Unikey Manual

Total Page:16

File Type:pdf, Size:1020Kb

Unikey Manual UniKey Manual Version 7.20 IOLOCK The data and information contained in this document cannot be altered without the express written permission of IoLock. No part of this document can be reproduced or transmitted for any purpose whatsoever, either by electronic or mechanical means. The general terms of trade of IoLock apply. Diverging agreements must be made in writing. Copyright © SecuTech Solution Inc. All rights reserved. WINDOWS is a registered trademark of Microsoft Corporation. The WINDOWS-logo is a registered trademark (TM) of Microsoft Corporation. Software License The software and the enclosed documentation are copyright-protected. By installing the software, you agree to the conditions of the licensing agreement. Licensing Agreement IoLock gives the buyer the simple, exclusive and non-transferable licensing right to use the software on one individual computer or networked computer system (LAN). Copying and any other form of reproduction of the software in full or in part as well as mixing and linking it with others is prohibited. The buyer is authorized to make one single copy of the software as backup. IoLock reserves the right to change or improve the software without notice or to replace it with a new development. IoLock is not obliged to inform the buyer of changes, improvements or new developments or to make these available to him. A legally binding promise of certain qualities is not given. IoLock is not responsible for damage unless it is the result of deliberate action or negligence on the part of IoLock or its aids and assistants. IoLock accepts no responsibility of any kind for indirect, accompanying or subsequent damage. - 1 - Contact Information HTTP www.iolock.com E-Mail [email protected] Please Email any comments, suggestions or questions regarding this document or our products to us at: [email protected] Version Date 1.0 2006.1 1.1 2006.8 1.2 2006.10 1.3 2006.12 2.0 2007.2 2.1 2007.4 2.2 2007.8 3.0 2008.5 4.0 2008.8 5.0 2009.3 6.0 2010.4 7.0 2010.6 7.1 2010.9 7.2 2010.10 - 2 - CE Attestation of Conformity UniKey is in conformity with the protection requirements of CE Directives 89/336/EEC Amending Directive 92/31/EEC. UniKey satisfies the limits and verifying methods: EN55022/CISPR 22 Class B, EN55024: 1998. FCC Standard This device is in conformance with Part 15 of the FCC Rules and Regulation for Information Technology Equipment. Operation of this product is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. USB The equipment of UniKey is USB based. Conformity to ISO 9001:2000 The Quality System of SecuTech Solution Inc., including its implementation, meets the requirements of the standard ISO 9001:2000 ROHS All UniKey products are environmental friendly with ROHS certificates. List of Tables ABOUT THIS GUIDE ............................................................................. - 9 - - 3 - CHAPTER 1 INTRODUCTION ............................................................... - 10 - UNIKEY SOFTWARE PROTECTION DEVELOPER'S KIT .............................................. - 10 - 1.2 UNIKEY OVERVIEW .................................................................................. - 11 - 1.3 A GLANCE AT UNIKEY SDK ....................................................................... - 12 - 1.4 UNIKEY MODELS ..................................................................................... - 17 - 1.5 UNIKEY ADVANTAGES ............................................................................... - 19 - 1.6. TECHNICAL SUPPORT ............................................................................... - 20 - CHAPTER 2 KEY CONCEPTS IN UNIKEY ................................................ - 21 - 2.1 YOUR UNIQUE UNIKEY DONGLE ................................................................. - 21 - 2.2 WHAT MAKES THE UNIKEY SYSTEM UNIQUE?............................................... - 22 - 2.21 Protect .............................................................................................. - 22 - 2.3 HOW DOES UNIKEY PROTECTION WORK? .................................................... - 22 - 2.31 Applications linked to UniKey Hardware .......................................... - 22 - 2.32 Using the Computing Engine ............................................................ - 23 - 2.33 Checking the UniKey ID Number ...................................................... - 23 - 2.4 UNIKEY PROTECTION METHODS ................................................................. - 23 - 2.41 UniKey Enveloper .............................................................................. - 23 - 2.42 UniKey Application Programming Interface (API) ............................ - 24 - 2.5 WHICH METHOD TO USE? ........................................................................ - 25 - 2.6 LICENSING MODELS ................................................................................. - 25 - 2. 7 HOW DOES UNIKEY LICENSING WORK? ....................................................... - 26 - 2.8 REMOTE UPDATE SYSTEM ......................................................................... - 27 - CHAPTER 3 UNIKEY MODELS .............................................................. - 28 - 3.1 A COMPARISON BETWEEN DIFFERENT UNIKEY MODELS .................................. - 28 - 3.2 HOW TO CHOOSE A UNIKEY PRODUCT? ........................................................ - 30 - 3.3 UNIKEY ARCHITECTURE ............................................................................ - 31 - 3.4 REAL TIME FUNCTION .............................................................................. - 38 - 3.41 What Is the Real Time Clock like? .................................................... - 38 - 3.42 How does the Real Time Function Work? ........................................ - 38 - 3.43 How to Apply UniKey Time Function? .............................................. - 39 - 3.5 NETWORK FUNCTION ............................................................................... - 42 - 3.51 Components for the UniKey Network Function ................................ - 43 - 3.52 Max Number of Concurrent Clients .................................................. - 45 - 3.53 NetUniKey Configuration File ........................................................... - 46 - 3.54 Network Server ................................................................................. - 51 - 3.55 Network Client .................................................................................. - 55 - 3.56 Quick Setup ...................................................................................... - 55 - 3.6 UNIKEY DRIVE ........................................................................................ - 56 - 3.61 What is UniKey Drive like? ................................................................ - 56 - 3.62 How to operate UniKey Drive? ......................................................... - 58 - - 4 - 3.63 UniKey Drive Console ........................................................................ - 60 - CHAPTER 4 UNIKEY CONSOLE ............................................................ - 73 - 4.1 EDITING A UNIKEY ................................................................................... - 74 - 4.2 TESTING A UNIKEY ................................................................................... - 84 - 4.3 DATABASE .............................................................................................. - 88 - 4.4 REMOTE UPDATER ................................................................................... - 90 - 4.5 NETWORK FUNCTION ............................................................................... - 94 - CHAPTER 5 SETTING UP UNIKEY ........................................................ - 99 - 5.1 INSTALLATION OF UNIKEY HARDWARE AND SOFTWARE ................................... - 99 - 5.2 GENERAL PROCESS OF THE UNIKEY SOFTWARE PROTECTION .......................... - 100 - 5.21 Enveloper ........................................................................................- 100 - CHAPTER 6 PROTECTION SOFTWARE ............................................... - 103 - 6.1 OVERVIEW OF UNIKEY PROTECTION .......................................................... - 103 - 6.2 WHAT MAKES UNIKEY PROTECTION POSSIBLE ............................................ - 103 - 6.3 UNIKEY PROTECTION METHODS ............................................................... - 104 - 6.4 WHAT CAN BE PROTECTED? .................................................................... - 104 - CHAPTER 7 UNIKEY API PROTECTION ............................................... - 105 - 7.1 AN OVERVIEW OF THE UNIKEY API ........................................................... - 105 - 7.2 API PROTOTYPE .................................................................................... - 106 - CHAPTER 8 UNIKEY ENVELOPE PROTECTION .................................... - 107 - 8.1 FUNCTIONALITY ..................................................................................... - 107 - 8.2 ADVANTAGES ........................................................................................ - 107 - 8.3 UNIKEY ENVELOPE PROTECTION PROCEDURE ............................................... - 108 - 8.4 IMPLEMENTING FUNCTIONS OF THE UNIKEY ENVELOPER ............................... - 110 - CHAPTER 9 PROTECTION STRATEGIES..............................................
