Encryption technology

zhaozj2021-02-11  238

Encryption technology

(Author: Rainbow)

Protect intellectual property rights, resist piracy software, is the urgent problem facing the Chinese software industry. However, although the country has repeatedly increased efforts, combating illegal software publications, support genuine software, but the actual effect is not ideal. I have a non-pirated pirated software to infringe on the software market, and more software companies have chosen to purchase encrypted products or encryption techniques to protect their software.

Beijing Rainbow Tiandi Information Technology Co., Ltd. is a joint venture company formed by the US Rainbow Company and Beijing Jintiandi Company. Its encrypted products and safety products have considerable influence and status at home and abroad. Software encryption, generally divided into two types of soft encryption and hard encryption, this article will talk about software encryption technology in conjunction with Rainbow Tiandi Company's products.

Soft encryption technology

Soft encryption is the protection technology of software that does not rely on special hardware. Its maximum advantage is that extremely low encryption costs. At present, there are mainly cryptographic methods, computer hardware checks, key disc methods. There are also Sentinel LMs and CD dog products of Rainbow World, or in soft and encryption classes.

Sentinel LM and CD dogs provide a reserved enclosure encryption tool that performs files, allowing users to easily encrypt software without having to make a source program. Compared to ordinary soft encryption tools, Sentinel LM allows users to select software usage, software publishing scope, software use users, and generate license ciphertext, so software developers can make his users to download license through online. " First try the sales method after purchasing. In addition, Sentinel LM can expand into a hard encryption scheme according to user needs.

CD dog is a soft encryption technology that is only for CD software. It distinguishes the original disc or pirated disk by identifying the characteristics on the disc. This feature is naturally generated when the optical disk is pressed, i.e., the characteristics of the same master discharged, and the disc in which different master pressed, the disc is exactly the same, and the features on the disc are different. That is, this feature is not extracted and copied during the flip of the pirate. Ordinary disc encryption technology, usually make special master, and then modify the master machine, generate additional cost, two to delay the time to market. CD dog technology is not manufactured on the motherboard, so developers can freely choose CD plants to press CD. CD dog is an excellent program that is specialized in CD software and has passed the encryption performance and compatibility of China Software Evaluation Center. At present, there is no similar technology in the Chinese software market. At present, due to the low cost of CD dog technology (about 1 yuan per disc), better encryption strength has caused more interest in low-priced software (game, education, electronic reading, etc.), and has been listed in many Software has been widely used.

The software is popular, marketized, low-cost, has become a successful operation mode of the software industry, from Jinshan Software's 28 yuan genuine storm, and then follows the successful follow-up of other merchants such as ZHAIN MINA, Many consumers have the opportunity to have the ability to have confidence to use genuine software. It can be said that the software of the second 30 yuan to deal with the biggest magic weapon of piracy is the price. In this price, software vendors cannot adopt a powerful hardware encrypted dog (encrypted lock) to protect their own interests, but through large scale. Get profit.

Hard correction

If we think about it carefully, not all software can use low price, high sales to recover costs. Many of the CAD systems, medical systems, financial systems, or other dedicated integrated system software, because their customer group is more professional, the number is much smaller than the number of users of the aforementioned publicization software, then they are unlikely to take small profits but quick turnover Strategy. Therefore, we found that in the pirated market, those genuine prices have a functional software for hundreds of dollars and thousands of dollars, becoming a selling point for supporting the pirated market.

At this time, if software vendors do not carry out some encryption investments to ensure the market sales of genuine software, they are likely to have no blood. Hard correction is the powerful tool that guarantees high-end software from piracy in the market life cycle. According to statistics, in the Chinese market, hard-related products mainly have rainbow heavens and earth Sentinel encryption locks series and daggers, Israeli Aladdin encryption locks, deep thinking of the company's encryption locks and Fei Tian company encryption locks and other products. Among them, encrypted dog products have the earliest development time in China, plus the use of other encrypted lock products, so many software trainees habitually call this type of hard-encrypted product as an encrypted dog.

From a look, most encrypted dogs are a protective device that is small in parallel, such as a matchchard case. At the same time, in order to meet market demand, there are also some special products with special shape performance. Such as ultra-small products (such as the Sentinel Super Pro Tiny Key KEY of the Rainbow World), which can be connected to the PC expansion slot (such as rainbow world card dogs), which can be connected to the USB port of PC (such as rainbow world) SentinelSuperPro-USB and USB Dogs, etc. It can be said that software companies are constantly submarining, and while developing software products that meet different needs of different users, encryption vendors have also adapted to software developers, and develop a variety of encrypted products.

The full range of encrypted products of the two product lines of Rainbow Tiandi Company covers software developers in various environments, and the latest version of the popular varieties is close to 20. Hereinafter, we choose some representative products.

