Chapter One -- Brief Introduction


Rockey New Package Features

Parallel port Rockey is a kind of traditional products. Although usb-Rockey will soon become the mainstream, we have never letup to improve the function of old parallel port Rockey. The present parallel port Rockey has greatly improved the compatibility with printer, it has two working modes, detect-print-busy and not-detect-print-busy. In detect-print-busy mode, if Rockey and printer work at the same time, the drivers will provide more chances for printer driver to control the terminal, but this will weaken the capacity of searching Rockey. However, not-detect-print-busy mode will eliminate the printing interference, but this will influence the high-density printing if calling key at the same time, such as printing picture data. If writer and encryption program are not running simultaneously, then there will be no problem.

The new drivers can work on three modes: parallel port, mix and usb modes. Parallel port mode only supports parallel port Rockey; mix mode supports two kind Rockeys, but the speed is a little slower; the speed of usb mode is medium. If you want to eliminate the printing interference completely, you can choose usb interface, but you have to setup drivers working mode to be usb.

Rockey History

Since 1994, we had started to work on software encryption. At that time, most domestic users were using dos encryption dongle. In that environment, we developed winlock which can encrypt windows exe file directly. Now, Feitian Co. has built the name of this product in chinese software market.

On the one hand, we firsthand learnt a lot of foreign advanced technique, learnt their effective sales and marketing art, well-rounded service system and excellent quality control system. At the same time, however, we know their defect and deficiency. Compared with other domestic brother companies, we know more technical features, developing status and trend about foreign encryption products.

On the other hand, in the past six years, rooted in domestic market, we know more than foreign brother companies about the past, nowadays and future of software encryption products in China, we know domestic market requirement, know the hard-working and persistent of China software developers.

Know ourselves, know others, so we win through highbrow or overweening that many companies have. In the past several years, we developed the useful part and discarded the defect of foreign products, absorbed their advanced technique and service system, so our own Rockey products are developed speedy, some technique even surpass the former.

The new Rockey product is developed on the basis of previous several versions. Combining many advantages of like encryption products, condensing several up to date software and hardware encryption techniques, the new Rockey has a good performance and price. With our development, new products of Rockey family are introduced continually. In 1999, iToken was born, which is an Internet identifying product, similar to IC card, but does not need card reader. It adopts random number as its operating input factors, and has a complete server that can identify user terminal online. It will be a market star in the future.

About Rockey

Rockey is a software protecting system based on hardware, which can protect software product from piracy loss. Inside Rockey, there is a small special CPU, this CPU can running independently from computer's CPU, also there is a small independent memory block for this CPU, so you can imagine that outside your computer, there is a mini computer that help to protect your software.

Rockey is very easy to use, user can choose API or envelop mode to protect your application program, and of course you can use these two modes at the same time to protect your software maximally. Once your program is protected, it only run with Rockey.

Rockey Advantages

1. Small and Exquisite

The size of Rockey parallel port key is 39mm x 55mm. It's very difficult to do this, because it needs a high integration level in hardware circuit, only a few manufacturers can do it in the world.

2. Good Compatibility

Rockey not only has a high diaphaneity for printer, scanner and other devices, but also can be unlimitedly cascaded with keys that manufactured by others when power pressure is not less than 2.2V. Even two Rockey with same type and same password can be series connected without mutual interference.

3. High Speed

After encrypted by Rockey, running speed of the software is similar to before. Even if user defines a complicated encryption algorithm in the Rockey, Rockey can process it in a very short time to ensure the smooth running of the program.

4. Ease of Use

The new Rockey is farthest reduced the utilizing interface, both API and envelope encryption. User can learn the using method of Rockey in a short time, thus can save a lot of time in software encryption.

5. High Security

On the basis of III Rockey, the new RockeyIV key is a redesigned high intensity Rockey that has absorbed advantages of foreign products. Rockey use two level passwords to protect software, only one level password can't rewrite special memory Rockey; this can separate the power limit of software manufacturer from end user, and thereby improve the security of Rockey. Rockey built in a time gate to prevent software tracking. However, developers can self-define algorithm for hardware encryption to reach a new level of security.

6. High Reliability

Rockey has a whole user management, different user will gain different password. The hardware ID of every Rockey is unique. After boiled into CPU, even manufacturer cannot change the password and hardware ID.

7. Overall System Support

The applications encrypted by Rockey can support system platform: Dos, Windows3.1, Windows95/97/98, Windows NT4.0, Windows 2000, Linux etc.

8. Abundant Software Interface

From dos to windows, Rockey provides respective interfaces for those common used develop tools, such as Tc, Bc, Msc, WatcomC, ToolBook, Delphi, VisualBasic, VisualC, C++ Builder, etc and the new recommended Rockey ActiveX control.

Rockey USB

The new Rockey usb product is developed on the basis of previous several versions, It combines many advantages of like encryption products, condenses several up to date software and hardware encryption techniques, thereby has a good performance and price. Among those features, the most outstanding one is that it conflict correction when printing. On the other hand, we have finished the driver of Windows NT4.0 for Rockey usb, which make us reach the top level in the world.


Copyright 1997-2006 FEITIAN Technology Co.,Ltd. All rights reserved.
Last Updated: Oct 9, 2006