Home
SW Protection Studio Description - e-CODE
Contents
1. The following figure illustrates the Activation Code Generation nn Di e Code Sealing Information License a e Title Protection Management Operations A N SI gu 1 aa Gi Em 9 ame n h SEL Generate Prepare CD Generate Register Activate Generate Generate DAT Files Image Activation Code Profile Title Serial Activation Code Safe CD CDR Safe Activation CD Phone Activation User Machine ID 2G6LOSUH HMAS69TI HP TSP9G YEBAOMHP Activation Code UGESYTYN TKEBXI9BI 7GWAKEYY W6LAGESE Safe Activation with Offline Activation In this model the vendor will be able to activate the software even though the Safe Activation authentication has failed due to any reason The protection technique process is done by the following steps 1 Vendor starts protecting the application and data 2 Vendor issues a license with Safe Activation protection type and with Enable Phone Activation 3 Vendor Activate the Title Generate Serials and distribute the software If one of the users application failed to activate Vendor gets the System Code from the user in the Error Message Serial and user Info Vendor enters the User Info Serial and System Code in the System Code field from Generate Activation Code 3 Vendor clicks on Generate and Send the resulting Unique Activation Code to the user The generated Activation Code will be unique and represents the user All the user info will be sent to activatio
2. Note Converting from Trial License to Final license can be easily established and will be mentioned later e Code Sealing Information Rental License In this model the vendor will protect the software and data using a license that can be used for renting the software meanwhile providing flexible License Renewal model E Code Protection Studio v5 3 4 provides different conditions in order to meet these criteria This model is suitable for 1 Distributing license with Expiration Date 2 Distributing license with Expiration Running Time Effective time in Minutes Hours 3 Distributing license with Expiration Period Number of Days Months Expiration Running Time is the duration which the Software actually runs For Example a vendor can issue a license that can run effectively for 5 minutes This model is available with the following protection techniques 1 Safe Key 2 Safe Activation The following license has the following properties that can be very useful as a Rental License 1 Issued for Safe Key protection Expires on 30 04 2010 Or 3 Expires after 30 Days of its first run Or 4 Expires after 10 minutes of effective running General License Label Swe F2 PO License Key RENTAL License Sequence Number Protection Type Safe Key k Enabled Activation By TU Runon First Computer Only _ Enable SDK APIs Authentication Type On each startup Ww Multiuser License Server Modules Module N Module T Modul
3. 1 Driver less USB device USB HID device 2 Based on PKI Standard 3 Offered in two models Safe Key STD and Safe Key PRO 4 Flexible License Management and Multi User control 5 Flexible SDK API interface and features management Process Safe Key Production process is straight forward and easy The following are the steps required for performing Safe Key Protection Create Title Generate Certificate for User Burn Certificate on Safe Key Issue License with Safe Key protection type for the Burned Safe Key NS ud m Protect EXE Encrypt Data if required Safe Key provides flexible license options Vendor can select Multi User option Server or Client for generating a Network license that controls limited or un limited number of users working on this license Vendor can also prepare the tokens for the protection so that it can be used only with his own protection titles e Code Sealing Information a ba E E ke as E nar vn d SS l Generate Prepare CD Generate Register Activate Generate Generate DAT Files Image Activation Code Profile Title Serial Activation Code Safe CD CDR Safe Activation Token Initialization Select Token SoftLockSmartToken Database Private Certificates SoftLockCertificate L Safe Activation Protection Safe Activation protection is the new version of E Code Online Activation protection Safe Activation is offered in a new way to meet most vendors
4. Activation Web Server provides all the administration privilege for the vendor to control all the E e 123 123 Burn Generate Prepare CD Generate Register Activate Generate Generate DAT Files Images Activation Code Profile Title Serial Activation Code Safe Key Safe CD CDR Safe Activation activated users and machines on the web server License EE DataBase Licenses ee NET Licenses oe Public no certificate Number of Serials g CD Licenses EFH Token Licenses Generated Serials List EE Shell Licenses e Code Sealing Information 2 Softlock Activation Server Serials Windows Internet Explorer K hitp flocalhost SLPSActivationServer Serials aspx Title TD AwAAOAAAAAADAAAA Fie Edt View Favorites Tools Help W B softlock Activation Server Serials ee Serials of Simula Third Test A0000003 0 3 General P Logout Used Serials Account Information Titles Serial Remaining Machines Administration RGIGOINSMVXV3TBOSIQANLVN 0 Profiles _ Unused Serials Serial Remaining Machines K32GVFISVXHVINFSVSQTNLVN 1 7UQZTM2783FNVRBMSERANLVN 1 AX2XM4271QCM41UIOERTNLVN 1 LKLZSA3SHOSGWYVISLITANLVN 1 ONKHUYVCY83YCTZMGIETTINLVN 1 MEPUWBKVIVOY8M3H3WUANLVN 1 SSEQSUFCKXQZ65ZQLWUTNLVN 1 HOEVLVYSEMO4ZGM739VANLVN 1 NHUWXE2XBZCK3APREWVINLVN 1 Software Protection Models Safe Shell Safe Shell is the protection model for protecting the Exes without binding the
5. CD Protection Techniques CD STD and PRO e Code Sealing Information Safe Key Windows 2K XP 2003 Vista 7 2008 and Linux Onboard Cryptography RSA 1024 Signature 3DES and AES Operating Temperature 25 to 85 C Range 10000 write cycle and 10 years data retention Safe Activation Supported Operating System Windows 2K XP 2003 Vista 7 2008 and Linux Activation Server Vendor Admin Web page providing the vendor with full control of machine Interface activation and serials control Internet Secure RSA 1024 3DES and AES Communication Server Hosting On E Code server or Vendor proprietary Server e Code Sealing Information I ABOUT E CODE E Code is a leading progressive innovative company in the field of information security providing technology state of the art solutions consulting integration and testing services to safeguard the information assets identities and the supporting infrastructure against unauthorized use Our high quality service and excellent benefits and the ability of being reliable and responsible put us as a leader on the top of digital security companies E Code provides unique products and solutions which cover many security areas fulfilling customers need in different market sectors We provide a set of products and solutions covering the following areas software protection data encryption security hardware digital signature secure identification and authenticat
