当前位置:网站首页>How to select software dongle
How to select software dongle
2022-07-24 19:22:00 【senseshield】
Software generally needs encryption and authorization , It can be done in one way , That is encryption lock . Encryption lock is used with software , The encryption lock must be inserted when opening the software , Encryption lock can realize the use of software within a time limit , LAN network lock mode , Limitations of software module functions .
Chip type
At present, the common types of encryption locks in the market are divided into single-chip microcomputer type and smart card chip . Smart card chips also include domestic smart cards and imported smart cards . Considering the current safety factors , The best choice of smart card chip for encryption lock is CC EAL 5+ Certified . This kind of smart card is almost impossible to be broken in terms of hardware .
Built in security algorithm
Encryption lock usually has a built-in security algorithm . Commonly used encryption lock algorithms are :
- RSA1024/RSA2048
- ECC192/ECC256/ECC384
- AES128/AES192/AES256
- DES/TDES
- SHA1/SHA256
Storage space
At present, the maximum storage space of encryption lock can reach 512K.
Interface standards
USB2.0 Full speed equipment
encryption : Shelling tools
The shelling tool can quickly encrypt and protect the code , No need to change the code , High security encryption can be completed in a few minutes .
边栏推荐
- Machine learning_ Softmax function (multi classification problem)
- Techempower web framework performance test 21st round results release --asp Net core continue to move forward
- Day 4 (item 1: household income and expenditure records)
- [JVM learning 03] class loading and bytecode Technology
- Installation and use of lsky Pro lancong drawing bed: a drawing bed program for online uploading and managing pictures
- Hangdian multi School Game 1 question 3 backpack (XOR dp+bitset)
- Common methods of string class
- Crazy God redis notes 11
- FPGA 20 routines: 9. DDR3 memory particle initialization write and read through RS232 (Part 1)
- LTSpice software power settings
猜你喜欢

多线程与并发编程常见问题(未完待续)

MySQL1

day 1

OPENGL学习(四)GLUT三维图像绘制

Emergency lighting design of large stadiums and gymnasiums

Nftscan and port3 have reached strategic cooperation in the field of NFT data

文献阅读:GoPose 3D Human Pose Estimation Using WiFi

PostgreSQL Elementary / intermediate / advanced certification examination (7.16) passed the candidates' publicity

Crazy God redis notes 11

Analysis of the basic concept of digital warehouse
随机推荐
Zooinspector Download
Decision tree_ ID3_ C4.5_ CART
OPENGL学习(三)GLUT二维图像绘制
Analysis of dropout principle in deep learning
2022 Hangzhou Electric Multi school first Dragon Slayer (dfs+ state compression)
湖仓一体释放全量数据价值,SequoiaDB v5.2线上发布会重磅来袭
JS part
Profile environment switching
Day 10 (inheritance, rewriting and use of super)
Leetcode402 remove K digits
【无标题】
Timed task framework
Colon sorting code implementation
Leetcode652 finding duplicate subtrees
JVM method call
文献阅读:GoPose 3D Human Pose Estimation Using WiFi
Zooinspector Download
Day 6 (array example)
MySQL final chapter
About core files