ROCKEY4 is an advanced software protection system that attaches to the parallel or USB port of a computer. Your software may be duplicated, but it will only run when your ROCKEY4 dongle is attached to the computer. Your application will interact with ROCKEY4 at start-up and during runtime, No Dongle means No License to execute your software. You can also limit the use of your software which is very common in the software industry for DEMO purposes or SHAREWARE.
ROCKEY4 keys have a unique ID number, 24 (Standard), 120 (Plus), or 1000 (ND) bytes memory, 16 / 64 (ND) internal variables (modules), the possibility to define own algorithms, a simple API, and an automatic protection of Windows executables (.exe, .dll, .arx).Various license models are easy to implement using these features.
Hardware specification
- 8 bit CPU chip, 8 pin. Specially made for ROCKEY4 according to your requirement.
- Designed for low power usage; the lowest voltage required is 2.2 voltage.
- Custom-built CPU, 1024 bytes capacity program memorizer, highly intelligent with lot of functions.
- Time limitation device to prevent software tracking.
Show: Full Specs/Additional configurations
Hardware specification
- 8 bit CPU chip, 8 pin. Specially made for ROCKEY4 according to your requirement.
- Designed for low power usage; the lowest voltage required is 2.2 voltage.
- Custom-built CPU, 1024 bytes capacity program memorizer, highly intelligent with lot of functions.
- Time limitation device to prevent software tracking.
Hardware Password
- Unique Customer's code for you, Passwords burnt into the CPU through OTP, even we cannot change after the burning. Unique Hardware's ID Code for each dongle.
- Each Rockey4 has unique 32-bit ID code, 2 grades, 4 groups 16 bit Passwords and a customer ID code. You can write customer ID code using the second grade passwords (the last 2 passwords). Using one grade passwords, customer ID code can only be read, but cannot be written; arithmetic zone and module zone can only be read also, it can be written only using second grade passwords. These second grade passwords are not to be stored in the executable program to prevent Hacker rewriting the module contents and the arithmetic.
Hardware Arithmetic
- Self-defined arithmetic. You can define 32 terms of instruction. The hardware supports +, -, *, XOR, AND, OR, <<, NOT arithmetic operators and 8 units of operand A, B, C, D, E, F, G, H. A, B, C, D is for custom value while E, F, G, H is the dongle's pre-defined value. The dongle offer 3 kinds of arithmetic calculation.
- Seed code used to shift data and test software. Rockey4's CPU offers seed code arithmetic, the input is 32 bit, and the output is 64 bit; Rockey4 self-defined arithmetic, the input is 64 bit, the output is 64 bit. Therefore, if Hacker want to find out the seed code arithmetic of Rockey4, he must have 32GB hardware space; and if he want to find out the self-defined arithmetic of Rockey4, he must have 67 times square of 2(147573952589676412928) bit hardware space. This is too big to achieve. You can see the high security level of Rockey4 dongles.
Hardware Environment
- Can be chained in series with other Rockey4 or any other Dongles. Supports parallel port scanner and parallel port cable connection of 2 PC. Rockey4 with the same code can be handled in series also. In theory, if the PC have enough power, 240 pieces of hardware can be handled in series, and in fact, the software supports 16 ROCKEY4 to be handled in series.
- According to IEEE1284 standard, no disturbance will occur to printer's operation when it is connected with the printer.
Enveloper Encryption
- Enveloper encrypted DLL, EXE, ARX etc. directly without needing source of the program. Best compatibility; supports Windows 9x, NT, and all 32-bit Windows programs. If you combine it with API, the security will be better.
- Data File encryption is currently under development. Please check back regularly for latest updates.