6. 128 AE E4 9D 08 92 43 2A F0 CD D6 6F 2A 91 33 DC EEOC ni0nni The following figure illustrates the system of the Network Portable license model When the client license is running within the network the Network license will dominate While when the Client License is departed from the network it acts as a Portable license giving the ability for the user to run the software e Code Sealing Information License Internet Client License Internet Network License Organization Network License Server Note This model can be applied to Safe Key protection with the difference that the License Server will be activated by a Safe Key and the User will run the portable license depending on another Safe Key owned by him This model can be Protection technique independent as the Network License can be Safe Activation while Client License can be Safe Key When Portable e Code Sealing Information License Update E Code Protection Studio v5 3 4 provides a flexible license update model that fits different protection techniques Safe Key License Update In this model the vendor will update the License issued for a user running Software protected by Safe Key The update process is done by the following steps Open the old License and Update the Rights and Conditions required for Update Issue the New License for the Certificate burned on the Safe Key with the Tar
7. Code Protection process can be divided into three major stages Protection Software Protection of executable and data files Licensing License editing and issuing 3 Authentication Authentication mechanism preparation Applications Management Data Files N Executable E Files La Scitlock Dongle Machine Authentication Ud via Activation Server TK el Protected CD es Modules Control via SDK Multi user License D d H via Network Service Se lob Protected DVD 22 e Code Sealing Information Software Protection Layers The following figure describes the different protection layers provided by E Code Protection Studio License Management Layer DRM SDK Layer APIs SHELL Protection Layer Cryptographic Layer PKI RSA AES 3DES SHA1 Hardware Layer Safe CD CDR Safe Key Safe Activation License Management Layer License Management Layer is responsible for controlling the software DRM and distribution process E Code Enterprise Software Protection uses a license model based on XrML standard The license is characterized by its readability and high security depending on PKI standards The following screenshots are taken from E Code Protection Studio v5 3 4 illustrating the different rights and conditions available in any license Module Information Rights Conditions Executables Eet Expiration Date
8. add the required source code in the development environment ex C CH VB which uses the E Code Protection Solution SDK SLPSSDK dll to take full control over the software features using the modules stored in the license The following figure illustrates sample of different APIs provided by SLPSSDK dll nn B e Code Sealing Information The following figure illustrates the license options for a SDK Enabled License Ei License Safe Activation Periodical SDK Title Softlock Protection Studio ve Y SH y e Title Protection Management Operations B es a amp New Delete Import Export Issue Add Remove General Modules S DataBase Licenses S E NET Licenses gt Public no certificate Default Safe Activation P License Label Safe Activation Periodical SDK License License Sequence Number 0 CD Licenses Token Licenses Protection Type Safe Activation v C Enabled Activation By Phone Run on First Computer Only Enable SDK APIs E Shell Licenses Authentication Type Periodical check 20 Minutes v C Multiuser License Server General Modules Module Information d Rights Conditions Default Module MODULE Executables MODULE Execute C Expiration Date 5 16 2010 Module Name Module Type MODULE BIRKE Manager MODULE WE Expiration Running time c ae Edit C Expiration Period Read
9. gt lt ProtectionID gt 0000000 10000000400000001 lt ProtectionID gt lt ProtectionTechnique gt TOKEN lt ProtectionT echnique gt lt ProtectionKey gt XsFes QgTYsiy6c cbhOng8RqVGIpFFI9Cs iQNTOZTXZF 1NM4LuJ1WAOIYPYTdD SROdNEJrhNID SWxXy 1f1 abi3HOXjhuxBCbY 556 XfytiwAuxJQyOORwdyKVparul YuCGG pSLP9XL4IGRd3Ei ss1VC2MPpNVTQTISy4e9hSSY OeESyRiY ZBQBA2fpCH 7GqBvr3 1UghITRQ IftS6kuDIDSF qgleMUciLUH960 7HSPtHgVSNdy Lez OVeTi 288 LChxOilSvKnr7 jAzUrc1lAbB yEkrxXQjsr7 AtX5127KOFeU NMcYI2qm6mo 6IQ6W 1RBhQ73ad530y3Luw lt Protectionkey gt lt ProtectionEquations gt lt PeriodicalCheckStatus gt PERIODICALLY lt PeriodicalCheckStatus gt lt PeriodicalCheckPeriod gt 10 lt PeriodicalCheckPerod gt lt SDKEnabled gt lt ServerLicense gt lt EncryptionTechnique gt AES lt EncryptionTechnique gt lt CreationDate gt 23 3 2010 lt CreationDate gt lt CodeLength gt 8 lt CodeLength gt lt other gt Si The license is characterized by being secure against alteration and modification as it is based on PKI and Digital Signature techniques to secure the integrity of the license e Code Sealing Information Executable Protection E Code Protection Studio v5 3 4 provides strong Executable PE files protection against reverse engineering and software cracking This protection is called Safe Shell The executable protection can be used as a standalone protection or can be combined with Hardware Protection Technique Mainly Exe pro
10. protection to any hardware device This kind of protection is useful for 1 Protecting Intellectual Property 2 Protecting Data 3 Protection with low price as it doesn t depend on any hardware device Though it doesn t support any license distribution control and operate on a license with limited options Safe Shell can be established with the following steps 1 Create Title 2 Issue License with protection type Safe Shell 3 Protect Exe 4 Encrypt Data if required After distributing the software The Software can run on any machine without any hardware authentication and activation As shown in the following figure no conditions or advanced license attributes are enabled in Safe Shell e Code Sealing Information General License Label Title License SHELL License Sequence Number Protection Type Safe Shell w Enabled Activation By Authentication Type Multiuser License Se Yer Phone Dun op First Computer Only Enable SDK APIs e Modules Module M Module T Module Information ae a po Rights ae Le Conditions Default Module MODULE Evecutables Execuke Expiration Date z Data Edit Read Write Print Max no of users Copy Wax no oF sessions Expiration Running time Expiration Period Max no of trials Safe Key with Single License and Single Key In this model the vendor will distribute each Safe Key with a unique single license
11. requirements Safe Activation offers a strong protection that is considered hard to crack Technology Safe Activation protection technology is based over Online Internet Activation using web server This protection depends on strong PKI standards that provide the maximum required protection Safe Activation protection provides user identification using Machine Identification that uniquely identifies the user machine along with Unique Serials Characteristics Safe Activation is characterized by 1 Internet Online Activation and Administration control using Web Server 2 Unique Serials with multiple options Multiple Machines Per Serial 3 Flexible License Management and Multi User control 4 Flexible SDK API interface and features management Process Safe Activation Production process is straight forward and easy The following are the steps required for performing Safe Activation Protection Create Title Issue License with Safe Activation protection type Public or Private license Protect EXE Encrypt Data if required ST DIY Ze Register Profile nn B e Code Sealing Information 5 Activate Title 6 Generate Serials with desired options Safe Activation provides flexible license options Vendor can select Multi User option Server or Client for generating a Network license that controls limited or un limited number of users working on this license Vendor can host the Activation server on E Code server or on premise
