Unikey Manual
Total Page:16
File Type:pdf, Size:1020Kb
UniKey Manual Version 7.20 IOLOCK The data and information contained in this document cannot be altered without the express written permission of IoLock. No part of this document can be reproduced or transmitted for any purpose whatsoever, either by electronic or mechanical means. The general terms of trade of IoLock apply. Diverging agreements must be made in writing. Copyright © SecuTech Solution Inc. All rights reserved. WINDOWS is a registered trademark of Microsoft Corporation. The WINDOWS-logo is a registered trademark (TM) of Microsoft Corporation. Software License The software and the enclosed documentation are copyright-protected. By installing the software, you agree to the conditions of the licensing agreement. Licensing Agreement IoLock gives the buyer the simple, exclusive and non-transferable licensing right to use the software on one individual computer or networked computer system (LAN). Copying and any other form of reproduction of the software in full or in part as well as mixing and linking it with others is prohibited. The buyer is authorized to make one single copy of the software as backup. IoLock reserves the right to change or improve the software without notice or to replace it with a new development. IoLock is not obliged to inform the buyer of changes, improvements or new developments or to make these available to him. A legally binding promise of certain qualities is not given. IoLock is not responsible for damage unless it is the result of deliberate action or negligence on the part of IoLock or its aids and assistants. IoLock accepts no responsibility of any kind for indirect, accompanying or subsequent damage. - 1 - Contact Information HTTP www.iolock.com E-Mail [email protected] Please Email any comments, suggestions or questions regarding this document or our products to us at: [email protected] Version Date 1.0 2006.1 1.1 2006.8 1.2 2006.10 1.3 2006.12 2.0 2007.2 2.1 2007.4 2.2 2007.8 3.0 2008.5 4.0 2008.8 5.0 2009.3 6.0 2010.4 7.0 2010.6 7.1 2010.9 7.2 2010.10 - 2 - CE Attestation of Conformity UniKey is in conformity with the protection requirements of CE Directives 89/336/EEC Amending Directive 92/31/EEC. UniKey satisfies the limits and verifying methods: EN55022/CISPR 22 Class B, EN55024: 1998. FCC Standard This device is in conformance with Part 15 of the FCC Rules and Regulation for Information Technology Equipment. Operation of this product is subject to the following two conditions: (1) this device may not cause harmful interference, and (2) this device must accept any interference received, including interference that may cause undesired operation. USB The equipment of UniKey is USB based. Conformity to ISO 9001:2000 The Quality System of SecuTech Solution Inc., including its implementation, meets the requirements of the standard ISO 9001:2000 ROHS All UniKey products are environmental friendly with ROHS certificates. List of Tables ABOUT THIS GUIDE ............................................................................. - 9 - - 3 - CHAPTER 1 INTRODUCTION ............................................................... - 10 - UNIKEY SOFTWARE PROTECTION DEVELOPER'S KIT .............................................. - 10 - 1.2 UNIKEY OVERVIEW .................................................................................. - 11 - 1.3 A GLANCE AT UNIKEY SDK ....................................................................... - 12 - 1.4 UNIKEY MODELS ..................................................................................... - 17 - 1.5 UNIKEY ADVANTAGES ............................................................................... - 19 - 1.6. TECHNICAL SUPPORT ............................................................................... - 20 - CHAPTER 2 KEY CONCEPTS IN UNIKEY ................................................ - 21 - 2.1 YOUR UNIQUE UNIKEY DONGLE ................................................................. - 21 - 2.2 WHAT MAKES THE UNIKEY SYSTEM UNIQUE?............................................... - 22 - 2.21 Protect .............................................................................................. - 22 - 2.3 HOW DOES UNIKEY PROTECTION WORK? .................................................... - 22 - 2.31 Applications linked to UniKey Hardware .......................................... - 22 - 2.32 Using the Computing Engine ............................................................ - 23 - 2.33 Checking the UniKey ID Number ...................................................... - 23 - 2.4 UNIKEY PROTECTION METHODS ................................................................. - 23 - 2.41 UniKey Enveloper .............................................................................. - 23 - 2.42 UniKey Application Programming Interface (API) ............................ - 24 - 2.5 WHICH METHOD TO USE? ........................................................................ - 25 - 2.6 LICENSING MODELS ................................................................................. - 25 - 2. 7 HOW DOES UNIKEY LICENSING WORK? ....................................................... - 26 - 2.8 REMOTE UPDATE SYSTEM ......................................................................... - 27 - CHAPTER 3 UNIKEY MODELS .............................................................. - 28 - 3.1 A COMPARISON BETWEEN DIFFERENT UNIKEY MODELS .................................. - 28 - 3.2 HOW TO CHOOSE A UNIKEY PRODUCT? ........................................................ - 30 - 3.3 UNIKEY ARCHITECTURE ............................................................................ - 31 - 3.4 REAL TIME FUNCTION .............................................................................. - 38 - 3.41 What Is the Real Time Clock like? .................................................... - 38 - 3.42 How does the Real Time Function Work? ........................................ - 38 - 3.43 How to Apply UniKey Time Function? .............................................. - 39 - 3.5 NETWORK FUNCTION ............................................................................... - 42 - 3.51 Components for the UniKey Network Function ................................ - 43 - 3.52 Max Number of Concurrent Clients .................................................. - 45 - 3.53 NetUniKey Configuration File ........................................................... - 46 - 3.54 Network Server ................................................................................. - 51 - 3.55 Network Client .................................................................................. - 55 - 3.56 Quick Setup ...................................................................................... - 55 - 3.6 UNIKEY DRIVE ........................................................................................ - 56 - 3.61 What is UniKey Drive like? ................................................................ - 56 - 3.62 How to operate UniKey Drive? ......................................................... - 58 - - 4 - 3.63 UniKey Drive Console ........................................................................ - 60 - CHAPTER 4 UNIKEY CONSOLE ............................................................ - 73 - 4.1 EDITING A UNIKEY ................................................................................... - 74 - 4.2 TESTING A UNIKEY ................................................................................... - 84 - 4.3 DATABASE .............................................................................................. - 88 - 4.4 REMOTE UPDATER ................................................................................... - 90 - 4.5 NETWORK FUNCTION ............................................................................... - 94 - CHAPTER 5 SETTING UP UNIKEY ........................................................ - 99 - 5.1 INSTALLATION OF UNIKEY HARDWARE AND SOFTWARE ................................... - 99 - 5.2 GENERAL PROCESS OF THE UNIKEY SOFTWARE PROTECTION .......................... - 100 - 5.21 Enveloper ........................................................................................- 100 - CHAPTER 6 PROTECTION SOFTWARE ............................................... - 103 - 6.1 OVERVIEW OF UNIKEY PROTECTION .......................................................... - 103 - 6.2 WHAT MAKES UNIKEY PROTECTION POSSIBLE ............................................ - 103 - 6.3 UNIKEY PROTECTION METHODS ............................................................... - 104 - 6.4 WHAT CAN BE PROTECTED? .................................................................... - 104 - CHAPTER 7 UNIKEY API PROTECTION ............................................... - 105 - 7.1 AN OVERVIEW OF THE UNIKEY API ........................................................... - 105 - 7.2 API PROTOTYPE .................................................................................... - 106 - CHAPTER 8 UNIKEY ENVELOPE PROTECTION .................................... - 107 - 8.1 FUNCTIONALITY ..................................................................................... - 107 - 8.2 ADVANTAGES ........................................................................................ - 107 - 8.3 UNIKEY ENVELOPE PROTECTION PROCEDURE ............................................... - 108 - 8.4 IMPLEMENTING FUNCTIONS OF THE UNIKEY ENVELOPER ............................... - 110 - CHAPTER 9 PROTECTION STRATEGIES..............................................