Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Software encryption dog scheme

2025-02-24 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

Software generally needs to do encryption and authorization, which can be done in one way, that is, encryption locks. When the encryption lock is used with the software, the encryption lock must be inserted when opening the software. the encryption lock can realize the time-limited use of the software, the local area network lock mode and the function limitation of the software module.

Chip type

At present, the common types of encryption locks in the market are divided into single-chip microcomputer type and smart card chip. Smart card chips also have domestic smart cards and imported smart cards. In view of the current security considerations, the smart card chip with encryption lock is best authenticated by CC EAL 5 +. It is almost impossible for this kind of smart card to be broken in hardware.

Built-in security algorithm

Encryption locks generally have built-in security algorithms. Commonly used encryption lock algorithms are:

RSA1024/RSA2048ECC192/ECC256/ECC384AES128/AES192/AES256DES/TDESSHA1/SHA256 storage space

At present, the maximum storage space of the encryption lock can reach 512K.

Interface standard

USB2.0 full speed equipment

Encryption method: shell tool

The shelling tool can encrypt and protect the code quickly, and the high security encryption can be completed in a few minutes without modifying the code.

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report