Recommended publications
  • Referência Debian I
    Referência Debian i Referência Debian Osamu Aoki Referência Debian ii Copyright © 2013-2021 Osamu Aoki Esta Referência Debian (versão 2.85) (2021-09-17 09:11:56 UTC) pretende fornecer uma visão geral do sistema Debian como um guia do utilizador pós-instalação. Cobre muitos aspetos da administração do sistema através de exemplos shell-command para não programadores. Referência Debian iii COLLABORATORS TITLE : Referência Debian ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki 17 de setembro de 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Referência Debian iv Conteúdo 1 Manuais de GNU/Linux 1 1.1 Básico da consola ................................................... 1 1.1.1 A linha de comandos da shell ........................................ 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 A conta root .................................................. 2 1.1.4 A linha de comandos shell do root ...................................... 3 1.1.5 GUI de ferramentas de administração do sistema .............................. 3 1.1.6 Consolas virtuais ............................................... 3 1.1.7 Como abandonar a linha de comandos .................................... 3 1.1.8 Como desligar o sistema ........................................... 4 1.1.9 Recuperar uma consola sã .......................................... 4 1.1.10 Sugestões de pacotes adicionais para o novato ................................ 4 1.1.11 Uma conta de utilizador extra ........................................ 5 1.1.12 Configuração
    [Show full text]
  • Email Correspondence Between Commissioners and Google, Facebook, and Apple Between January 1, 2015 and March 25, 2015
    From: Su, Henry Sent: Thursday, March 05, 2015 9:51 AM To: Rob Mahini Subject: Accepted: Invitation: Rob/Henry coffee @ Tue Mar 10, 2015 lOam - 11am ([email protected]) From: Su, Henry Sent: Monday, March 09, 2015 11:11 PM To: Rob Mahini Subject: Accepted: Updated Invitation: Rob/Henry coffee @ Tue Mar 10, 2015 9:30am ­ 10:30am (Robert Mahini) From: Rob Mahini <[email protected]> Sent: Tuesday, March 10, 2015 11:37 AM To: Su, Henry <[email protected]> Subject: RE: Contact info Sorry - bad traffic this morning. Running late, should be there in 5. On Mar 9, 2015 10:58 AM, "Su, Henry" < [email protected]> wrote: Sure, that's fine. --Henry From: Rob Mahini Sent: Monday, March 09, 2015 10:56 AM To: Su, Henry Subject: Re: Contact info Henry - I have a meeting at the FTC now at 11am. Would it be okay to meet earlier tomorrow morning? I get in an On Mar 5, 2015 3:50 PM, "Rob Mahini" <[email protected]<mailto:[email protected]>> wrote: Done - looking forward to it. On Thu, Mar 5, 2015 at 3:49 PM, Su, Henry <[email protected]<mailto:[email protected]>> wrote: Sorry, I didn't focus on the proposed time in your earlier email. 10:00 a.m . is fine on Tuesday. Could you send me a From : Rob Mahini Sent: Thursday, March 05, 2015 3:42 PM To: Su, Henry Subject: Re: Contact info I have a call that ends around 9:30, and then can come straight after that. I think that would get me there around On Thu, Mar 5, 2015 at 3:32 PM, Su, Henry <[email protected]<mailto:[email protected]><mailto:[email protected]<mailto:hfilJ..@J Can you meet early? From: Rob Mahini Sent: Thursday, March 05, 2015 3:31 PM To: Su, Henry Subject: Re: Contact info Henry - do mean the one on 7th and E? On Thu, Mar 5, 2015 at 3:27 PM, Rob Mahini <[email protected]<mailto:[email protected]><mailto:robn Sounds great.
    [Show full text]
  • PAN Localization Survey of Language Computing in Asia 2005
    Survey of Language Computing in Asia 2005 Sarmad Hussain Nadir Durrani Sana Gul Center for Research in Urdu Language Processing National University of Computer and Emerging Sciences www.nu.edu.pk www.idrc.ca Published by Center for Research in Urdu Language Processing National University of Computer and Emerging Sciences Lahore, Pakistan Copyrights © International Development Research Center, Canada Printed by Walayatsons, Pakistan ISBN: 969-8961-00-3 This work was carried out with the aid of a grant from the International Development Research Centre (IDRC), Ottawa, Canada, administered through the Centre for Research in Urdu Language Processing (CRULP), National University of Computer and Emerging Sciences (NUCES), Pakistan. ii To the languages which will be lost before they are saved iii iv Preface This report is an effort to document the state of localization in Asia. There are a lot of different initiatives undertaken to localize technology across Asia. However, no study surveys the extent of work completed. It is necessary to document the status to formulate effective and coordinated strategies for further development. Therefore, current work was undertaken to collect the available data to baseline local language computing in Asia. This work has been done through PAN Localization project. There are about 2200 languages spoken in Asia. It is difficult to undertake the task of documenting the status of all these languages. Twenty languages are being surveyed to assess the level of language computing across Asia. The selected languages have official status in Asian countries of Middle East, South, South East and East Asia. The selection has been done to cover a variety of scripts and languages of Asia, but is eventually arbitrary.