12. 2 23 2010 v Data _ Expiration Running time o Minutes _ Edit Expiration Period o Days a Max no of trials on V Print Max no of sessions Copy C Max no of users e Code Sealing Information General License Label Token Title License9 running License Sequence Number Im Protection Type Token Dongle wi Enabled Activation By Phone Run on First Computer Only Enable SDK APIs Authentication Type Periodical check wi Network License Modules Tey SE Module Information GU SE Rights Conditions DeFault Module MODULE Execukables HR Module MODULE Execute _ Expiration Date 2 21 2010 Sales Module MODULE a Data VE wa H Management Module MODULE LJexpiration Running time o Minutes Edit Expiration Period ae a f CI Max no of trials T Write SDK Layer E Code Protection Solution provides a flexible SDK giving the software vendor to integrate the software with the Security system linking License Management System and Hardware protection devices with the written software source code The SDK provides various APIs that give full flexibility for the developers License Management Authentication Cryptographic SHELL Protection Layer Shell Protection layer is a layer responsible for protecting the intellectual property of the software vendor Shell protection simply encrypts all the source code and data in the software and modifies
13. Ce gis ua gl S Ei CHE Protection Studio ie e Code Sealing Information I CONTENTS He INTRODUCTION ss saccscssscesstusctnscensacwistnswavcdeveudsasencotucsentearsccnsmincwatentvedeucnineseabetastneaimssneneteadiuentuses 4 ERY eebe 4 COPYRIGHTS lege ET E 4 IlI E CODE PROTECTION STUDIO V5 3 4 ccuummmmmmmmmmmmmmmmensss ssssssesssssscesscessosscesscsscsscsscessosssosscesss 5 INTRODUCTION vu ssc 0ccccvcncccccccecnscecettti MMM sscassscsvssescnscscassecastecasanes 5 E CODE PROTECTIQMMMMIMMBFO PROCESS cccccecececcecscsceccececcceccrcessc SMM cesscscescecscscercecessescs 6 SOFTWARE PR MESDION LAYERS gf Nun MMMM scscereececscecersesee 7 ean waa _ _ e 8 ff ee 7 J ay 8 AP EE See 8 Ki dGolladlef Ee s we 8 AS EEE Oe 9 COS oe OE OA 9 IV FEATHRRESM ccscccsogMs EEN NERD osseo eooo e TEE 10 ESOTECTION STUDIO ACTRREMION aterm ED os WM ee 10 EROTECTION STUDIO EE SR MM cee a 10 VENDOR PROFILES Mona EE 11 MROTECTION TITLES JE 8 12 Kiral fat WEE 12 Data If HEEN WENN e e 12 Wate eee See t 12 OO U WEED sosesecscses fis susccouesescenssencuess 12 LOSNA DESCRUBIIION TT EEN EDD H 14 GENO Licer ffe buten EES EE S 14 fia UM WENDEN T A 16 E vtCUT EENG CT CC TO ggf un vu um ug nun EE 18 me een ee ll ee E 18 Customized MERON SOLULIONS cccccecsesvecscevesvecnennssveccc
14. DULE Execute Expiration Date MODULE Data Edit Read Write Print Wax no of users Copy Max no of sessions Manager MODULE The following figure illustrates the conditions applied to Manager Module 1 The Manager module is not enabled as it is not checked Note that Execute Right is disabled as well e Code Sealing Information General License Sequence Number o License Label Safe Activation Periodical SDK License Protection Type Safe Activation v _JEnabled Activation By Phone Run on First Computer Only Enable SDK APIs Authentication Type Periodical check v 20 Minutes we _ Multiuser License Ta SC Module Information odule Name odule lype Rights Conditions Default Module MODULE Executables HR MODULE _ Expiration Date ale MOD EI Manager MODULE Data _ Expiration Running time Edit _ Expiration Period Read write Print Max r Copy C Max no of trials The following figure illustrates SDK source code snippet written in C and checking on HR Module The following are the APIs used in this source code snippet SLPSOpenLicense SLPSAuthenticateUser SLPSActivate SLPSGetLicenseGrants SLPSQueryFeature ST ZEN unsigned int ERR iOpen the selected license ERR SLPSOpenLicense LicenseFileName NULL O licenseDlg m ProtectionID SWcertificatePiD licenseDlg m SWCertificatePWD GetLength m hlLic
15. F Macromedia Flash Player 7 File View Control Help Bac Softlock Smart Token e Code Sealing Information Safe Activation Sample Safe Activation sample provides a simple illustration for Internet Activation protection The authentication type available for Safe Activation samples are 1 Periodical Check Where all the grants are stored on the Activation Server 2 Phone Enabled Offline Safe Activation sample also provides a clear sample for Automatic Data Encryption Decryption The encrypted data includes 1 SLPS GIF Image appears in the sample 2 Database mdb MS Access data base where the protected sample performs Read Write operations Safe Activation also provides a clear example for Software Features Modules protection The protected modules using SDK are 1 Add module Adding new records to the database The limitation is on the number of records to be added 2 Delete module Deleting records from the database The limitation is on the number of records to be deleted 3 Edit module Editing records from the database The limitation is on the number of records to be edited lt grant gt lt KeyHolder licensePartIdRef User Public Key gt lt execute gt lt read gt lt write gt lt edit gt lt copy gt lt print gt lt ProtectedObject gt lt SWkey licensePartidRef SW Key gt lt ProtectedObpjectName gt Delete lt ProtectedObjectName gt lt ProtectedObject gt lt MaxNumberOf
16. In this way each user receives the Software package should receive the Safe Key for activation with the License file corresponding to this key This model is suitable for 1 Distributing software while taking control over each user 2 Taking into consideration future license updates per user The following steps describe how to use E Code Protection Studio v5 3 4 to perform the mentioned license model 1 Create Title 2 Generate X Certificates for X Users 3 Burn X Certificate on X Tokens Safe Keys as each user should have a unique Key 4 Issue X Licenses with the desired conditions with protection type Safe Key with License Certificate corresponding to each Safe Key i e to each User 5 Protect Exe Data if required This type of protection supports all license conditions and attributes The following figure illustrates the different license options for Safe Key licenses e Code Sealing Information General License Label Title License Key License Sequence Number Protection Type Safe key w Enabled Sctivation By Phone Run on First Computer Ony _ Enable SDK APIs Authentication Type On each startup se Multiuser License Server Modules Module Information v Module N Module T odule Mame odule Type Rights Conditions Default Module MODULE Executables Execute Expiration Date Data Edit Read write Print Max no of users Copy Max no of sessions Safe Key
