Re: Preventing Software Piracy ???




"Volker Birk" <bumens@xxxxxxxxxxx> wrote in message
news:h1qs8oUb7fL1@xxxxxxxxxxxxxxxxx
Peter Olcott <NoSpam@xxxxxxxxxxxxx> wrote:
"Volker Birk" <bumens@xxxxxxxxxxx> wrote in message
news:h1qpg4U6u4L1@xxxxxxxxxxxxxxxxx
Peter Olcott <NoSpam@xxxxxxxxxxxxx> wrote:
"Volker Birk" <bumens@xxxxxxxxxxx> wrote in message
news:h1qek1UhbbL1@xxxxxxxxxxxxxxxxx
Peter Olcott <NoSpam@xxxxxxxxxxxxx> wrote:
What are some of the best products available?
Make a distributed system. Require the user to connect
to
some service.
Only deliver results.
Yes that would be a very effective solution. If the
input
data is provided to this service, and the output data
is
encrypted, and only the dongle knows how to decrypt
this
data, and each piece of data is only decrypted within
the
dongle, then copy protection may be close to
uncrackable.
You don't need a dongle then.
I would need the dongle to hide the decryption process. I
am
aiming to be as uncrackable as possible.

You don't need an decryption process, only authentication.

Yours,
VB.
--
Ceci n'est pas une pipe: |

From a copy protection point of view you may be correct.
From an intellectual property protection point of view there
would still be a gap in protection if the data was not
encrypted and decrypted within black boxes.


.



Relevant Pages

  • Re: Preventing Software Piracy ???
    ... If only the copy protection code ... the dongle, and bypass the test. ... Not if the decryption is only done in the dongle, ... I worked here as a software engineer, ...
    (comp.security.misc)
  • Re: Looking for information on dongle checks
    ... was used to decrypt the in-memory portions on-the-fly. ... determining the encryption algorithm, etc), which would take a month or two. ... presumably encrypted) application, no dongle, and require that it be ... Samplitude and Sequoia supposedly use Wibu's protection and have both been ...
    (comp.lang.asm.x86)
  • Re: Preventing Software Piracy ???
    ... In other words part of the software system being ... protected in only available from the dongle. ... This is the basis of all hardware copy protection dongles for the last ... even uncrackable by its original designer. ...
    (comp.security.misc)
  • Re: Preventing Software Piracy ???
    ... In other words part of the software system being ... protected in only available from the dongle. ... This is the basis of all hardware copy protection dongles ... even uncrackable by its original designer. ...
    (comp.security.misc)
  • Re: First step into Secure Embedded system
    ... I assume that the EEPROM is in the microprocessor. ... Once the processor is programmed and code and EEPROM protection set, someone cannot read or program the EEPROM without erasing the microprocessor code or invasively reading the code with acid, microprobes, etc., which is beyond the ability of simple potential cheaters. ... You can always reprogram the dongle or you can establish a secure connection between the dongle and your dongle programmer, ... This simplest thing is have the dongle send the serial number of the unit being authorized, using your secure link, which the controller verifies before being operation. ...
    (comp.arch.embedded)