    [Show full text]
  • Apache-Ivy Wordgrinder Nethogs Qtfm Fcgi Enblend-Enfuse
    eric Ted fsvs kegs ht tome wmii ttcp ess stgit nut heyu lshw 0th tiger ecl r+e vcp glfw trf sage p6f aris gq dstat vice glpk kvirc scite lyx yagf cim fdm atop slock fann G8$ fmit tkcvs pev bip vym fbida fyre yate yturl ogre owfs aide sdcv ncdu srm ack .eex ddd exim .wm ibam siege eagle xlt xclip gts .pilot atool xskat faust qucs gcal nrpe gavl tintin ruff wdfs spin wink vde+ ldns xpad qxkb kile ent gocr uae rssh gpac p0v qpdf pudb mew cc e afuse igal+ naim lurc xsel fcgi qtfm sphinx vmpk libsmi aterm lxsplit cgit librcd fuseiso squi gnugo spotify verilog kasumi pattern liboop latrace quassel gaupol firehol hydra emoc fi mo brlcad bashdb nginx d en+ xvnkb snappy gemrb bigloo sqlite+ shorten tcludp stardict rss-glx astyle yespl hatari loopy amrwb wally id3tool 3proxy d.ango cvsps cbmfs ledger beaver bsddb3 pptpd comgt x.obs abook gauche lxinput povray peg-e icecat toilet curtain gtypist hping3 clam wmdl splint fribid rope ssmtp grisbi crystal logpp ggobi ccrypt snes>x snack culmus libtirpc loemu herrie iripdb dosbox 8yro0 unhide tclvfs dtach varnish knock tracker kforth gbdfed tvtime netatop 8y,wt blake+ qmmp cgoban nexui kdesvn xrestop ifstatus xforms gtklife gmrun pwgen httrack prelink trrnt ip qlipper audiere ssdeep biew waon catdoc icecast uif+iso mirage epdfview tools meld subtle parcellite fusesmb gp+fasta alsa-tools pekwm viewnior mailman memuse hylafax= pydblite sloccount cdwrite uemacs hddtemp wxGT) adom .ulius qrencode usbmon openscap irssi!otr rss-guard psftools anacron mongodb nero-aac gem+tg gambas3 rsnapshot file-roller schedtool
    [Show full text]
  • Linux Input Method について
    Linux Input Method Frameworks and Engines Manabu Sumioka 2020 年 11 月 15 日 目次 1 ユーザーと入力メソッド (IM) 2 1.1 入力には,フレームワークとエンジンの 2 つが関っている .................... 4 1.2 Input method frameworks, フレームワーク ........................... 4 1.3 Input method engines, エンジン ................................. 4 2 Debian の input method farmeworks と engines 2020/09/15 5 2.1 IBus (Intelligent Input Bus) ................................... 5 2.2 Fcitx (Free Chinese Input Toy for X) .............................. 5 2.3 uim (Universal Input Method) .................................. 5 2.4 anthy ................................................ 6 2.5 mozc ................................................ 6 2.6 kkc ................................................. 6 2.7 skk ................................................. 7 3 InputMethod 群 7 3.1 Input Method Frameworks .................................... 7 3.2 Input Method Engines for ibus ................................. 7 3.3 Gnome and ibus .......................................... 8 3.4 SCIM - Smart Common Input Method ............................. 8 3.5 インストールした IME を動作させる方法 ............................. 8 3.6 Gnome と non-ibus ........................................ 8 3.7 im-config .............................................. 9 付録 A ユーザー群 9 A.1 LMDE 4 (debbie) の例 ...................................... 9 付録 B システム情報 10 B.1 現在利用中のシステム情報 (System Information) ........................ 10 B.2 センサー .............................................. 10 1 B.3 CPU 情報 ............................................. 11 B.4 ハードウェア情報
    [Show full text]
  • Climbing Mont Blanc and Scalability
    Climbing Mont Blanc and Scalability Christian Chavez Master of Science in Computer Science Submission date: July 2016 Supervisor: Lasse Natvig, IDI Norwegian University of Science and Technology Department of Computer and Information Science Problem Statement Climbing Mont Blanc and Scalability Climbing Mont Blanc (CMB) is a system for evaluation of programs executed on modern heterogeneous multi-cores such as the Exynos Octa chips used in, e.g., Samsung Galaxy S5 and S6 mobile phones, see https://www.ntnu.edu/idi/card/cmb. CMB evaluates both performance and energy efficiency and provides the possibility of performance rank- ing lists and online competitions. A first version of the system is available and under trial use. This master thesis project is focused on improving the system with increased scalability so that the system can handle more user submissions per hour. The project involves the following subtasks: 1. Study the existing solution in CMB for automatic system monitoring and recovery and suggest improvements. 