17. Information IV FEATURES E Code Protection Studio v5 3 4 is composed of several modules combined together to provide the full software and data security Protection Studio Activation Protection Studio is activated by 1 Using Online Activation The Studio is activated here using Internet Activation and a Serial This technique requires internet connection existence during using the Protection Studio 2 Using Dongle Activation The Studio is activated here using Dongle activation This technique will require distributing the Protection Studio with a unique USB key used in operating the studio This technique is suitable for vendors who are using the studio in an environment that is not connected to internet After activating the Protection Studio any vendor can start running on the studio and can establish any kind of protection The Protection Studio is controlled via License issued by E Code this license will provide the specific rights and conditions that a vendor has during operating on the studio Protection Studio Settings Protection Studio settings is essential in operating on the Protection Studio Settings include 1 Default Paths Includes setting the paths of operating database executable backup and data backup Backup Database An option to back up the Operating Database Update Studio A step to update the studio to the latest version The Operating Database is very important as it includes all protection parameters
18. Reader of the file can read write to the file in a transparent method meanwhile the files cannot be illegally distributed without the License and combined hardware security Safe CD Protection Safe CD protection is very popular in the field of protecting Multimedia Games and small software The purpose of this protection technique is in its low price and wide distribution through mass nn e Code Sealing Information production E Code Protection Studio v5 3 4 offers two versions of CD protection which enables software vendors to choose the solution that best suits them CD STD This version of CD protection is new in E Code Protection Studio v5 3 4 TECHNOLOGY Safe CD STD depends on LS technology in protecting CDs LS technology changes the physical characteristics of the output CD according to certain parameters generated by E Code Protection Studio v5 3 4 Production of this CD protection depends on Machines that supports LS technology production using CD Stampers CHARACTERISTICS Safe CD STD is characterized by 1 Faster CD Authentication during run time 2 Various support for Old CD Drives PROCESS Safe CD STD production process is straight forward and easy The following are the steps required for performing CD STD protection Create Title Issue License with Safe CD CDR protection type Protect EXE Encrypt Data if required Generate DAT files according to remaining free size of the CD Create a new image fi
19. Studio v5 3 4 is a software tool that provides to software vendors advanced and various techniques to protect their software against Reverse Engineering Piracy and Illegal distribution E Code Protection Studio v5 3 4 provides All in One software protection tool The Protection Studio provides different protection techniques in a single tool Protection techniques vary to meet the software vendors needs Protection techniques include CD DVD Protection CDR Protection USB Dongle Protection Se HEN Online Activation Protection All techniques are combined with advanced software protection Shell Protection that protects the software source code and data In addition E Code Protection Studio v5 3 4 provides a flexible and advanced SDK for extending the software security to be within the hands of the developer E Code Protection Studio v5 3 4 introduces a new and advanced License Management System that meets different requirements to control the Condition and Rights for the sake of software security and distribution Copyrights and Trademarks All of the content on this manual and accompanying software including all text graphics sounds demos patches hints and other files is covered under KSA and international copyright and trademark laws by E Code and other companies and are property of E Code or are presented with permission and or under license This content may not be used for any commercial use without express written permissi
20. Write C Max no of trials Print Copy The following figure illustrates the conditions applied to HR Modules 1 Expires on 01 08 20101 e Code Sealing Information General License Label Safe Activation Periodical SDK License License Sequence Number Im Protection Type Safe Activation Enabled Activation By Phone Run on First Computer Only Enable SDK APIs Authentication Type Periodical check wi Multiuser License Server Modules Module M Module T Module Information TEEN vee Rights Conditions Default Module MODULE EE MODULE Execute Expiration Date D 1 2010 k Sales MODULE S i Manager MODULE Data Sa Expiration Running time Edit Expiration Period write L Max no of trials Print da no of users Copy da no of sessions The following figure illustrates the conditions applied to Sales Module 1 Expires after 1 month from its first try Or 2 If Number of trials reached 30 General License Label Safe Activation Periodical SDK License License Sequence Number In Protection Type Safe Activation Enabled Activation By Phone Run on First Computer Only Enable SDK APIs Authentication Type Periodical check w Multiuser License Server Modules Modue N Module T Module Information earen Rights Conditions Default Module MODULE Executables HR MO
21. after 60 number of trials General NN ooo License Label Siw F2 PO License Key FEATURES License Sequence Number Protection Type Safe Key w Enabled Activation By Phone TU Ipun on First Computer Only _ Enable SDK APIs Authentication Type On each startup k Multiuser License Server Modules Module Information Module Name Module Type Rights Conditions Default Module MODULE Executables Reporting Feature MODULE Execute Expiration Date 4 30 2010 Sa Accounting Feature MODULE ee Data v Expiration Running time Minutes Edit Expiration Period Days wi Dead write Max no of trials Prink Max no of users Copy Max no of sessions e Code Sealing Information Note The shown conditions apply to Reporting Feature Only while the Default Module contains the conditions applying to the whole Software This model requires SDK development Network License In this model the vendor will protect the software controlled by a license placed in a network server E Code Protection Studio v5 3 4 provides different conditions in order to meet these criteria This model is suitable for 1 Single license controlling Multiple Users 2 Controlling Number of Users using the Software 3 Reducing the Hardware Activation and Distribution Ex Single Key runs Multiple Users This model is available with the following protection techniques 1 Safe Key 2 Safe Activation The f
