Life Health Care
Q&A
Dealer is YOU

รับสมัคร
ตัวแทนจำหน่ายทั่วประเทศ

สนใจติดต่อ
Tel : 02 704 8987
Mobile : 08 1989 5258
คุณจอห์นสัน

The Book Chest
Wej Shop
iT&PDA CENTER
i-Service

i-Service
Digital Gateway F3 Room 307
Mobile : 08 5999 2053

Korat Satellite
N.T. Computer & Communication

N.T. Computer & Communication
Nakhon Pathom
Tel : 0 3428 5444


     MicroDog
     Home > Products > Rights Management > MicroDog

MicroDog


MicroDog is a programmable device, containing 200-byte memory. It is accessible with API function when Hardware Dog is connected with the computer. You can choose to use MicroDog in operatin systems such as Windows and Linux  

Developer's tool


With the developer's tool (Dogedt32.exe) you can edit the memory of the hardware Dogs, get the Serial Number and initialize the Hardware Dogs in batch. 

USB Dog has the following features:


• Transparent to all other USB peripherals: USB port is designed to connect multiple devices simultaneously. It is helpful to avoid conflicts between the devices. Parallel port is designed for standalone devices and can hardly avoid conflicts between them.

• More Stability: USB port comes with a power cable, and can provide stable working power. This helps improve the working conditions for USB Dog.  


How does MicroDog SDK work?

Applications manage MicroDog with API functions. Hardware Dog responds to this operation and returns values to applications. Applications verify the returned values and act accordingly. Please see the chart below:
MicroDog SDK offers two protection methods: Call API and Shell Protection. You can choose either to design your protection scheme.

Method1: Using Call API


These objects provide API function to manage MicroDog. You can add API function to the source code to protect the applications. You can set the time to call API function and how to act if correct MicroDog does not exist as you need. In principle, more API functions in source code will be more effective to prevent potential hackers.

Method2: Shell Protection


Shell protection provides a simple and fast solution. It “wraps” your applications automatically (*.exe and *.dll) without modifying the source code. When the protected application runs, it will verify the presence of the correct MicroDog. Once the correct MicroDog does not exist, error message will display and the application will be terminated abnormally. Shell Protection provides other function such as setting the expiration date.

Operation system support


MicroDog SDK can run in the operation systems such as Windows 9X/ME/NT/2000/XP/Server2003, and Linux can support most programming languages and development tools.

Features

• Protect Algorithm.
The software developer may select his own algorithms by defining the bytes for algorithm and algorithm descriptors flexibly. MicroDog contains a 200-bytes nonvolatile memory. You can use Developer's tool or API functions to program the memory. The bytes for defining descriptor are from 196 th to 198 th and that of algorithm is 199 th . So there are 256 different algorithms could be selected, algorithmic descriptor has 24-bits, the variations could be more than 4000 mega by changing both the bytes for algorithm and algorithmic descriptor.

• Microprocessor. MicroDog contains a microprocessor. The physical program cannot be read or changed. This helps guarantee MicroDog cannot be duplicate illegally.

• DERNT. SafeNet Chaina Data Exchange Random Noise Technology enables MicroDog to effectively resist possible cracking from hardware or software debuggers such as a Logic Analyzer.

• Maze Technology. Maze technology will effectively change the executive order of the programs to enhance MicroDog' anti-tracing ability.

• Timer. MicroDog contains a timer. This timer defines the maximum time that all operations may take to access the MicroDog. Normal operations will not exceed the time limit, but operations tracing the data in MicroDog usually will. If this happens, the MicroDog will return error values.

• Anti-sharing. MicroDog contains anti-sharing devices for parallel port.

• Password. You can set a 32-bit password in MicroDog. Without the correct password, data in memory cannot be read or written.

• Memory 200-byte nonvolatile memory for developers to store important data. The data can be read or written with API function or DogEditor.

• Manufacture code. A MicroDog has a unique Manufacture code that is sequential in the assembly line. Manufacture code of MicroDog with same Serial Number may be different.

• Cascade performance. You may cascade multiple MicroDog or other software protection hardware key with different Serial Number to achieve more reliable security.

• The Improved Security Engine II . We developed independently it, which integrates the latest cryptology and the advanced algorithm; it will promote the anti-cracked capability of software.


Technical Specifications

Specifications :
Dimension: 53.8*16.3* 8.3mm
EEPROM memory capacity: 200 bytes
Minimum working voltage: 2.5V
Maximum average working current: 1mA (Testing environment: voltage is 5V, reading and writing Hardware Dog continuously.)
Working temperature: 0~55 o C
Allowable writing 1,000,000
Allowable reading: Limitless 
Power-off Holding Period: 100 years 
Communication speed: 1.5 Mbps
 

Cross Platform :
Windows 98 / ME / 2000 / XP /vista/ Sever 2003/2008
LINUX (Red Hat Kernel 2.2 / 2.4)

Supported Compilers :
Win32: C, C++ ( Visual, Borland, C++Builder, MFC), FORTRAN ( LAHEY, PowerStation, Visual ), Java, VisualBasic, VisualFoxpro, PowerBuilder, Delphi , JavaScript, VBScript, VBA, InstallShield, AutoCAD, .NET
Linux: C, C++, Java

 
Related Documents
Product Brief_Th
Product Brief_En
White Paper_En
 


Fitab Complex Co.,Ltd.   20  Soi Serithai 44 Sub 1, Kannayao, Kannayao, Bangkok 10230 Thailand.
Tel : 66 081 989 5258 Or 66 2704 8987   Fax : 66 2704 8321   E-mail :
sales@fitab.com