How to use the 91 Weitu dongle?
There are two types of dongles:
1. Encrypt and protect your own software: use the development kit and operation documents provided by the dongle to encrypt your own software. Of course, the dongle supplier will provide technical support. The general dongle must be simple and convenient to use.
2. Use the software on behalf of the dongle, which can be used automatically. When installing the software, the corresponding dongle driver will be installed into the computer. Note that it is generally better to insert the dongle after installing the driver. You can use the software almost without caring about it.
The encryption lock is a kind of encryption product with the combination of software and hardware inserted into the parallel port of the computer (the new encryption lock also has USB port). Generally, there are dozens or hundreds of bytes of nonvolatile storage space for reading and writing. Now the newer dog (encryption lock) also contains a single chip microcomputer. Software developers can check whether the encryption lock is inserted into the interface through data exchange between the interface function and the encryption lock (i.e. reading and writing the encryption lock); Or directly encrypt your own EXE file (commonly known as "package") with the tool attached to the encryption lock. In this way, the software developer can set multiple software locks in the software and use the encryption lock as the key to open these locks; If the encryption lock is not inserted or does not correspond to the encryption lock, the software will not execute normally.
Encryption lock is an intelligent tool with software protection function provided for software developers. It includes a hardware installed on the computer parallel port or USB port, and a set of interface software and tool software suitable for various languages. Encryption lock is based on hardware protection technology. Its purpose is to prevent the illegal use of intellectual property rights through the protection of software and data.
Post a Comment