22. e Code Sealing Information the protected file structure in order to protect the vendor Intellectual Property Shell Protection doesn t modify the behavior of the software though it provides extra protection against software cracking and reverse engineering Disassemblers Disassemblers Apply Safe Shell Protected Software Protected Software Debuggers Debugqgers Decompilers Decompilers Cryptographic Layer E Code Software Protection Solution depends on strong cryptographic libraries and standards which adds extra strength to the system Protecting the software source code and data with strong and trusted symmetric encryption AES and 3DES gives strength against decrypting the software source code While depending on PKI certificates and RSA cryptography provides strength in combining the security with a hardware device E Code Protection Solution doesn t use a single key for decryption though it uses multiple distributed keys with multi wrapping mechanisms Hardware Layer E Code Protection Solution delivers the highest level of security by combining all the mentioned layers with a hardware layer The hardware layer provides different techniques for protecting the software against piracy and illegal distribution Binding the software protection with a hardware device adds extra strength to system and provides the ability to resist any reverse engineering and software cracking attacks e Code Sealing
23. e Information Sec e Rights Conditions Default Module MODULE Executables Execute Expiration Date 430 2010 Ww Data 3 cl Expiration Running time Minutes ae Edit Read write Print Max no oF users Copy Max no of sessions Expiration Period a Days vw C Max no of trials Note License Renewal for a Rental License can be established using License Update model and will be mentioned later nn e Code Sealing Information Features License In this model the vendor will protect the software while applying license control on Special Parts of the software E Code Protection Studio v5 3 4 provides different conditions in order to meet these criteria This model is suitable for 1 Distributing license with control on Different Modules 2 Distributing license with Rental Trial Final conditions for each module This model is available with the following protection techniques 1 Safe Key 2 Safe Activation The following license has the following properties that can be very useful as a Features License 1 Issued for Safe Key protection 2 Contains Two features Modules Reporting Feature and Accounting Feature 3 Accounting Feature is Disabled not Checked 4 Reporting Feature Expires on 30 04 2010 Or 5 Reporting Feature Expires after 30 Days of its first run of the feature Or 6 Reporting Feature Expires after 10 minutes of effective running Or 7 Reporting Feature Expires
24. ed under the current title Test Mode Title This mode enables the vendor to apply protection techniques in test mode only Test mode titles cannot be distributed to customers as it runs the protected EXE and Data files on the vendor machine only Final Mode Title This mode enables the vendor to apply protection techniques in its final mode It enables the vendor to distribute the software to customers as it won t be bound to vendor machine nn e Code Sealing Information Protection Title Information New Title General Information Protection ID A0000002 00000017 00000072E Creation Date Monday October 18 2010 Protection Profile Softlock Protection Label CRM Project Tel Application Type Software and Data Data Only Protection Mode Final Mode Test Software Certificate Advanced Settings cron Ted soratreteinae pa code erat Activation Server URL http www Softlock net SLPSActivationServer Process Certificate Password Auto generated Equations Other important properties of the title are 1 Encryption Technique The used Encryption algorithm is AES or 3DES 2 Code Length The used code length in the protection operations ex Machine Activation code This property is useful in Phone Activation option Will be mentioned later in details 3 Activation Server URL The Activation Server URL used in Safe Activation protection 4 Certificate Password This is Auto Generated password t
25. enseHandle if ERR Te SLPS OF return ERR ffRuthenticate the user ERR SLPSAuthenticateUser m hLicenseHandle TRUE if ERR Te SLPS OF return ERR ffhetivate the application ERR SLPSActivate m hhLicenseHandle if ERR Te SLPS OF return ERR Gert License Grants SSLPSGrantMap gqranta rray 240 unsigned int gqrant rrayCount 20 ERR SLPSGetLicenseGrants m hLicenseHandle grantdrray grantArrayCount Query feature Check if Exists and no condition violation occured unsigned int grantID oer grant number HR DWORD ERR sbLPSQueryFeature m hLicenseHandle grantiIp 1 if ERR Te SLPS OF return ERR Weare zm Eegen ose t L t W en e G oe J IATC AOT l ARNT RA RAYDT CC ROTECTION SAMPLES L A LJ A L q WI LJ i N KA ZA Vi i Bu C kA This section describes E Code Protection Samples for E Code Protection Studio v5 3 4 0 Safe CD CDR Sample Safe CD CDR sample provides a simple illustration for CD CDR protection The sample is available in 3 NRG files for 1 CDSTD 2 CDPRO CDR In order to try the sample the user should burn the NRG images to CD CDR and try the protection Please refer to user manual for detailed steps in preparing the protected CD CDR Safe CD CDR provides a clear example for CD CDR copy protection and data protection The sample displays number of Encrypted Macromedia Flash files swf which cannot be displayed without the protected flash application
26. eressecrecsesseseceggllllMMs vosvcsccscossesscseeseess 19 DATA FILES leidt a 0scscscscssssesscscscscscccscscscscscsccsscpgstiilll MMMM EE 20 Data Protection for R W RUE saree sees cccccccccccssscecssssssceesssssees 20 SAFE CD PROTECTION cccccccscercececees ENEE sc cccccccscscsccccesscscescececscscessesscsceseesessence 20 Ee 21 OD PO EE 22 SAFE CUR EECHER 23 Eeer 23 eege 1a Re 23 e Code Sealing Information POG OSS EE EE 23 SAFE KEY PROTECTION D 24 FOCO OO E 24 COO TE E E O A EA T EAA TE ETE T EA TE A EA 24 POCE S a EE 24 SAFE ACTIVATION PROTECTION sadisesvendaccaueadcnesacadicadsscmanccninaeaieiuadneneandscednsadceassivcsseidiadseansnelages 25 Technology veuve nun nanena naaa aoaeeoo 25 Characteristics A aoaeeoo O TEE 25 Process Eft EEN 25 SOFTWARE DROGEN MODELS eg NEEN unn EE ER 2 Sia OT Ee ee eee 27 Safe Key with Single License ANd Single Key 28 Safe Key with Single License ANd Multiple Keys cccccseccccsesecccceeececensesecseecsessecscseseseneetstseeeens 29 Safe Key with Multiple License ANd Single K Y ccccceeeeccseseccccesececcuseseneesesscsececsusesesansesssueeeess 30 Safe Key with RUN on First MAGEE N O OA 31 SERW ARE EE NG MODERN nun o C OA WM 33 it Ae eee lO 33 Rental License i lt j ED WE 34 Features License SEE WEE WM es 35 Network License EE AE earns senescence ere erences ieee a 36 N
