 |
Let your imagination fly,
and we will build for you.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Pyramid Software Software is an authorized dealer for Romania of Matrix Software Protection ]
System made by
TDI GmbH – Switzerland. The text, images and data are copyright of
TDI GmbH – Switzerland.
Matrix is a reliable safety system for the protection of your software from unauthorised reproduction.
Matrix was developed for the printer interface and the USB interface of the PC. The Matrix
modules of the ML and the MK series for the printer interface are simply plugged into the
LPT interface, where they function perfectly without causing problems for the peripherals
(printer, scanner etc.) connected downstream.
Functionally, the Matrix modules of the MLU and the MKU series for the USB interface are
identical with the modules for the LPT connection, and they also allow software protection
for laptops and PCs which have no parallel printer interface.
During development, particular attention was paid to transparent behaviour, a high degree of
security through the use of a RISC processor, easy connection to your software and high
reliability in practical use. The Matrix modules can also be stacked, meaning that several
modules can be connected to the LPT and/or USB interface at the same time. Even if several
modules are connected to the same interface, it is of course possible to address each module
individually.
Security
The Matrix modules of the LPT and the USB types are divided up into two model series each,
the ML series and the MK series. Both series offer the same features. However, for the
purposes of a higher degree of security against data manipulation, data can only be saved in
the Matrix modules of the MK series by means of a so-called MasterKey. The MasterKey module
is also plugged into the LPT port together with the Matrix module. This module is uniquely
manufactured once for each person who orders the MK series. This ensures that the data in
the module can only be altered by the person who has a valid MasterKey.
The Matrix modules are delivered with a customer code called UserCode. This customer code
cannot be altered, thus ensuring that each software manufacturer can only program his own
modules. The customer code is assigned once for the first order and remains unchanged for
subsequent orders.
The customer can read/write data from/into the dongle, only if the correct UserCode are
specified by calling any Dongle function (Read, Write, .....). If a Hacker tries to detect
the UserCode and call the dongle functions with some wrong UserCodes (e.g. between 1 and
nnnnn), the dongle will stop working. In this case the dongle is locked (Anti-Hacker Lock)
and it will not work anymore even if the functions are called with the right UserCode.
Only the software manufacturer can unlock the dongle with an special MasterKey-dongle.
The MasterKey module is included free of charge with the delivery of the first order to
customers of the MK series. Customers of the ML series can order at any time an MasterKey.
For all series, the communication with the PC is encoded. The data exchanged
between the PC and the dongle in both directions is encoded before transmission and
not decoded until evaluation. Decoding takes place on the PC side and on the dongle side.
The encoding algorithm changes constantly, so the information exchanged is worthless for
unauthorised computer hacks.
128-bit encryption and decryption of data
The modules from ML/MK-60 or MLU/MKU-60 onwards allow the internal encryption and
decryption of data via a 128-bit key which cannot be read from the dongle. This key can
be defined in whichever way the software manager wishes.You can use the encrypt and
decrypt function of the Matrix modules provide in order to encrypt/decrypt your program
data. Using a 128-bit TEA key which you define yourself and which cannot be read from the
dongle, you can decrypt through the Matrix module the encrypted program data while the
program is running and convert them back into meaningful values. A pirate copy without a
dongle would thus be useless.
The Matrix DLLs included with the delivery are at your service for integration into your
software. The DLLs included with the delivery ensure easy integration in any programming
language whatsoever.
Management of network licences
In the protection of software in a network, it is possible to define a certain
number of licences which can be used simultaneously by the user. This function,
known as License Management, can be realised in two different ways:
1. Use of one Matrix module at each workplace
2. Use of one Matrix module for the entire network
Version 1) with one dongle each per workplace is no different to the protection methods of
a program for a single workplace as a locally connected dongle is used. For this reason,
this method will not be described in more detail here.
However, version 2) with one dongle for the entire network is based on a slightly
different concept than the solution for one individual workplace. This method,
known as MxNet, allows you to use, in a network, one dongle which can be connected
to any desired workplace. The management of the licences is carried out via a
so-called server file which is generated by the MxNET server program. All clients
present in the network can access the server file like they can a dongle via the
matrix API.
The network protection via MxNET does not use network protocols and can thus be
used in any desired network system. The server program MxNet which generates the
server file runs on the MxNet server (the PC with connected dongle). This file
is updated at certain defined intervals and is stored in encoded form. The
encoding algorithm changes each time the file is updated and thus provides
maximum protection against unauthorised manipulation.
Updates of your customer's dongles via »Remote-Update«
»Matrix Remote Update« allows you to update the memory contents of your
customer's dongles without the customer having to return the Matrix-Dongle to you.
This is useful if, for example, additional modules within your protected software
need to be activated.
The Remote-Update tool allows you to create an encrypted EXE file. This small
update program is then sent to the customer (for example via Email) who then runs
it. The customer need not be online to do this. The update program is able to
change also MK/MKU dongles, which are alterable otherwise only with a MasterKey
dongle.
This method is an efficient alternative to online updates, which are more
complicated to implement and are often not accepted by customers.
|
|
|
|
|
|
|
|
|
|
|