Why HyperLock


WHY DO SOFTWARE DEVELOPERS PREFER HyperLock ?

  • Microprocessor based architecture is provided using high security electronic devices.
  • Being totally transparent to the computer and other peripherals HyperLock allows two way data communication.
  • Has unique 8 bytes ROM serial number.
  • Has 8 bytes 'Device Identification Code' to access the device memory and random functions.
  • Several HyperLock Security Devices can be daisy-chained to the same computer one after another.
  • Has non-volatile Read/Write memory up to 496 bytes. Retains data in Read/Write memory for over 40 years.
  • With advanced pseudo-random and encryption functions, it is possible to implement high -security data protection applications.
  • Communicates with PC using high security random key encryption, known as 'Variable Response Communication'. It is impossible to simulate.
  • As check and Read/Write operations take only a few milliseconds, your customers will not even notice the execution of HyperLock.
  • Advanced CMOS technology is used which supports low power computers such as notebooks.
  • Wide variety of software support: Using Envelope Protection utilities the executable programs can be automatically protected, thanks to the linkable object modules, the protection can be applied to the sourcecode.
  • The protected programs are encrypted with a sophisticated algorithm. This makes reverse engineering impossible.
  • Numerous programs on the same computer can be protected using a single HyperLock Security Device.
  • It is easy to use and apply.

WHAT ARE THE ADVANTAGES OF HyperLock ?

Programmable Security Access Code

Another important feature of HyperLock is the use of encrypted communication. Such a protection system can not be simulated since a random key value is used both on the PC and the HyperLock Security Device. If a logic analyzer is connected to the PC through the parallel port, only meaningless data strings will be seen. Encryption algorithm is a function of 'Device Identification Code' and internal 'User Code'. Therefore, changing either of these values will be altering the encryption algorithm. In other words, two HyperLock Security Devices with different 'Device Identification Code' or internal 'User Code' would be using a different encryption algorithm for communicating with the PC.

Fully Encrypted Data Stroge

In all HyperLock models except the PE types, there is a non-volatile Read/Write memory (the content is kept even when there is no energy supplied i.e. the HyperLock is not plugged) for programmers' use. To access this memory area, an 8-byte password 'Device Identification Code' must be given. Developers can use this secure memory to save critical data. Thus, a better protection is obtained since this data is not accessible without the software protection key (HyperLock Security Device) and access password (Device Identification Code).

Pseudo-Random Number Generator

HyperLock Security Device is provided with a pseudo-random number generator. The random number generated is a function of a 32-bit initial value (known as 'Seed'), 'Device Identification Code' and internal 'User Code'. There may be 4,294,967,296 different initial values since Seed value is 4 bytes. In fact, there are even more alternatives for the initial value since random number is also a function of 12 bytes ID code. In other words, when 'Device Identification Code' or the 'User Code' is changed there will be different pseudo-random series corresponding to same initial values. Using the HyperLock Random Function Generator, high security encryption applications can be built. Various tests showed that the random numbers generated do not repeat themselves up to 10,000,000,000 terms. Random Number Generator can also be used for protection applications by checking the values returned by the 'HyperLock Security Device' for different initial values. In such applications, first the values returned by the 'HyperLock Security Device' are saved. Then, saved and returned values are compared in the protected applications.