WHY DO SOFTWARE DEVELOPERS PREFER HyperLock ?
- Microprocessor based architecture is provided using high security electronic devices.
- Being totally transparent to the computer and other peripherals HyperLock allows
two way data communication.
- Has unique 8 bytes ROM serial number.
- Has 8 bytes 'Device Identification Code' to access the device memory and random
functions.
- Several HyperLock Security Devices can be daisy-chained to the same computer one
after another.
- Has non-volatile Read/Write memory up to 496 bytes. Retains data in Read/Write memory
for over 40 years.
- With advanced pseudo-random and encryption functions, it is possible to implement
high -security data protection applications.
- Communicates with PC using high security random key encryption, known as 'Variable
Response Communication'. It is impossible to simulate.
- As check and Read/Write operations take only a few milliseconds, your customers
will not even notice the execution of HyperLock.
- Advanced CMOS technology is used which supports low power computers such as notebooks.
- Wide variety of software support: Using Envelope Protection utilities the executable
programs can be automatically protected, thanks to the linkable object modules,
the protection can be applied to the sourcecode.
- The protected programs are encrypted with a sophisticated algorithm. This makes
reverse engineering impossible.
- Numerous programs on the same computer can be protected using a single HyperLock
Security Device.
- It is easy to use and apply.
WHAT ARE THE ADVANTAGES OF HyperLock ?
Programmable Security Access Code
Another important feature of HyperLock is the use of encrypted communication. Such
a protection system can not be simulated since a random key value is used both on
the PC and the HyperLock Security Device. If a logic analyzer is connected to the
PC through the parallel port, only meaningless data strings will be seen. Encryption
algorithm is a function of 'Device Identification Code' and internal 'User Code'.
Therefore, changing either of these values will be altering the encryption algorithm.
In other words, two HyperLock Security Devices with different 'Device Identification
Code' or internal 'User Code' would be using a different encryption algorithm for
communicating with the PC.
Fully Encrypted Data Stroge
In all HyperLock models except the PE types, there is a non-volatile Read/Write
memory (the content is kept even when there is no energy supplied i.e. the HyperLock
is not plugged) for programmers' use. To access this memory area, an 8-byte password
'Device Identification Code' must be given. Developers can use this secure memory
to save critical data. Thus, a better protection is obtained since this data is
not accessible without the software protection key (HyperLock Security Device)
and access password (Device Identification Code).
Pseudo-Random Number Generator
HyperLock Security Device is provided with a pseudo-random number generator. The
random number generated is a function of a 32-bit initial value (known as 'Seed'),
'Device Identification Code' and internal 'User Code'. There may be 4,294,967,296
different initial values since Seed value is 4 bytes. In fact, there are even more
alternatives for the initial value since random number is also a function of 12
bytes ID code. In other words, when 'Device Identification Code' or the 'User Code'
is changed there will be different pseudo-random series corresponding to same initial
values. Using the HyperLock Random Function Generator, high security encryption
applications can be built. Various tests showed that the random numbers generated
do not repeat themselves up to 10,000,000,000 terms. Random Number Generator can
also be used for protection applications by checking the values returned by the
'HyperLock Security Device' for different initial values. In such applications,
first the values returned by the 'HyperLock Security Device' are saved. Then, saved
and returned values are compared in the protected applications.