User`s manual

UC-8410/8416/8418 LX User’s Manual Programmer’s Guide
5-21
$(STRIP) $(TARGET)-release $(TARGET1)-release
clean:
rm -f *.o $(TARGET)-debug $(TARGET)-release $(TARGET1)-debug $(TARGET1)-release
Note: Only UC-8418-LX support CAN port communication.
Software Lock
“Software Lock” is an innovative technology developed by the Moxa engineering team, and can
be used by a system integrator or developer to protect applications from being copied. An
application is compiled into a binary format bound to the embedded computer, and the operating
system that the application runs on. As long as it is obtained from the computer, it can be installed
on the same hardware and under the same operating system, resulting in a loss of the add-on value
created by the developer.
Users can deploy this data encryption method to develop the software for the applications. The
binary file associated with each of your applications needs to undergo an additional encryption
process after you have developed it. The process requires you to install an encryption key in the
target computer.
1. Choose an encryption key (e.g.,”ABigKey”) and install it in the target computer by a
pre-utility program called ‘setkey’.
#setkey ABigKey
NOTE: If you would like to clear the encryption key on the target computer, use the
following command.
#setkey ““
2. Develop and compile your program on the development PC.
3. On the development PC, run the utility program ‘binencryptor’ to encrypt your program with
an encryption key.
#binencryptor yourProgram ABigKey
4. Upload the encrypted program file to the target computer by FTP or NFS and test the program.
The encryption key is a computer-wise key. This means that the computer has only one key
installed. Running the program ‘setkey’ multiple times overrides the existing key.
To prove the effectiveness of this software protection mechanism, prepare a target computer
on which an encryption key has not been installed, or install a key different from that used to
encrypt your program. In either case, the encrypted program fails immediately.
This mechanism also allows computers with an encryption key installed to bypass programs
that are not encrypted. This is handy in the development phase since you can develop your
programs and test them cleanly on the target computer.