Appendix B -- Rockey Performance Comparison and Evaluation Form


After many years of research and development, the Software Encryption Products Department of Beijing FeiTian Hightech Corporation have absorbed modern technologies and expertise from both domestic and overseas companies, and is now offering a full line of proven and sophisticated products. We also provide software developers that demand encryption capabilities with evaluation packages, free of charge. Now, you can try using this product and fill up the form below to make a performance comparison between the Rockey and other products, and feel and see the big difference.

ROCKEY Performance Comparison and Evaluation Form

Items Compared

ROCKEY

Competitors

 

 

 

Yes

No

?

The USB port Rockey introduced in November, 1999

ü

 

 

 

Compact design, the parallel port Rockey is only 39mm long

ü

 

 

 

Latest built-in 8-bit CPU, 8 pins

ü

 

 

 

Low voltage design with operating voltage down to 2.2V

ü

 

 

 

Even the manufacturer cannot change the password and ID number because they are sealed inside CPU

ü

 

 

 

Read/Write memory capability provided

ü

 

 

 

Unique ID for each Rockey

ü

 

 

 

Seamless connectivity with itself and other Rockeys

ü

 

 

 

Same-number Rockeys can also be serially connected to operate

ü

 

 

 

Flexible to environments, able to work with printer connected

ü

 

 

 

Printing and Rockey operations do not interfere with each other while working simultaneously

ü

 

 

 

Support IEEE1284 standard

ü

 

 

 

Support envelop encryption (direct encryption on .exe and .dll files), no software source codes needed

ü

 

 

 

Able to prevent debugging tools from tracing and cracking

ü

 

 

 

User-definable hardware algorithms

ü

 

 

 

Encrypted software can operate under Windows 95, 98, 2000, and NT simultaneously

ü

 

 

 

Two level password control, where developer passwords do not appear in the user software

ü

 

 

 

Highly intelligent mass capacity CPU program memory

ü

 

 

 

User storage space provided, user memory extendable up to 512 bytes

ü

 

 

 

Built-in time out to prevent software tracing

ü

 

 

 

API <--> driver <--> port encryption communication protocol, providing protection from dongle emulation program

ü

 

 

 

Able to encrypt multiple software and modules, where encrypted software are remotely upgradeable

ü

 

 

 


Copyright 1997-2006 FEITIAN Technology Co.,Ltd. All rights reserved.
Last Updated: Oct 9, 2006