加密狗产品

##SmartDongle 2

SmartDongle2 is our newest product with updated firmware and enhanced security. The enhanced security is achieved through “security loops” which determines the number of times the mathematical calculation is performed internally. The higher the number of loops, the more secure it is. However, the tradeoff is that each additional loop adds processing time (approximately .14 seconds per loop). Currently, we have two products: SmartDongleLL and SmartDongle2. If you have not read about each, you might want to take a moment so you can decide which SmartDongle will work best for your project.

###Securing Executables We have 2 different ways of securing executables. One way is to encrypt the executable using AES128 encryption and storing the key on a SmartDongle. We then provide you with two files. One is a program that reads the SmartDongle, gets the key from the SmartDongle, decrypts the original executable and loads it into memory and executes it.

The other way is to get the serial number from a USB flash, perform some arithmetic on that number, and use the result as the encryption key. We then encrypt your executable and save it onto the same USB flash drive. On that drive we put the startup code. Your users would double click on the startup code which will get the serial number from the USB flash drive, do the same arithmetic and then decrypt your executable and load it into memory and transfer control to it.

##keylok

Hardware-based protection uses a physical device, commonly known as a dongle, USB hardware key or security key. To implement, the dongle's firmware is integrated with the software. Afterwards, the software only runs if the dongle is physically present on the computer or machine. Additionally, the dongle controls how the end-user actually uses the software, referred to as software licensing. Whether it's time or usage-based restrictions or limiting the modules and features available, the end-user's access is managed and enforced by the dongle.

Industry experts generally agree that hardware-based protection provides superior security since a physical piece of hardware has to be bypassed to misuse the software. Particularly vulnerable are those products sold in high-risk markets, high-value software, certain software classes/industries that are targeted by hackers and innovative, leading-edge software.

Click on the KEYLOK Triangle to explore four more reasons to consider hardware-based security.

##securemetric

SecureDongle was built based on advanced microprocessor smart chip which has been certified by EAL4+ and ITSEC. The smart chip based hardware architecture ensures complete security against risk of Dongle hardware being cloned or duplicated. In addition to hardware advantage, SecureDongle was also built with a very user friendly interfaces on its bundled firmware and utilities. Unlike many other competing products where their shortcomings are summarized as below:

Non-Smart Chip based Usually based on common low cost EEPROM where the main protection algorithms rely more on the firmware that is bundle together rather than on the hardware. This type of hardware architecture can easily be duplicated by many Dongle Duplication Experts.

Smart Chip based There are few smart chip based dongles available on the market and most of them is very complicated to integrate; a fresh dongle user might need to spend weeks to months in order to be able to come up with a good protection.

Maximum Security: SecureDongle offers a combination of advanced smart card level hardware security together with advanced software protection firmware with is also integrated with advanced anti-cracking algorithms and mechanisms.

Minimum Learning: SecureDongle SDK offers comprehensive but user friendly tools, utilities, tutorials and API samples where even a fresh developer can master it within days.

Minimum Investment: SecureDongle offer the most cost effective option in the industry, so why pay more!

转载于:https://my.oschina.net/ITELITE/blog/538186

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值