Chapter One -- Brief Introduction |
|||
|
|
||
Parallel port Rockey is a kind of traditional products. Although usb-Rockey will soon become the mainstream, we have never
letup to improve the function of old parallel port Rockey.
The present parallel port Rockey has greatly
improved the compatibility with printer, it has two
working modes, detect-print-busy and not-detect-print-busy. In
detect-print-busy mode, if Rockey and printer work
at the same time, the drivers will provide more chances for printer driver to
control the terminal, but this will weaken the capacity of searching Rockey. However, not-detect-print-busy mode will
eliminate the printing interference, but this will influence the high-density
printing if calling key at the same time, such as printing picture data. If
writer and encryption program are not running simultaneously, then there will
be no problem. The new drivers can work on
three modes: parallel port, mix and usb modes.
Parallel port mode only supports parallel port Rockey;
mix mode supports two kind Rockeys, but the speed
is a little slower; the speed of usb mode is
medium. If you want to eliminate the printing interference completely, you
can choose usb interface, but you have to setup
drivers working mode to be usb. Since 1994, we had started to
work on software encryption. At that time, most domestic users were using dos
encryption dongle. In that environment, we developed winlock
which can encrypt windows exe file directly. Now, Feitian
Co. has built the name of this product in chinese
software market. On the one hand, we firsthand
learnt a lot of foreign advanced technique, learnt their effective sales and
marketing art, well-rounded service system and excellent quality control
system. At the same time, however, we know their defect and deficiency.
Compared with other domestic brother companies, we know more technical
features, developing status and trend about foreign encryption products. On the other hand, in the past
six years, rooted in domestic market, we know more than foreign brother
companies about the past, nowadays and future of software encryption products
in China, we know domestic market requirement, know the hard-working and
persistent of China software developers. Know ourselves, know others, so
we win through highbrow or overweening that many companies have. In the past
several years, we developed the useful part and discarded the defect of
foreign products, absorbed their advanced technique and service system, so
our own Rockey products are developed speedy, some
technique even surpass the former. The new Rockey
product is developed on the basis of previous several versions. Combining
many advantages of like encryption products, condensing several up to date
software and hardware encryption techniques, the new Rockey
has a good performance and price. With our development, new products of Rockey family are introduced continually. In 1999, iToken was born, which is an Internet identifying
product, similar to IC card, but does not need card reader. It adopts random
number as its operating input factors, and has a complete server that can
identify user terminal online. It will be a market star in the future. About
Rockey Rockey is a software protecting system based
on hardware, which can protect software product from piracy loss. Inside Rockey, there is a small special CPU, this CPU can
running independently from computer's CPU, also there is a small independent
memory block for this CPU, so you can imagine that
outside your computer, there is a mini computer that help to protect your
software. Rockey is very easy to use, user can choose
API or envelop mode to protect your application program, and of course you
can use these two modes at the same time to protect your software maximally.
Once your program is protected, it only run with Rockey. 1. Small and
Exquisite The size of Rockey
parallel port key is 2. Good
Compatibility Rockey not only has a high diaphaneity for
printer, scanner and other devices, but also can be unlimitedly cascaded with
keys that manufactured by others when power pressure is not less than 2.2V.
Even two Rockey with same type and same password
can be series connected without mutual interference. 3. High Speed After encrypted by Rockey, running speed of the software is similar to
before. Even if user defines a complicated encryption algorithm in the Rockey, Rockey can process it
in a very short time to ensure the smooth running of the program. 4. Ease of Use The new Rockey
is farthest reduced the utilizing interface, both API and envelope
encryption. User can learn the using method of Rockey
in a short time, thus can save a lot of time in software encryption. 5. High
Security On the basis of III Rockey, the new RockeyIV key is
a redesigned high intensity Rockey that has
absorbed advantages of foreign products. Rockey use
two level passwords to protect software, only one level password can't
rewrite special memory Rockey; this can separate
the power limit of software manufacturer from end user, and thereby improve
the security of Rockey. Rockey
built in a time gate to prevent software tracking. However, developers can
self-define algorithm for hardware encryption to reach a new level of
security. 6. High
Reliability Rockey has a whole user management, different
user will gain different password. The hardware ID of every Rockey is unique. After boiled into CPU, even
manufacturer cannot change the password and hardware ID. 7. Overall
System Support The applications encrypted by Rockey can support system platform: Dos, Windows3.1,
Windows95/97/98, Windows NT4.0, Windows 2000, Linux etc. 8. Abundant
Software Interface From dos to windows, Rockey provides respective interfaces for those common
used develop tools, such as Tc, Bc, Msc, WatcomC,
ToolBook, Delphi, VisualBasic,
VisualC, C++ Builder, etc and the new
recommended Rockey ActiveX control. The new Rockey usb product is developed on the basis of previous several versions, It combines many advantages of like encryption products, condenses several up to date software and hardware encryption techniques, thereby has a good performance and price. Among those features, the most outstanding one is that it conflict correction when printing. On the other hand, we have finished the driver of Windows NT4.0 for Rockey usb, which make us reach the top level in the world. |
|||
|
|||
Copyright
1997-2006 FEITIAN Technology Co.,Ltd.
All rights reserved. |