27. etwork Portable Elte CEET 37 MCENSE URDATE EN 42 Safe 08 2JH Ilet WE 42 Bafe AC on LICCNSCRBMBUOTE keen unn EE 43 PROTCCTICMMMOCHNIQUCS MABON csccsccrcesessecsccsessecrees sss oovesvescees EE 45 CERN Ac ff PHONE ff ggf T g ff 47 EK D with hae Activation 290 T d sos 47 Safe Activation With Offline Activation REENEN 48 HC g eutzetlei WEEN EEN ZE 50 PROTECTIONEG SDK 29000 WM WE T 51 V PROTECTION SEMIBDES ccsssosscssscccsccsscssscscscssccssccsscccsccsscccccecscssg firs scccscessosscesscesscecses 55 SAFE CD CDR SAMPLE lt C T 55 SAFE ACTIVATION DAMPLE une EEGENEN REENEN ENER 56 NERE SP E 58 Vi SPECIFICATIONS scissioni 59 E CODE PROTECTION TUDIOVD 2A 59 eC EE 59 nn B e Code Sealing Information NEN eege 60 AFEA VAT E 60 k ABOUT CODE csar EN 61 e Code Sealing Information II INTRODUCTION This document provides a Product Description for the E Code Protection Studio The product description covers the different features and techniques of E Code Protection Studio v5 3 4 The product description will provide a complete view for software vendors on how to make a good use of E Code Protection Studio v5 3 4 in a way that meets their software protection and distribution requirements Overview E Code Protection Studio v5 3 4 is the new product version of E Code software protection solution line of products E Code Protection
28. for all titles SW F2 PO Title Protectionkit License Title Protection Management Operations d A deit 1 SK Load Edit Import Export onver Certificates Profiles Studic ls GN TS Es General Conversion Others 1 The Protection Studio mainly depend on the Operating Database to store most of protection parameters and vendor s information And the vendor takes the responsibility of preventing its deletion nn e Code Sealing Information Vendor Profiles Vendor Profile is the module that describes a vendor operating on the Protection Studio Vendor Profile holds information about the vendor including some descriptive information about the vendor Name Email Phone etc and some data that is used in the security operation including its unique Vendor Certificate used in protection techniques E Code Protection Studio v5 3 4 provides a secure and easy way to distribute the profiles to the vendors Using Profile Request Response method will establish a way to deliver the profile to the studio in a secure way that cannot be used in another Protection Studio which keeps the profile safe from misuse in unauthorized hands Profile request response method is based on PKI and Hardware Certificates to secure the profile delivery operation The profile will be used in creating Protection Titles and start the protection operations Each vendor will have a unique Vendor ID The following figures illustrate the Profiles in Pro
29. get user Send the License to the User IS i The User places the new License file in the same folder with the Exe Or 5 If the old license has been expired user can use the Activation Error Dialog to browse the new license file Activation Error Activation Error Error Message e A Guide Information System Code Browse a license File Software Vendor License Issue License Update Old License ignored New License nn e Code Sealing Information Safe Activation License Update In this model the vendor will update the License issued for a user running Software protected by Safe Activation The update process is done by the following steps Vendor Issues Public License and Generate Serial User Activate the Public License using the Serial Vendor Issue a Private License using the User Machine Code E zeit ap The User places the new License file in the same folder with the Exe Or 5 Ifthe old license has been expired user can use the Activation Error Dialog to browse the new license file Issue License oa License Type Select License Type Private License With Certificate Public License Without Certificate License Certificate Sab User Machine Code Query ia Server Register Updated License Default Certificate Export Certificate to file Certificate Information Value The Public License is issued so that it can run on any machine The user activa
30. hough it can be optionally assigned by the vendor while creating the title NOTE Once the Certificate password is saved in the title it cannot be changed 5 Equations Equations are used to add extra security for the software Will be mentioned later in details rs e Code Sealing Information License Description E Code Protection Studio v5 3 4 is based on licenses The License is a file that elaborates the rights and conditions applied on any protection The license includes many options and attributes One important property is that all licenses generated from Protection Studio is based on XrML standard One benefit of conforming to standard is that the license is readable which gives the user the ability to read the rights and conditions supplied on the software The following figure illustrates the different attributes rights and conditions of the license General License Label CRM Project License Key License Sequence Number Protection Type Safe Key Enabled Activation By Phone _ Run on First Computer Only _ Enable SDK APIs Authentication Type On each startup K Multiuser License Modules aa gegen Module Information Dan Ge Rights Th Conditions Default Module MODULE Executables EIER MODULE Execute Expiration Date 3 31 2010 Ke Data J Expiration Running time Minutes Edit d Expiration Period Read C write Max no of trials Print Mas no of users Copy Max no of sessions The
31. icate of the Protected viewer will be exported When the data only applications are protected using one of the protection techniques the vendor has to use the SW certificate of the viewer in order to the viewer can view the protected data 4 When the data is encrypted the license will be appended at the end of the encrypted data Creation Date Protection Profile Protection Label Application Type Protection Mode Software Certificate Advanced Settings Protection Title Information New Title Ea General Information A0000002 00000017 0000002F Protection ID A0000002 00000017 00000030 Tuesday October 19 2010 Creation Date Tuesday October 19 2010 Softlock Protection Profile Softiock Protected Protection Label Protected Data Data Only Application Type Software and Data be Data Only Final Mode Test Protection Mode Final Mode Test Software Certificate Advanced Settings crypto Tei Soratre Terie a coyote Team Sorote Teoma Code Length code engi Activation Server URL http www Softiock net SLPSActivationServer Process Activation Server URL http www Softlock net SLPSActivationServer Process Certificate Password Equations Auto generated 29TXZ19H Certificate Password V Auto generated Equations Equation Label Equation Label License Agreement e Code Sealing Information Data Files Protection Options General Opt
32. ication runs on ENABLE SDK APIs This is an optional attribute and Should be used when the vendor is planning to use the SDK within the protected application AUTHENTICATION TYPE The authentication type is a very useful attribute that can increase the security level of the protection according to software vendors needs The authentication types are 1 Once The application will perform hardware authentication only once This option has low security and it is available only in Safe Activation Once per The application will perform the authentication once per a period you specify 3 On each Startup The application will perform the authentication each time it runs Periodical Check The application will perform the authentication according to specific time interval This is considered the highest authentication security The usage of the Authentication Type attribute will be explained in details and in combination with protection techniques later nn e Code Sealing Information MULTI USER LICENSE The Multi user attribute is optional It can be used when using a Network License Explained later This attribute may require issuing two licenses Client and Server This option is available in Safe Key and Safe Activation License Modules The modules part is the second part of the license Any license includes one or more modules Each module includes set of rights and conditions The main module is called the Default M
