User's Manual

5
9.10
P
ROGRAMMING MODE
.................................................................................................................................... 37
9.10.1
Parameter transfer.................................................................................................................................... 38
9.11
C
OMPARING MODE
.........................................................................................................................................38
9.11.1
Parameter transfer.................................................................................................................................... 39
9.12
M
ODEL READING MODE
.................................................................................................................................. 39
9.12.1
Parameter transfer.................................................................................................................................... 40
9.13
S
ERIAL NUMBER READING MODE
.................................................................................................................... 40
9.14
E
XT MODEL READING MODE
........................................................................................................................... 41
9.15
F
IX READING MODE
........................................................................................................................................ 41
9.16
F
AIL COUNTER READING MODE
...................................................................................................................... 42
9.17
AES
MODE
.....................................................................................................................................................42
9.17.1
Authentication........................................................................................................................................... 42
9.17.2
Utilization .................................................................................................................................................43
9.18
AES
SET MODE
............................................................................................................................................... 43
9.19
AES
SCRAMBLE MODE
................................................................................................................................... 43
9.20
E
RRORS
.......................................................................................................................................................... 44
9.21
S
OME SUGGESTIONS ON USING
S
MART
K
EY
'
S FUNCTIONS
............................................................................... 44
10
PROGRAM PROTECTION TECHNIQUES AND EXAMPLES............................................................... 45
10.1
G
ENERAL GUIDELINES
.................................................................................................................................... 45
10.1.1
Check the dongle in different points of your program. ............................................................................. 45
10.1.2
Extensive use of the Scrambling operation ...............................................................................................45
10.1.3
Hiding Label and Password...................................................................................................................... 46
10.1.4
Use the .OBJ version of the drivers .......................................................................................................... 46
10.1.5
CheckSum of your Executable files and of the DLLs ................................................................................46
10.1.6
Do not stop execution immediately if the dongle is not found................................................................... 46
10.1.7
Encrypt the required data with the Scrambling operation........................................................................ 47
10.2
G
UIDELINES FOR THE
M
EMORY
...................................................................................................................... 47
10.2.1
Control the Memory's functionality ..........................................................................................................47
10.2.2
Store the data required by the Memory..................................................................................................... 47
10.3
E
XAMPLES OF IMPLEMENTATION
.................................................................................................................... 48
10.3.1
Example 1 – Basic Use ............................................................................................................................. 48
10.3.2
Example 2 – Basic use of Scrambling....................................................................................................... 48
10.3.3
Example 3/4 – Storing and using a C function in the SmartKey memory .................................................49
10.3.4
Example 5 – Control of the DLL checksum ..............................................................................................51
10.3.5
Example 6 – Hiding Label and Password information............................................................................. 52
10.3.6
Example 7 – Scrambling confidential data ...............................................................................................53
10.3.7
Example 8/9–Generating and using a large Scrambling table................................................................. 53
10.3.8
Example 10 – Code encrypting.................................................................................................................56
10.3.9
Example 11 – AES authentication............................................................................................................. 56
11
MANUAL PROTECTION IN A NETWORK............................................................................................... 60