If you order your research paper from our custom writing service you will receive a perfectly written assignment on ROCKEY4 Brochure. What we need from you is to provide us with your detailed paper instructions for our experienced writers to follow all of your specific writing requirements. Specify your order details, state the exact number of pages required and our custom writing professionals will deliver the best quality ROCKEY4 Brochure paper right on time.
Our staff of freelance writers includes over 120 experts proficient in ROCKEY4 Brochure, therefore you can rest assured that your assignment will be handled by only top rated specialists. Order your ROCKEY4 Brochure paper at affordable prices!
ROCKEY4
ROCKEY4 are hardware based systems designed to enforce software license agreements and prevent unauthorized duplication. These USB and LPT attached products support complex user defined algorithms for extremely powerful software protection. The ROCKEY4 Envelope program provides a means for direct encryption of Windows portable executable files and may be implemented in minutes by even non-programmers. ROCKEY4 is engineered to be versatile yet secure, enabling the developer to implement varied software licensing policies.
ÖPrevent loss of revenues due to software piracy
Order essays on ROCKEY4 Brochure and other topics
ÖEnforce licensing agreements
ÖEase software distribution headaches
ÖRemotely enable access to software modules
ÖEnforce network licensing policies
ÖSupport for remote activation of demo programs
ÖAlways price competitive¡
Features
ÖSupport for multiple user defined algorithms
ÖLow level communications encoded for optimal protection
ÖMulti-level security access for developers and users
ÖSupport for multiple platforms DOS, Windows 5/8/ME/NT4/XP, Linux, MAC (OS 8.6 and above)
ÖAbundant programming language interfaces TurboC, Borland, C++, MSC, WatcomC, QBasic, Fortran, VC, VB, BCB, Delphi, PB, AutoCAD, Java, ActiveX
ÖSupport for varied network licensing policies
ÖSecure storage for application serial numbers and other information required for license enforcement
ÖFull support for IEEE 184 (ECP/EPP/SPP)
ÖEngineered for high compatibility with LPT attached devices
ÖSmall and non-intrusive form factor, tamper proof outer shell
ÖBuilt-in algorithms for seed code generation
ÖFull support for daisy chaining
ÖGlobally unique Hardware Identification number burned into each unit
ÖCustomer specific password set burned into each unit
Security Features
ÖCommunications between dongle, driver and application are encoded to prevent ¡°emulator¡± and ¡°playback¡± type hack attacks.
Ö¡°Tracing¡± attacks normally add to the time required for execution. ROCKEY4 has a built-in ¡°watchdog¡± feature that will cause ROCKEY4 to not respond if execution takes too long.
ÖAccess to ROCKEY4 memory is protected with the Basic and Advanced level passwords. The -bit Basic level password set is normally included in the Envelope encrypted executable file and is used to read values from one or more protected memory zones. The Advanced level passwords (also -bit) should not be distributed to the end user and are for the developer to pre-configure the dongle before it is shipped with the application.
ÖROCKEY4 contains a proprietary algorithm that will generate four 16-bit return values from input of a -bit seed code and the Basic/Advanced passwords. The application can compare the values returned from ROCKEY4 to the expected return values. If they are the same, the dongle must be attached.
ÖUser defined algorithms may be as long as 80 instructions (ROCKEY4-Plus and NetROCKEY4). The instructions may use operations + (addition), - (subtraction), (cyclic shift left), (multiplication), ^ (XOR), & (and), | (or, ~ (neg.), ? (compare). An algorithm may implement as many as eight variables A,B,C,D,E,F,G,H,I. ¡°A¡± through ¡°E¡± are defined by the developer, ¡°F¡± through ¡°I¡± are initiated by the system. ROCKEY4 has three build in calculation functions.
ÖGlobally unique -bit Hardware Identification (HID) number
ÖROCKEY4 can generate a 16-bit random number that may be used as input for seed code security measures.
ÖAs many as 16 ROCKEY4 LPT dongles can be daisy chained off the LPT port. ROCKEY4 can be combined with any number of dongles from other manufacturers.
Envelope Program Protection
The ROCKEY4 Envelope program may be used for direct encryption of Win Portable Executable (PE) files (such as .exe, .dll or .arx). Envelope encryption is a good solution if you do not have the source code or the time or capability needed to use the API functions. The strongest software protection systems will use both the Envelope and API implementations.
The ROCKEY4 Envelope program works by adding a shell to the original PE file. The ¡°shell¡± code is binary instructions that check for the presence of the ROCKEY4 dongle before they allow other instructions in the application to execute. The ROCKEY4 Envelope program can be used for single or multi-file encryption.
Network Support
NetROCKEY4 is a network aware software protection system designed to limit the number of simultaneous users who can access a software application. It combines all the functionality of the standard ROCKEY4 system, with the ability to work seamlessly in LAN/WAN environments that support the UDP/TCP, IPX or NetBIOS protocols. NetROCKEY4 was engineered to support standalone or redundant server environments on both the Windows and Linux platforms. The system includes powerful and intuitive network monitoring and testing tools that ease the implementation effort. The NetROCKEY4 Envelope program provides direct encryption of Windows portable executable files that operate in a network environment.
ÖThe developer can set a maximum number of users for each of 16 separate user groups.
ÖLimits can be set on either the number of users or the number of computers that access an application.
ROCKEY4 has a total of 18-bytes of total usable memory. NetROCKEY4 and ROCKEY4-Plus each have a total of 51-bytes of usable memory space. The table below provides memory zone information for each ROCKEY4 model
Hardware Memory Usage
Memory ZoneMemory Zone DescriptionROCKEY4ROCKEY4-PlusNetROCKEY4
Hardware IDGlobally unique identifier-bit-bit-bit
User ID ZoneUser defined identifier -bit-bit-bit
Module ZoneNon-readable memory spaces (16) Used with arithmetic calculations16-bit(each)16-bit(each)16-bit (each)
Zero AttributeIndicates if a module is ¡°0¡± or not ¡°0¡±. Each module has a zero attribute.1-bit(each)1-bit(each)1-bit(each)
Decrement AttributeIndicates if a module can be decreased. Each module has a decrement attribute.1-bit(each)1-bit(each)1-bit(each)
User Data ZoneUser defined memory space4-byte10-byte10-byte
User Algorithm ZoneInstruction storage for user defined algorithms-instructions80-instructions80-instructions
Access controlled by Basic and Advanced level passwords.
Hardware Specifications
ROCKEY4-USBROCKEY4-LPT
Dimensions51 x 16 x 7 mm x 55 x 16 mm
Current Consumption (active/idle)¡Ü50 ma¡Ü10 ma
Min. Operating Voltage.V.V
CPU Type8 pin, 8-bit8 pin, 8-bit
Max. No. of dongles in series1616
Max. No. of Write Access100,000100,000
Connector SupportUSB Type A5-pin , Type D
Storage Temp.-40¡ã C ~ 85¡ã C -40¡ã C ~ 85¡ã C
Operating Temp.0¡ã C ~ 70¡ã C0¡ã C ~ 70¡ã C
Data Retention100 years100 years
Please note that this sample paper on ROCKEY4 Brochure is for your review only. In order to eliminate any of the plagiarism issues, it is highly recommended that you do not use it for you own writing purposes. In case you experience difficulties with writing a well structured and accurately composed paper on ROCKEY4 Brochure, we are here to assist you. Your persuasive essay on ROCKEY4 Brochure will be written from scratch, so you do not have to worry about its originality.
Order your authentic assignment and you will be amazed at how easy it is to complete a quality custom paper within the shortest time possible!