Chapter Four -- Rockey Basic Concept |
|||
|
|
||
All users of Rockey should read this chapter first. In this chapter, we'll introduce the basic concept of Rockey. Each developer that purchases Rockey will get four word passwords. Among, first two passwords are basic password (or first class password), the last two are advanced passwords (or second class password). The final software that developer provides for users should not include advanced passwords, which are provided only for developers to utilize. For the utility different of these two kind passwords, you can see the following specification. When developer gets the password, at the same time, he also can get a purchase code , which is 5 to 7 letters. This purchase code is the setting for customers's management. For example, if you have purchased a certain quantity Rockey, afterward, you want to purchase same password Rockey, then you only need to provide your purchase code instead of password. Each Rockey
has a unique hardware ID inside it, this ID is burnt in when the Rockey shipped from the factory, and even the
manufacturer cannot change it. Moreover, this hardware ID is unique; this
means that it is impossible for two Rockeys with
the same hardware ID in the world. This ID can be used to verify that the
encryption used is effective. This password is set for
developer to manage the issuing of software; it is a 32bit number, which is
saved in the special position in the key. This special inner zone of Rockey is setting for multi-module encryption; it also
can be used in advanced encryption for single module. Rockey
reserves sixteen words to save module unit. That is to say, at most can
encrypt 16 software modules at the same time with Module unit. User can write
module unit in this Rockey, the module is usable
except the module unit is 0, because 0 shows that the module is
unserviceable. User can check module unit attribute to identify if the module
unit is zero or not. To get the value of module unit then you must program
the Rockey. This attribute unit consists of
two different attribute units. The first attribute unit is module zero
attribute unit, the second attribute unit is module decrease attribute unit.
Each bit of module zero attribute unit stands by
whether the module unit is 0. 1=non-zero, 0= zero. Each bit of module
decrease attribute unit stands by whether the module word can be decreased.
1=can be decreased, 0=cannot be decreased. The size of this zone is 24
byte, which is public for users, user can read-write this zone at any time. This region is user
self-defined algorithm zone, has 32 word, that is
user can define 32 instructions algorithm. For algorithm definition, please
see chapter five. Rockey can input one seed code via internal algorithm, and get four return codes. This seed code algorithm is not opened. The same seed input the different passwords Rockey will return different seed codes, we can identify if a special Rockey is existed by checking the return codes are expected value. Via Rockey, you can get a real random number. |
|||
|
|||
Copyright
1997-2006 FEITIAN Technology Co.,Ltd.
All rights reserved. |