User's Manual

4
7
SMARTKEY'S INTERNAL STRUCTURE ........................................................................................................22
7.1
I
D
-C
ODE REGISTER
:
THE PERSONAL CODE
........................................................................................................... 22
7.2
L
ABEL REGISTER
:
THE IDENTIFICATION AND ACCESS LABEL
............................................................................... 22
7.3
P
ASSWORD REGISTER
:
THE DATA ACCESS DONGLE
.............................................................................................. 22
7.4
S
ECURE
D
ATA REGISTER
:
THE DATA OF THE NON
-
VOLATILE MEMORY
................................................................23
7.5
F
AIL
C
OUNTER REGISTER
:
THE INCORRECT ACCESSES ALARMS
..........................................................................23
8
AUTOMATIC PROTECTION ............................................................................................................................. 24
8.1
A
UTOMATIC PROTECTION WITH
GSS .................................................................................................................. 24
8.2
P
ROTECTION OF
W
INDOWS PLATFORMS WITH
GSS............................................................................................. 25
8.3
GSS:
THE COMMON OPTIONS
............................................................................................................................... 25
8.3.1
Control of dongle presence....................................................................................................................... 25
8.3.2
Programming Error Messages.................................................................................................................. 25
8.3.3
Encryption of executable code ..................................................................................................................25
8.3.4
Parameter-based protection ..................................................................................................................... 26
8.3.5
Message displayed in absence of the dongle (key).................................................................................... 26
8.3.6
Limitation of number of executions and licenses ......................................................................................26
8.3.7
Automatic cryptography of data files........................................................................................................ 26
8.3.8
Protection of programs on a network ....................................................................................................... 26
8.3.9
Protecting files executable in series.......................................................................................................... 26
8.4
R
APID IMPLEMENTATION OF THE PROGRAM
'
S PROTECTION
................................................................................. 27
9
MANUAL PROTECTION..................................................................................................................................... 28
9.1
E
XECUTION METHOD OF
S
MART
K
EY COMMANDS
...............................................................................................28
9.2
L
OCATING MODE
................................................................................................................................................. 29
9.2.1
Parameter transfer.................................................................................................................................... 30
9.3
S
CRAMBLING MODE
............................................................................................................................................30
9.3.1
Parameter transfer.................................................................................................................................... 30
9.4
R
EADING MODE
................................................................................................................................................... 31
9.4.1
Parameter transfer.................................................................................................................................... 31
9.5
W
RITING MODE
................................................................................................................................................... 32
9.5.1
Parameter transfer.................................................................................................................................... 32
9.6
B
LOCK
R
EADING MODE
....................................................................................................................................... 33
9.6.1
Parameter transfer.................................................................................................................................... 33
9.7
B
LOCK
W
RITING MODE
....................................................................................................................................... 33
9.7.1
Parameter transfer.................................................................................................................................... 34
9.8
F
IXING MODE
......................................................................................................................................................34
9.8.1
Parameter transfer.................................................................................................................................... 35
9.9
E
NCRYPTING MODE
............................................................................................................................................. 35
9.9.1
Parameter transfer.................................................................................................................................... 36
9.9.2
Definition of the algorithm........................................................................................................................ 36
9.9.3
Example .................................................................................................................................................... 37