33. illustrates the migration to Safe Key protection 1 Vendor uses the same title of the protected CD application 2 Vendor generates a Certificate for the user Prepare a Safe Key and Burn the certificate on the Key 3 Vendor issues a new license License Update with Safe Key protection type issued for the user s key 4 User places the new License in the same folder with the protected application plugs the Safe Key and runs the application and then the application automatically starts to work as a Safe Key protected application Software Vendor Issue License Distribute Software on CD 1 Safe CD Protection Software Vendor License M Issue License Update ex 2 Migrating to Safe Key Protection e Code Sealing Information Offline Activation Phone E Code Protection Studio v5 3 4 provides a flexible Offline Activation operation which has a great benefit for Safe CD and Safe Activation protection techniques Offline Activation is an option used in the case of physical authentication failure whether authenticating to protected CD or Activation Server via internet Safe CD with Offline Activation In this model the vendor will be able to activate the software even though the CD authentication has failed due to any reason The protection technique process is done by the following steps 1 Vendor starts protecting the application and data 2 Vendor issues a license with CD protecti
34. ine the Safe Key activates on This model is suitable for 1 Distributing Safe Key and Binding to machine 2 Increased control on Software Distribution and Safe Key usage The following steps describe how to use E Code Protection Studio v5 3 4 to perform the mentioned license model 1 Create Title 2 Generate 1 or X Certificates 3 Burn 1 or X Certificate on 1 or X Token Safe Key for single or X user 4 Issue 1 or X License with the desired conditions with protection type Safe Key and Run On First Computer Only option with License Certificate that is corresponding to the single or X user Token 5 Protect Exe Data if required Once the Safe Key has been distributed and the application ran once on the machine i e Activating the Safe Key the user cannot redistribute the software or reuse the Token on any other machine nn e Code Sealing Information General License Label Title License Key License Sequence Number Protection Type Safe key v Enabled Activation By Phone Run on First Computer Only _ Enable SDK APIs Authentication Type On each startup wt F Multiuser License Server Modules Module N Module T Module Information paray ege GER Rights Conditions Je Default Module MOCULE Executables Report Feature MOULE Execute F Expiration Date L Data F Expiration Running time In Minutes Edit Expiration Period Days Read write Print Max no of users fo Copy Ma
35. ion secure online distribution of digital Contents We supports different market sectors like governmental institutes organizations banks software development companies multimedia software and game producers media and eBooks publishers and individual users luarpcar D 1234 5678 9101 1121 m o CH Saen Haid Jensen cane Fingerprint Fingerprint Smart Smart OTP Dongle Token Smart Card Card e D D D D gt Smart Fingerprint Secure SD Secure d Token OTP Token Card Flash with i Fingerprint Website www e code com Email info e code com support e code com sales e code com Telephone A gis pisii O eccone
36. ions Advanced Options Backup Protected Files Create SL File Associated License F Public no certificate E Default Protected Data License Data Path Associated License Status EF Safe CD Licenses ace z EE GO Safe Key Licenses Video mp4 c Default Not Encrypted EF Safe Shell Licenses Protection with SDK E Code Protection Studio v5 3 4 provides a flexible SDK solution for developers The SDK provides different APIs that gives the ability to the developer to extend the software protection Using SDK the vendor will be able to extend the protection of the software by controlling different features in the software SDK with modules is the method to apply protection to different parts of the software independently E Code Protection Studio APIs provide the needed functionalities to the developer to control different protected software features The protection technique process is done by the following steps works only for Safe Key and Safe Activation 1 Vendor starts protecting the application and data Vendor creates a license with Safe Activation protection type and with Enable SDK Vendor adds different modules in the license for example a HR Module b Sales Module c Manager Module Vendor specifies the rights and conditions for each module independently Vendor issues the license and distribute the software Vendor can issue license updates with new conditions and modules in the software if needed e SE e Vendor should
37. le for all the contents of the CD Using any Image creator software Prepare the generated image using E Code Protection Studio with CD STD Burn the Image onto CD Stamper DN D Lef Start replication of the CDs with a machine that supports LS technology In case of preparing a PreStamper CD in step 6 Prepare CD STD PreStamper This PreStamper can be used in testing the protection before mass production using Final stamper E E k 120 123 Sa Jame SELL Generate f Prepare CL Generate Register Activate Generate Generate DAT Files H Image Activation Code Profile Title Serial Activation Code f l CD DVD STD Safe Activation License Final EE DataBase Lice e Code Sealing Information This is an enhanced version of E Code CD protection TECHNOLOGY Safe CD PRO depends on Physical Parameters Technology This technology is considered one of the strongest technologies available for CD protection as it changes physical parameters of the CD with strong and sensitive run time authentication CD stampers generated from this protection can be replicated using any CD machines CHARACTERISTICS Safe CD PRO is characterized by 1 Strong and Secure Authentication method 2 Preparation process is faster than older version PROCESS Safe CD PRO production process is straight forward and easy The following are the steps required for performing PRO protection Create Title Issue License with Safe CD CDR protection ty