2. Describe and implement a dispatcher in the current CMB system that will allow the use of multiple XU3 backends to serve concurrent user submissions. 3. Test the dispatcher with two or three XU3 boards. Implement a simple script for generating a synthetic load (simulating users and submission) to be able to evaluate the scalability of a new CMB variant using the developed dispatcher. 4. Describe how the dispatcher can be used to allow different boards than the XU3 to be used together with XU3 boards. Discuss what effects this will have on other parts of the system. If time permits: 5.
    [Show full text]
  • Home Automation System a Cheap and Open-Source Alternative to Control Household Appliances
    Home Automation System A cheap and open-source alternative to control household appliances Bassam Ruwaida, [email protected], 076-2262492 Toni Minkkinen, [email protected], 076-2491015 1 Abstract This project revolves around creating a home automation system prototype with the main focus being the ability to lock/unlock a door through the internet. The system consists of a central device, a server and an Android application. The central device is a microprocessor, in this case, a Raspberry Pi that connects to the Internet and receives an order to control a motor which in turn turns the lock with the help of gears. The ability to rotate the motor in both directions is achieved by the use of an H-bridge. The server manages users and devices, and handles the communication between the application and the central device. Users and devices are stored in a database on the server. The application is a frontend which presents the user with a list of devices to interact with. The main prototype where the Raspberry Pi acted as a central device was abandoned due to time and resource constraints. It was instead used to control the motor directly. This brought up some problems concerning powering the device using batteries. The software of the prototype is mostly working but due to the same time limitations not all planned features could be implemented. Keywords: Home Automation System, Raspberry Pi, Android, Door lock, Wireless Communication. 2 Table of contents Contents Abstract.....................................................................................................................................
    [Show full text]
  • Debian-Reference.En.Pdf
    Debian Reference i Debian Reference Osamu Aoki Debian Reference ii Copyright © 2013-2021 Osamu Aoki This Debian Reference (version 2.85) (2021-09-17 09:11:56 UTC) is intended to provide a broad overview of the Debian system as a post-installation user’s guide. It covers many aspects of system administration through shell-command examples for non- developers. Debian Reference iii COLLABORATORS TITLE : Debian Reference ACTION NAME DATE SIGNATURE WRITTEN BY Osamu Aoki September 17, 2021 REVISION HISTORY NUMBER DATE DESCRIPTION NAME Debian Reference iv Contents 1 GNU/Linux tutorials 1 1.1 Console basics .................................................... 1 1.1.1 The shell prompt ............................................... 1 1.1.2 The shell prompt under GUI ......................................... 2 1.1.3 The root account ............................................... 2 1.1.4 The root shell prompt ............................................. 3 1.1.5 GUI system administration tools ....................................... 3 1.1.6 Virtual consoles ................................................ 3 1.1.7 How to leave the command prompt ..................................... 3 1.1.8 How to shutdown the system ......................................... 4 1.1.9 Recovering a sane console .......................................... 4 1.1.10 Additional package suggestions for the newbie ............................... 4 1.1.11 An extra user account ............................................. 5 1.1.12 sudo configuration .............................................
