news

CPA

hc:
Aliexpress WW Vevor Many GEOs Лабиринт OnePlus [CPS] Many Geos Fernsnpetals [CPS] IN Komily WW IGP [CPS] WW
lc:
Fairyseason WW DHgate WW Banggood WW Economybookings Many GEO's Lenovo Many GEOs Mego.travel Norton [CPS] WW ChicMe WW
ua:
EvroGroshi [CPS, API] UA Kreditmarket [CPS, API] UA Slon Credit [CPS,API] UA Microcash [CPS] UA
FanDuel Fantasy Sports Register + Join a Group
Booking.com

Thursday, August 26, 2021

Do you need to update the software and hardware of dongle and Guanglianda in 2013

Do you need to update the software and hardware of dongle and Guanglianda in 2013


A hardware device similar to USB flash disk, named encryption lock, later developed into a popular industry term for software protection. "Encryption dog" is an encryption product with the combination of software and hardware inserted into the parallel port of the computer (the new encryption dog also has USB port). Generally, there are dozens or hundreds of bytes of nonvolatile storage space for reading and writing. Now the newer dog also includes a single chip microcomputer. Software developers can check whether the dongle is plugged into the interface through data exchange between the interface function and the dongle (i.e. reading and writing the dongle); Or directly encrypt your own EXE file (commonly known as "package") with the tool attached to the dongle. In this way, software developers can set multiple software locks in the software and use the software dog as the key to open these locks; If the dongle is not inserted or does not correspond to the dongle, the software will not execute normally. The dongle realizes encryption by exchanging data with the dongle during software execution. The built-in single chip microcomputer circuit (also known as CPU) makes the dongle have the processing ability of judgment and analysis, and enhances the active anti decryption ability. This encryption product is called "intelligent" dongle. The built-in MCU of the dongle contains algorithm software dedicated to encryption. After the software is written into the MCU, it can no longer be read out. This ensures that the dongle hardware cannot be copied. At the same time, the encryption algorithm is unpredictable and irreversible. The encryption algorithm can convert a number or character into an integer, such as dogconvert (1) = 12345, dogconvert (a) = 43565. Dongle is an intelligent software protection tool for software developers. It includes a hardware installed on the computer parallel port or USB port, and a set of interface software and tool software suitable for various languages. Dongle is based on hardware protection technology. Its purpose is to prevent the illegal use of intellectual property rights through the protection of software and data.


[edit this paragraph] working principle


Working principle of dongle: the dongle realizes encryption by exchanging data with the dongle during software execution. The built-in single chip microcomputer circuit (also known as CPU) makes the dongle have the processing ability of judgment and analysis, and enhances the active anti decryption ability. This encryption product is called "intelligent" dongle. The built-in MCU of the dongle contains algorithm software dedicated to encryption. After the software is written into the MCU, it can no longer be read out. This ensures that the dongle hardware cannot be copied. At the same time, the encryption algorithm is unpredictable and irreversible. The encryption algorithm can convert a number or character into an integer, such as dogconvert (1) = 12345, dogconvert (a) = 43565. Below, we give an example to illustrate the use of MCU algorithm. For example, there is a sentence in a program: a = FX (3). The program obtains the value of variable a according to constant 3. Therefore, we can rewrite the original program like this: a = FX (dogconvert (1) - 12342). Then the constant 3 will not appear in the original program, and dogconvert (1) - 12342 is used. In this way, only the software writer knows that the constant actually called is 3. If there is no dongle, the dogconvert function cannot return the correct result, and the result formula a = FX (dogconvert (1) - 12342) will certainly not be correct. This encryption method that makes pirated users unable to get the use value of the software is milder, more hidden and more difficult for decryptors to figure out than the encryption method that warns and stops when illegal use is found. In addition, the dongle also has a read-write function, which can be used to read and write the memory inside the dongle. So we can also write 12342 in the above formula to the dog's memory, so that the value of a completely depends on the results of dogconvert() and dogread() functions, making decryption even more difficult. However, generally speaking, the algorithm difficulty of dongle MCU is lower than that of some public encryption algorithms, such as DES, because decryptors have to face many difficulties before touching the dongle algorithm


[edit this paragraph] development process


With the development of decryption technology, MCU dongle is gradually eliminated by the market because of its simple algorithm, small storage space and easy to be copied by hardware. The domestic dongle manufacturers led by Beijing Rainbow World Information Technology Co., Ltd. have developed the fourth generation dongle - "smart card" dongle, which has better stability, larger storage space (up to 64K) and can effectively prevent hard cloning. With its original "code transplantation" principle, it has been widely used by large domestic commercial software developers such as Kingdee, UFIDA, CAXA, Guanglianda, magic tricks Adopted by Luban. Taking Honggou, the world's first smart card encryption lock, as an example, this paper briefly introduces the principle of "code transplantation"“ The encryption principle of "code migration" is a new and reliable software protection model. Its working principle is that some codes in the software are compiled and "transplanted" into the encryption lock hardware, and there is no copy of this code in the software. In this software protection scheme, the key codes and data of PC application software "disappear" and are safely transplanted to the hardware of elite type IV encryption lock for protection. When needed, the application software can instruct the elite IV to run the key codes and data in the hardware and return the results through the function call engine, so that all the functions of the whole software can still be completed. Because there is no copy of these codes and data on the PC side, the decryptor has no way to guess the algorithm or steal the data, which greatly ensures the security of the whole software system. In short, elite IV provides a set of trusted solutions to theoretically ensure the security of software encryption.


[edit this paragraph] programming language that can be protected


The programming language that dongles can protect is constantly changing with the development of computer hardware and operating system. In the 1980s, personal computers were mainly at, 286 and other models. The operating system of personal computer is mainly DOS, and the operating system of enterprise server mainly uses Novell Netware. Engineers developing dongle protection software need to encrypt exe files under DOS by modifying INT21 and int10 methods of DOS, or provide encryption for Turbo C, FORTRAN, basic and other programming languages by providing specific API methods. Sometimes engineers who develop dongle protection software may directly write. Com files using DOS debug. Since then, the operating system of personal computer has experienced the upgrading of windows, Windows 95, Windows 2000, Windows NT and XP. The means of protecting exe files has also changed from DOS resident program to writing VXD, Sys and other methods. Programming languages also include: MASM, Turbo C, VC, watcom C for NetWare, watcom C for x86, NDP C for x86, NDP FORTRAN, Visual FoxPro, clipper, LISP for AutoCAD, etc. With the continuous enhancement of hardware processing ability of dongle and the popularity of computer USB port, the protection of software gradually depends on the general encryption algorithm, rather than the encryption programming skills of encryption software. The use of dynamic link libraries and controls can meet the protection needs of most programming tool software. Dongle manufacturers are also liberated from customizing APIs for different programming tools and software one by one.

No comments:

Post a Comment

Where are they now? Catching up with the normal people made internet famous by brands ...

Carter Wilkerson started the #NuggsForCarter hashtag and received free chicken nuggets from Wendy's for a year. What happens when the fr...