Sentinel Super Pro (Figure 1 is the exterior of Sentinel Super Pro72) is the first product that combines multi-function algorithm with read-write memory. It adopts a new generation of ASIC technology, and overall products are more stable, compact, and more performance. This encryption lock has 14 dynamic activation algorithms and memory cells, which can be set in a variety of ways, and is the most advanced programmable encryption lock in the industry. In addition, developers can configure time or counters to generate rental or demo software, which can protect themselves and future software products by specifying their unique algorithms. Compared with similar products, its encryption intensity and flexibility are quite good. In addition to hardware, SentinelSuperPro also features a comprehensive software package, including API call tools, executable file encryption tools, manufacturing tools, remote activation tools, etc.

figure 1

"User Algorithm Implant" is a new encryption idea in 1999. The strong dog of the Rainbow World is the representative of this new technology. Ordinary encryption ideas are not unrestricted to exchange data with daggers in program execution, and this new encryption technology is to open a storage area in encrypted hardware, write in part of the user program, and will be executed by the encrypted dog. The user program will not be intact if there is no dog. The encrypted dog and the user program have achieved the most closely combined, which makes the encryption effect are particularly reliable.

The USB dog is a small and exquisite dongle launched by the rainbow heavens 1999 (Figure 2 is the appearance of the USB-YJ2 of the Rainbow World), which is only equivalent to a small keychain. Its biggest feature is that the computer is not limited by the computer, and the expansion is convenient, the performance is stable, and the hot-swappable USB interface is used. We know that traditional parallel ports are only one, printers, scanners, and active optical drives such as printers, scanners, and active optical drives, so the USB dog emerges, completely solves the parallel resource encountered by the parallel-mouth encryption dog (encryption lock). Conflict compatibility issues, will become a development direction of future hard-encrypted products.

figure 2

The microgou is a smart encrypted product in the domestic sales of Rainbow Tiandi. It built-in microprocessors and 200 bytes power-off memory allows the user to customize the algorithm factor up to 16 million species. In response to the development of domestic pirated decryption technology, the micro-trace has a data exchange random noise technology, the temporal brake technology, and the labyrinth technology is specifically against the disciprical tracking. Rainbow World provides a double-purpose driver of a micro-dog and USB dog, making it inconvenient to use the user who uses a portal dog directly to switch the USB dog. It can be seen from the high-selling business in China, and the merchants fighting in the Chinese software market have become more and more advanced, and the advancement of their products is increasingly inclined to increase their own software protection. Strength. Adding encryption protection to prevent software piracy, is already a consensus of domestic software companies. In the face of difficult piracy, various advanced encrypted protection products have begun to show their hands, but also promote a variety of software protection technologies to emerge.

At the same time, with the coming of the network era, more computers are applied to a variety of scale and form of network environments. Similar to software protection, network information is safe, it is difficult to be ignored. Nevaton often worry that others can steal their own accounts; e-commerce will rack their brains in order to prevent fraud; I want to go online stocks, I am afraid of the identity; I use the internal network to work, how to keep my password properly? All such, incompetent enumeration, encryption technology for network security have also attracted more and more attention.

Rainbow Tiandi Company's new product IKey is a tool for this security protection. IKEY provides users with authentication solutions, providing users with security mechanisms such as system login, network management, network access, etc., and IKEY is also available in fields such as e-commerce, online banking, security email, web access.

IKey provides network visitor with dual authentication function (optional function) to enhance security, and IKEY has an 8KB ~ 64KB EEPROM, built-in MD5 Haru (HASH) algorithm and random query count generator, and contains secure files System, including user mode and management mode. Each IKEY can preset a denious value or deposit a data certificate to determine the user's identity. Since the defects or data certificates are only used to perform operations on the terminals used by the server and iKey, the interpretation of the depends or data certificates are not transmitted, so that IKEY is secure. It has also fundamentally guaranteed the security and reliability of user information.

to sum up

Encryption is not a new technique. Encryption technology for computer software has been widely put into use in foreign markets from the 1980s. In the current software market, we can find a lot of tool software, multimedia software, design software, teaching software, and anti-virus software have adopted software encryption measures. The use of these measures protects the market interests of the software to some extent. The application of this encryption measures can cause obstacles to illegal use of software. However, it is scientifically that there is no encryption software (hardware) in the world, which can claim to eliminate software decryption, and only is difficult. A good encryption is to let the thi from crack the protected software, which cost great time, and finally forced to abandon the attack. So, when choosing an encrypted product, if there is a salesman saying that his product is "never been solved", it is irresponsible.

转载请注明原文地址:https://www.9cbs.com/read-5724.html

New Post(0)