    [Show full text]
  • Download Unicode for Windows 10 Unicode Fonts for Indian Languages
    download unicode for windows 10 Unicode Fonts for Indian Languages. We have created a collection of FREE Unicode fonts that are available on the Internet. Script - Languages Font Names Download Link Devanagari - Hindi, Marathi, Sanskrit, Konkani, Nepali Chandas Gargi Kalimati Lohit Devanagari Lohit Konkani Lohit Kashmiri Lohit Maithili Lohit Marathi Lohit Nepali Lohit Sindhi Nakula Samanata Sarai Samyak Devanagari Download Unicode Fonts for Devanagari Script Bengali, Assamese Jamrul Likhan Lohit Assamese Lohit Bengali Mitra Mono Mukti Download Unicode Fonts for Bengali, Assamese Gujarati Aakar Lohit Gujarati Padmaa Rekha Samyak Gujarati Download Unicode Fonts for Gujarati Kannada Kedage Lohit Kannada Mallige Download Unicode Fonts for Kannada Malayalam AnjaliOldLipi Dyuthi Lohit Malayalam Meera Rachana RaghuMalayalam Samyak Malayalam Suruma Download Unicode Fonts for Malayalam Oriya Lohit Oriya Samyak Oriya Utkal Download Unicode Fonts for Oriya Punjabi Lohit Punjabi Saab Download Unicode Fonts for Punjabi Tamil Lohit Tamil Samyak Tamil Download Unicode Fonts for Tamil Telugu Lohit Telugu Pothana2000 Vemana2000 Download Unicode Fonts for Telugu Urdu Urdu Naskh Asiatype Fajer Noori Nastalique Jameel Noori Nastaleeq Pak Nastaleeq Download Unicode Fonts for Urdu. What is Lipikaar? Lipikaar is a simple and intuitive typing tool for all Indian languages. We currently have products for Windows and Android based devices. Unicode and Character Sets. Microsoft Windows provides support for the many different written languages of the international marketplace through Unicode and traditional character sets. Unicode is a worldwide character encoding standard that provides a unique number to represent each character used in modern computing, including technical symbols and special characters used in publishing. Unicode is required by modern standards, such as XML and ECMAScript (JavaScript), and is the official mechanism for implementing ISO/IEC 10646.
    [Show full text]
  • Lista.Txt Thu Jan 01 10:19:02 2015 1 0Ad-Data 2Ping 2Vcard 389
    lista.txt Thu Jan 01 10:19:02 2015 1 0ad-data 2ping 2vcard 389-console 3dchess 3depict 4digits 4g8 4store 6tunnel 7kaa-data 8086tiny 8086tiny-dev 9base 9menu 9wm a2jmidid a2ps a56 a7xpg a7xpg-data aa3d aajm aaphoto abacas abby abcde abcm2ps abcmidi abcmidi-yaps abe abe-data abgate abi-compliance-checker abicheck abinit abinit-doc abiword abiword-common abiword-dbg abiword-plugin-grammar abiword-plugin-mathview abntex abook abootimg abr2gbr abraca abs-guide abtransfers abuse abuse-lib abuse-sfx accerciser accessodf accountsservice acct ace-gperf ace-netsvcs ace-of-penguins acedb-other acedb-other-belvu acedb-other-dotter aces3 acetoneiso acfax lista.txt Thu Jan 01 10:19:02 2015 2 acgvision-agent acheck acheck-rules acheck-rules-fr achilles ack ack-grep acl acl2 acl2-books acl2-books-certs acl2-books-source acl2-doc acl2-emacs acl2-infix acl2-infix-source acl2-source aclock.app acm aconnectgui acorn-fdisk acoustid-fingerprinter acpi-support acpi-support-base acpid acpitool acpitool-dbg actionaz activemq activity-log-manager activiz.net-doc activiz.net-examples ada-reference-manual-2005 ada-reference-manual-2012 adabrowse adacgi1 adacontrol adanaxisgpl adanaxisgpl-data addresses-goodies-for-gnustep addresses.framework addressmanager.app addressview.framework adduser adept adjtimex adlint admesh adminer adns-tools adonthell-data adplay adplug-utils adun.app advancecomp advene advi advi-examples adzapper aegis aegis-doc aegis-tk aegis-web aegisub aegisub-l10n lista.txt Thu Jan 01 10:19:02 2015 3 aeolus aephea aes2501-wy aesfix aeskeyfind aeskulap
    [Show full text]