The ROCKEY4ND is a driverless dongle that needs not a driver. The operating system has embedded the driver for ROCKEY4ND inside the system.
ROCKEY4ND is an advanced software protection system that attaches to the USB port of a computer. Your software may be duplicated, but it will only run when your ROCKEY4ND dongle is attached to the computer. It can also limit the use of your software. Your application will interact with ROCKEY4ND at start-up and during runtime. If the dongle has been removed, or if an application module has been accessed a preset number of times, it can issue an error message and terminate, or take other actions to insure compliance with your licensing agreement. ROCKEY4ND is versatile enough to support other limits as well.
100% Compatible with old ROCKEY4 dongle!
ROCKEY4ND can be seamlessly migrated from ROCKEY4 without the need to modify source code. All API’s are the same except the dll/lib files, just replace the new dll/lib files.
Unlike some competing products, ROCKEY4ND is a powerful miniature computer, with a CPU, memory and specialized firmware that allow for robust interaction with your application. You may write complex algorithms that are securely stored in the dongle, and then call those algorithms from time-to-time in your application. This method for software protection is strongly recommended and is very difficult to crack. And though ROCKEY4ND was designed to implement extremely high levels of security, it is also relatively easy to implement. The ROCKEY4ND API set has been simplified and improved based on experience gained from earlier versions.
The ROCKEY4ND dongle provides protection not only for 32-bit applications running on
64-bit operating system, but also for 64-bit native applications.
The ROCKEY4ND dongle also provide an envelope tool for .Net, C#, flash media (.swf) applications. Another ROCKEY4ND enveloper will also encrypt Windows Portable Executable files (such as .dll, .exe and .arx) and is simple enough to implement in only a few seconds.
The ROCKEY4ND enveloper is an ideal solution if you do not possess the source code for your application, or are unfamiliar with implementing an API. A security system that combines both the API set and the Envelope program will offer the greatest level of protection.
ROCKEY4ND remote update provide useful tool that developer can create a secure patch file to update the ROCKEY4ND dongle remotely. All the content will be encrypted with DES and will only be decrypted with the valid ROCKEY4ND dongle. With this tool, developer can simply re-enable the dongle, open more functions or re-license the dongle, etc.
|Memory Zone||Memory Zone Description||Memory Zone||ROCKEY4||ROCKEY4+||ROCKEY4 ND||NetROCKEY4ND|
|Hardware ID||Globally unique identifier||32-bit||32-bit||32-bit||32-bit||32-bit|
|User-ID-Zone||User defined identifier||16-Bit (each)||16-Bit (each)||16-Bit (each)||16-Bit (each)||16-Bit (each)|
|Modul Zone||Non-readable memory spaces (16) Used with arithmetic calculations||16-Bit (each)||16-Bit (each)||16-Bit (each)||16-Bit (each)||16-Bit (each)|
|Zero Attribute||Indicates if a module is “0” or not “0”. Each module has a zero attribute.||1-Bit (each)||1-Bit (each)||1-Bit (each)||1-Bit (each)||1-Bit (each)|
|Decrement Attribute||Indicates if a module can be decreased. Each module h??Aas a decrement attribute.||16-Bit (each)||16-Bit (each)||16-Bit (each)||16-Bit (each)||16-Bit (each)|
|User Data Zone||User defined memory space||24-byte||120-byte||1000-byte||1000-byte||1000-byte|
|User Algorithm Zone||Instruction storage for user defined algorithms||32-instructions||80-instructions||128-instructions||128-instructions||128-instructions|
|Dimensions||51 x 16 x 7 mm|
|Color||Blue, Green, Gray, Brown, Red|
|Min. Operating Voltage||50V|
|Current Consumption (active/idle)||<= 50 mA|
|Max. Write Cycle||>>100,000|
|Connector||USB Type A|
|Data Retention||10 Years|
|Onboard-Algorithm||128 User-defined simple algorithms|
|Hardware ID||Globally Unique|
|Remote-Udate||High-level Secure Remote Update, Multiple-Schemes|
|Production Tool||Batch Production Tool|
|Module Management||Multiple-Module and Management Schemes|
|Operating Systems||Windows XP/Vista/7/8/10/Server/Linux/MAC|
|Invisible Module Zone||64 modules to control software release schemes|
|Random Generator||Hardware Random Generator|
|Abundant APIs||VB, VC, Delphi, C++, C#, Java, PB, VS.Net….|