Chapter One -- Brief Introduction


Rockey History

Since 1998, we had started to work on software encryption. At that time, most domestic users were using dos encryption dongle. In that environment, we developed winlock which can encrypt windows exe file directly. Now, Feitian Co. has built the name of this product in chinese software market.

On the one hand, we firsthand learnt a lot of foreign advanced technique, learnt their effective sales and marketing art, well-rounded service system and excellent quality control system. At the same time, however, we know their defect and deficiency. Compared with other domestic brother companies, we know more technical features, developing status and trend about foreign encryption products.

On the other hand, in the past several years, rooted in domestic market, we know more than foreign brother companies about the past, nowadays and future of software encryption products in China, we know domestic market requirement, know the hard-working and persistent of China software developers.

Know ourselves, know others, so we win through highbrow or overweening that many companies have. In the past several years, we developed the useful part and discarded the defect of foreign products, absorbed their advanced technique and service system, so our own Rockey products are developed speedy, some technique even surpass the former.

The new Rockey4ND product is developed on the basis of previous several versions. Combining many advantages of like encryption products, condensing several up to date software and hardware encryption techniques, the new Rockey has a good performance and price. With our development, new products of Rockey family are introduced continually. In 1999, iToken was born, which is an Internet identifying product, similar to IC card, but does not need card reader. It adopts random number as its operating input factors, and has a complete server that can identify user terminal online. It will be a market star in the future.

About Rockey4ND

Rockey4ND is an advanced software protection system that attaches to the USB port of a computer. Your software may be duplicated, but it will only run when your Rockey4ND “dongle” is attached to the computer. It can also limit the use of your software. Your application will interact with Rockey4ND at start-up and during runtime. If the dongle has been removed, or if an application module has been accessed a preset number of times, it can issue an error message and terminate, or take other alternative actions to ensure compliance with your licensing agreement. Rockey4ND is versatile and can be applied to other scenarios as required.

Unlike some competing products, Rockey4ND is a powerful miniature computer, with a CPU, memory and specialized firmware built-in that allows for a robust interaction with your application. You may write complex algorithms that are securely stored in the dongle, and then call those algorithms from time-to-time in your application. This method for software protection is strongly recommended and is very difficult to crack, and although Rockey4ND was designed to implement extremely high levels of security - it is also relatively easy to implement. The Rockey4ND API set has been simplified and improved based on experience gained from earlier versions.

The Rockey4ND product also provides an Envelope program.(Please refer to Chapter 8 Rockey4ND Envelope Encryption.)The Rockey4ND Envelope is an ideal solution if you do not possess the source code for your application, or are unfamiliar with implementing an API. A security system that combines both the API set and the Envelope program will offer the greatest level of protection.

Rockey4ND Advantages

1. Compact Design

FEITIAN’s USB dongles are among the smallest in the world. The USB dongle is 50mm x 17mm x 7mm.

2. High Speed

Rockey4ND was designed to process even very complex algorithms with minimal delay for your application. Users will typically notice no degradation in application performance as a result of Rockey4ND being implemented.

3. Ease to Use

Rockey4ND’s reduced API set simplifies the programming effort in implementing API calls within your code, and the Envelope program has also been improved for increased security with the release of Rockey4ND. Developers lead time in implementing Rockey4ND is vastly reduced, saving both time and costs in deploying security into your software.

4. High Security Levels

Redesigned Rockey4ND offers a much higher level of security over previous version. Rockey4ND implements a two level security system to segregate users who require read only access from those who require administrative privileges. Rockey4ND has a built in time gate to prevent software tracking and is powerful enough to support developer defined algorithms that brings software protection to a new level of security.

5. High Reliability

FEITIAN employs an advanced customers managing system for Rockey4ND. We guarantee that the password of every customer is unique and that the hardware ID of every dongle is also unique. The password and hardware ID are burnt into the CPU, it is absolutely impossible to change, even for us—the manufacturer.

6. Broad Support for Operating Systems

Rockey4ND protected applications may run on: Windows 98SE/ME/2000 /XP/2003; Linux; MAC.

7. Abundant Programming Language Interfaces

Rockey4ND provides interfaces for these common development tools: PB, DELPHI, VFP, VB, VC, C++ BUILDER and etc.

 


Copyright (C) 2007-2009 Feitian Technologies Co.,Ltd. All rights reserved.
Last Updated: Aug 5, 2009