY4ochure paper at affordable prices!


ROCKEY4


ROCKEY4 are hardware based systems designed to enforce software license agreements and prevent unauthorized duplication. These USB and LPT attached products support complex user defined algorithms for extremely powerful software protection. The ROCKEY4 Envelope program provides a means for direct encryption of Windows portable executable files and may be implemented in minutes by even non-programmers. ROCKEY4 is engineered to be versatile yet secure, enabling the developer to implement varied software licensing policies.


Ö Prevent loss of revenues due to software piracy


Order essays on ROCKEY4ochure and other topics Ö Enforce licensing agreements


Ö Ease software distribution headaches


Ö Remotely enable access to software modules


Ö Enforce network licensing policies


Ö Support for remote activation of demo programs


Ö Always price competitive¡­


Features


Ö Support for multiple user defined algorithms


Ö Low level communications encoded for optimal protection


Ö Multi-level security access for developers and users


Ö Support for multiple platforms DOS, Windows 5/8/ME/NT4/XP, Linux, MAC (OS 8.6 and above)


Ö Abundant programming language interfaces TurboC, Borland, C++, MSC, WatcomC, QBasic, Fortran, VC, VB, BCB, Delphi, PB, AutoCAD, Java, ActiveX


Ö Support for varied network licensing policies


Ö Secure storage for application serial numbers and other information required for license enforcement


Ö Full support for IEEE 184 (ECP/EPP/SPP)


Ö Engineered for high compatibility with LPT attached devices


Ö Small and non-intrusive form factor, tamper proof outer shell


Ö Built-in algorithms for seed code generation


Ö Full support for daisy chaining


Ö Globally unique Hardware Identification number burned into each unit


Ö Customer specific password set burned into each unit


Security Features


Ö Communications between dongle, driver and application are encoded to prevent ¡°emulator¡± and ¡°playback¡± type hack attacks.


Ö ¡°Tracing¡± attacks normally add to the time required for execution. ROCKEY4 has a built-in ¡°watchdog¡± feature that will cause ROCKEY4 to not respond if execution takes too long.


Ö Access to ROCKEY4 memory is protected with the Basic and Advanced level passwords. The -bit Basic level password set is normally included in the Envelope encrypted executable file and is used to read values from one or more protected memory zones. The Advanced level passwords (also -bit) should not be distributed to the end user and are for the developer to pre-configure the dongle before it is shipped with the application.


Ö ROCKEY4 contains a proprietary algorithm that will generate four 16-bit return values from input of a -bit seed code and the Basic/Advanced passwords. The application can compare the values returned from ROCKEY4 to the expected return values. If they are the same, the dongle must be attached.


Ö User defined algorithms may be as long as 80 instructions (ROCKEY4-Plus and NetROCKEY4). The instructions may use operations + (addition), - (subtraction), (cyclic shift left), (multiplication), ^ (XOR), & (and), | (or, ~ (neg.), ? (compare). An algorithm may implement as many as eight variables A,B,C,D,E,F,G,H,I. ¡°A¡± through ¡°E¡± are defined by the developer, ¡°F¡± through ¡°I¡± are initiated by the system. ROCKEY4 has three build in calculation functions.


Ö Globally unique -bit Hardware Identification (HID) number


Ö ROCKEY4 can generate a 16-bit random number that may be used as input for seed code security measures.


Ö As many as 16 ROCKEY4 LPT dongles can be daisy chained off the LPT port. ROCKEY4 can be combined with any number of dongles from other manufacturers.


Envelope Program Protection


The ROCKEY4 Envelope program may be used for direct encryption of Win Portable Executable (PE) files (such as .exe, .dll or .arx). Envelope encryption is a good solution if you do not have the source code or the time or capability needed to use the API functions. The strongest software protection systems will use both the Envelope and API implementations.


The ROCKEY4 Envelope program works by adding a shell to the original PE file. The ¡°shell¡± code is binary instructions that check for the presence of the ROCKEY4 dongle before they allow other instructions in the application to execute. The ROCKEY4 Envelope program can be used for single or multi-file encryption.


Network Support


NetROCKEY4 is a network aware software protection system designed to limit the number of simultaneous users who can access a software application. It combines all the functionality of the standard ROCKEY4 system, with the ability to work seamlessly in LAN/WAN environments that support the UDP/TCP, IPX or NetBIOS protocols. NetROCKEY4 was engineered to support standalone or redundant server environments on both the Windows and Linux platforms. The system includes powerful and intuitive network monitoring and testing tools that ease the implementation effort. The NetROCKEY4 Envelope program provides direct encryption of Windows portable executable files that operate in a network environment.


Ö The developer can set a maximum number of users for each of 16 separate user groups.


Ö Limits can be set on either the number of users or the number of computers that access an application.


ROCKEY4 has a total of 18-bytes of total usable memory. NetROCKEY4 and ROCKEY4-Plus each have a total of 51-bytes of usable memory space. The table below provides memory zone information for each ROCKEY4 model


Hardware Memory Usage


Memory Zone Memory Zone Description ROCKEY4 ROCKEY4-Plus NetROCKEY4


Hardware ID Globally unique identifier -bit -bit -bit


User ID Zone User defined identifier -bit -bit -bit


Module Zone Non-readable memory spaces (16) Used with arithmetic calculations 16-bit(each) 16-bit(each) 16-bit (each)


Zero Attribute Indicates if a module is ¡°0¡± or not ¡°0¡±. Each module has a zero attribute. 1-bit(each) 1-bit(each) 1-bit(each)


Decrement Attribute Indicates if a module can be decreased. Each module has a decrement attribute. 1-bit(each) 1-bit(each) 1-bit(each)


User Data Zone User defined memory space 4-byte 10-byte 10-byte


User Algorithm Zone Instruction storage for user defined algorithms -instructions 80-instructions 80-instructions


Access controlled by Basic and Advanced level passwords.


Hardware Specifications


ROCKEY4-USB ROCKEY4-LPT


Dimensions 51 x 16 x 7 mm x 55 x 16 mm


Current Consumption (active/idle) ¡Ü50 ma ¡Ü10 ma


Min. Operating Voltage .V .V


CPU Type 8 pin, 8-bit 8 pin, 8-bit


Max. No. of dongles in series 16 16


Max. No. of Write Access 100,000 100,000


Connector Support USB Type A 5-pin , Type D


Storage Temp. -40¡ã C ~ 85¡ã C -40¡ã C ~ 85¡ã C


Operating Temp. 0¡ã C ~ 70¡ã C 0¡ã C ~ 70¡ã C


Data Retention 100 years 100 years


Please note that this sample paper on ROCKEY4ochure is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on ROCKEY4ochure, we are here to assist you. Your persuasive essay on ROCKEY4ochure will be written from scratch, so you do not have to worry about its originality. Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!