Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
laboratory.doc
Скачиваний:
6
Добавлен:
01.07.2025
Размер:
5.68 Mб
Скачать

2. Brief theoretical information

Information for the developer.

Ordering keys from Aladdin, you get the keys that contain information specific to your company. This information is used to differentiate your keys from other key developers.

Vendor Code Vendor Code - a unique code assigned by each developer Aladdin software. Developer code "sewn up" in an ASIC chip in the manufacture of the key and not amenable to change, thus providing full protection against counterfeiting.

You need to know your developer code when ordering additional HASP keys. Code is a combination of 5 - 7 numbers and letters printed on the label of each key. Passwords

HASP passwords represent a two integers assigned to each developer. Passwords are uniquely associated with developer code. Keep them in a safe place, as they are necessary for you to access the key, protect your software and use tools included in the kit.

Control of the availability of key

By protecting the application, you are constantly in control of the presence of the key. HASP system implements this control by means of encryption and decryption of data by key. Decryption key data for recognition.

Recognition of the presence of HASP key is based on the use of encryption and decryption functions, which entails the need for some action. To start, you need to already have some data that you have previously encrypted. Then you send the data on the key using function DecodeData. There decrypting them, causing You can check whether the decrypted data is correct. If so, you can draw a conclusion about the presence of the key. The decrypted data may be verified by a simple comparison and safer way - using the data in your protected application. The encrypted data is sent to the function key and the unique data assigned to the developer, "Developer code". Consequently, when encrypting the same string different result will be obtained for two different developers.

HASP Memory

All the HASP keys, except HASP4 without memory are rewritable memory. Using the HASP memory, you can do the following: controlling access to various software modules and software packages. Assign each user a unique number of your programs. Donating Program for rent and distribute a demo version with a limited number of starts. Keep key passwords

3. The order of execution of work

Program description

Da Vinci Code program has been written for educational purposes. The program was used encryption and decryption functions file HASP keys means.

It can only operate under Windows-systems. The program provides the following key features recognition, password authentication, encryption and decryption of files. Encryption and decryption are realized by reference to the respective roles of the key. To test the key to the file identifier is attached HASP key.

The program uses the library haspms32.dll functions. Dll module interaction with the main program comes with Using Windows Messaging.

Руководство пользователя:

Окно программы Da Vinci Code:

User guide:

The program window Da Vinci Code:

Figure 1 - Operating key authorization window. For authorization key, you must enter passwords. If the passwords do not match will be shown the error window.

Figure 2 - box authentication error. In the case of the absence of key program will display the following window.

Figure 3 - The lack of a key error window.

After entering the correct password, the main window will be displayed.

Figure 4 - The main window of the program. Encryption.

  • Encryption - encrypts files in this tab; o Encrypt - process happens when you press this button, encryption.

  • Source file - in this field, we specify the file that we want to encrypt;

  • Encrypted file - This field specifies the path and name of the encrypted file;

Figure 5 - Window encryption result.

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]