当前位置:网站首页>Dongle data collection
Dongle data collection
2022-07-01 06:15:00 【Tom】
Dongle data collection
Product selection
San Marino offers developers a variety of options , From hard lock series 、 Soft lock ( Soft authorization ) Authorization to the cloud , Developers can design products according to their needs 、 The needs of the scenario or the preferences of the user , Choose the ideal protection 、 Authorization scheme .
The following are the common types of selection preferences :
Suitable for choosing hard lock : In an offline environment , Want plug and play , And will not be affected by system reinstallation or hardware replacement ; I hope to equip my software product with a physical hardware lock ; Or with a protective lock with a clock chip , It can accurately control the running time of software and other scenarios .
It is suitable for the scenario of choosing soft authorization : In virtualization 、 Software deployed in a container environment ; You want to bind the software to a specific hardware device ; No, USB Interface devices ; For expanding overseas business ( End users don't like hard locks ); I hope it is easier to set and manage licenses ; Those who do not want to incur hardware inventory management or mailing costs ; We hope to avoid the situation that hard locks cannot be delivered to users in time during the epidemic .
It is suitable for the scenario of cloud authorization : On-line + Offline mixed application scenarios ; You need to verify your license online , Scenarios that require frequent offline use ; Need to deploy in containerization 、 virtualization 、 Scenarios in public or private cloud environments ; It is hoped that the client can 、 Cross device use of software anywhere ; System reinstallation or hardware replacement are relatively frequent ( No software license is required for migration work ); It is hoped that the administrator can pass the web A scenario in which the page performs a series of permission management operations on the user identity ; I hope I can understand the product usage and other scenarios in real time .
General application encryption scheme
Write the encrypted code into the source code , That is, embedded encryption . Embedded encryption effectively integrates the encrypted code with the source code , Make the code look more complex , Thus increasing the difficulty of cracking . therefore , Embedded encryption is our preferred encryption method . You can choose the following encryption process :
- Find out if the dongle exists
- Random numbers are generated by the system X, Take this as the one-time verification factor
- Divide random numbers into two paths : All the way with the user input key Value operation , Get the check value ; Send the other way to the dongle , Get the return value by writing data in the chip .
- Compare the check value with the return value , Continue the program when the two values are equal , Otherwise exit the program
The above scheme is the basic encryption process of dongle , Of course, users can use the secondary development zone of dongle to implement flexible encryption schemes .
Application recommendation for secondary development zone
Using the secondary development zone can not only realize simple data 、 Character reading and writing function , It can also realize the commercial sales mode of multiple schemes . Sub module sales : Divide the software into several modules according to functions , Set the password of each module and write it into the dongle storage area , When accessing this function module, you need to enter the correct corresponding password . Rental sales : The Golden Shield dongle chip comes with Counter The interface function , Automatically subtract one for each call , It can realize the limited time function of the software , And the remote termination period . For powerful hardware clock lock , Using interface functions , It can strictly control the time of software use , It is especially suitable for the software with strict time limit, such as the examination system .
Encryption suggestions
Information encryption is not just about how to use ! It's more about how to encrypt ? We may not be able to understand and learn the encryption source code , But we can understand and skillfully use various skills of encryption program ! Suzhi technology dongle has sorted out some skills in the use of dongles and shared them with you !
- Call cryptographic locks in rarely used code . Then the program that seems to have been decoded will often have abnormal phenomena .
- Call the encryption lock according to the time . Such as : Data invoked in the morning and in the afternoon ( Or the next day ) Use . It takes a day or several days for the decipherer to analyze the data . This can drag the interpreter .
- The encryption lock return value is deleted immediately after use .
- Take the return value of the encryption lock as the index of the array 、 Constant 、 Calculation unit and check code .
- The return value of the encryption lock is used as a pointer to control program execution or as an index to jump in different tables .
- Use the return value of the encryption lock to encrypt or decrypt part of the code or data .
- If the return value of the encryption lock is found to be wrong , Do not display error messages .
- The cryptographic lock verification function does not have to be defined as a separate function , And it can be defined as several small functions for decentralized use .
- Check the checksum of the program code , In case of illegal modification .
- Cover real encrypted lock access with various random access . Handle responses to random queries , But don't really use it .
Reference documents
thalesgroup
Qinzhi technology
common problem
Solution
Learn about dongles
Software protection scheme
Get to know soft authorization for the first time
About soft licensing
边栏推荐
- 【ManageEngine】如何实现网络自动化运维
- DHT11 temperature and humidity sensor
- Timer based on LabVIEW
- Diffusion (multi-source search)
- Understanding of C manualresetevent class
- ManageEngine卓豪助您符合ISO 20000标准(四)
- Flink实战--多流合并
- OpenGL es: (5) basic concepts of OpenGL, the process of OpenGL es generating pictures on the screen, and OpenGL pipeline
- three. JS summary
- Servlet
猜你喜欢

【文件系统】如何在ubi之上运行squashfs

ONEFLOW source code parsing: automatic inference of operator signature

Uniapp tree level selector

LED lighting used in health lighting

浅谈SIEM

JDBC database operation

Talking from mlperf: how to lead the next wave of AI accelerator

Linux closes the redis process SYSTEMd+

Arcserver password reset (account cannot be reset)

Solve the problem of garbled files uploaded by Kirin v10
随机推荐
解决麒麟V10上传文件乱码问题
无限水平大理石游戏
B-树系列
Pit of kotlin bit operation (bytes[i] and 0xff error)
SOE空间分析服务器 MySQL以及PostGres的地理空间库PostGIS防注入攻击
jdbc-连接池
[file system] how to run squashfs on UBI
Tidb database characteristics summary
srpingboot security demo
Excel dynamic chart
TiDB单机模拟部署生产环境集群(闭坑实践,亲测有效)
Database problems, how to optimize Oracle SQL query statements faster and more efficient
kotlin位运算的坑(bytes[i] and 0xff 报错)
【自动化运维】自动化运维平台有什么用
MongoDB:一、MongoDB是什么?MongoDB的优缺点
【ManageEngine】如何实现网络自动化运维
高阶-二叉搜索树详解
地宮取寶(記憶化深搜)
El tooltip in the table realizes line breaking display
srpingboot security demo