38. license is divided into two main parts General and Modules General License Attributes The general part of the license includes generic attributes of the license The following are the attributes LICENSE LABEL The license label will hold the label of the license This label can be helpful when the license is distributed as it gives a descriptive property of the license LICENSE SEQUENCE NUMBER The Sequence Number is a unique sequence number of the license inside each title Once a license is issued with a sequence number this sequence cannot be repeated in this typical title nn e Code Sealing Information PROTECTION TYPE The license includes an attribute that tells what kind of hardware protection it represents The protection type can be one of the following 1 Safe Shell 2 Safe CD CDR 3 Safe Key 4 Safe Activation This attribute is very important as it represents how the protected application will operate authenticate and activate during run time ENABLE ACTIVATION BY PHONE This is an Optional attribute available only in Safe CD CDR protection and Safe Activation protection This option is very useful in case a problem happened while performing Hardware Authentication and Activation Though this attribute decreases the security of the protection severely RUN ON FIRST COMPUTER This is an optional attribute used in Safe Key protection The idea is to bind the Hardware key with the first machine the appl
39. m Integration Test softod net 13 10 2010 8 25 32 13 10 2020 8 25 32 SafekeySingleDBDema ce Safe Key with Multiple License and Single Key In this model the vendor will issue Multiple Licenses with different protection titles for a Single Safe Key This model is suitable for 1 Distributing Multiple software for Single User 2 Decreasing the number of distributed Hardware Tokens 3 Less effort in Distribution and Production The following steps describe how to use E Code Protection Studio v5 3 4 to perform the mentioned license model Create Title Generate 1 Certificate SCH us Ze Burn 1 Certificate on 1 Token Safe Key for single user Issue 1 License with the desired conditions with protection type Safe Key with License Certificate that is corresponding to the user Token ah 6 Create X Titles 7 Issue X Licenses for X titles with the desired conditions with protection type Safe Key with Protect Exe Data if required License Certificate that is corresponding to the same user Token nn e Code Sealing Information 8 Protect Exe Data if required The following figure illustrates how a Single hardware token can run different applications from different titles License License Title 1 Title 2 License License Title 3 Title 4 Safe Key with Run on First Machine In this model the vendor will issue Safe Key license with the limitation of running on the first mach
40. n server and the serial will be flagged as used e Code Sealing Information ch License Title Protection Management Operations Gg j f vn E E be aa f SS Generate Prepare CD Generate Register Activate Generate Generate DAT Files Image Activation Code Profile Title Serial Activation Code Safe CD CDR Sate Activation Phone Actrvation User Name Bob User Email Bob entrprise com User Phone 0125456789 System Code G6LOSUH HMA4S691I HP TS8P9G UVEBASHHP Serial Number OTSKYIO8 HRfES633 RKAKY FREDO Activation Code PREK 31X OTI61QGH RKECG7TW H2GQPBLW The following figure illustrates the user info registered on the server after offline activation process Zbenocn URITY SERVICE PROVIDER Ganaa Users of serial DHIVEK7 WYIL2516BO5N1GUCH Test A0000002 2 5 Logout Account Information User Info Activation Date Titles dnojndfo 0 0 5 16 2010 Administration bob stevenson bob eenterprise org 568232214 12 24 57 PM Profiles Users Deactivate e Code Sealing Information Data Only Protection In this type of applications the vendor who Produce Data like multimedia videos e books and etc will be able to protect his products The vendor develops a viewer which can be used to run the vendor s data The protection technique process is done by the following steps 1 The viewer will be protected using shell protection technique under software and data application type SW certif
41. nses nn e Code Sealing Information After issuing the license the license file will be generated as xml file This xml file can be readable using any XML parser or Internet Explorer The following figure illustrates the readable license in Internet Explorer 6 C Wefault License Key Limited xml Microsoft Internet Explorer Fle Edt Yew Favorites Tools Help E gt x E Le 2 Search Sie Favorites amp Address IS C Default License Key Limited rt lt license gt lt inventory gt lt KeyHolder licensePartid User Public Key gt lt SWkKey licensePartiId SW Key gt lt inventory gt lt grant gt lt KeyHolder licensePartidRef User Public Key gt lt execute gt lt read gt lt write gt lt edit gt lt copy gt lt print gt lt ProtectedObject gt lt SWkKey licensePartIdRef SW Key gt lt ProtectedObjectName gt Default Module lt ProtectedObjectName gt lt ProtectedObjectT ype gt Module lt ProtectedObjectType gt lt ProtectedObject gt lt DurationUmit gt 10 lt DurationLimit gt lt TrialPeriod gt 30 lt TrialPeriod gt lt MaxNumberOfTrials gt 90 lt MaxNumberOfTrials gt lt MaxNumberOfUsers gt 5 lt MaxNumberOfUsers gt lt ExpirationDate gt 29 3 2010 lt ExpirationDate gt lt GrantID gt O lt GrantID gt lt grant gt lt other gt lt LicenseLable gt Default License Key Limited lt LicenseLable gt lt LicenseSequenceNumber gt 8 lt LicenseSequenceNumber
42. odule which includes the main application rights and conditions While when adding other modules they will hold their rights and conditions The added module can be accessed only when using SDK The following are the rights and conditions in the license RIGHTS The rights act as DRM for the software and data Execute This indicates whether the module is enabled or not Read This indicates whether the module is enabled or not Edit Editing the data is enabled disabled Write Saving is enabled disabled Print Printing is enabled disabled Copy Copying is enabled disabled S Si e CONDITIONS Conditions act as the expiration control of the license using various parameters that meet the software vendors need 1 Expiration Date A specific date specifies when the license should expire Expiration running time A specific value minutes or hours that specifies the exact effective duration the application module should run 3 Expiration Period A specific value days or months that specifies the exact period the application module should run 4 Max No of Trials A specific value that specifies how many times the application module should run 5 Max No of Sessions A specific value that specifies how many sessions should be opened of the application module used with Multi user licenses 6 Max No of Users A specific value that specifies how many users should be accessing the application module used with Multi user lice
43. ollowing figure illustrates issuing a Private License using Activation Server Query Issue License License Type Select License Type Private License With Certificate Public License Without Certificate License Certificate Register Updated License Default Certificate Export Certificate to file Certificate Information Field Version Serial Number Issuer Common Issuer Country Issuer Organiza Issuer Organiza Valid From Valid To Subject Commo Subject Country Subject Organiz Subject Organiz Public Length Public Key Public Penoanent Value A 020000A0470000000A000000 SAEBB00E softockusercert EG softock softock 18 10 2010 7 26 57 18 10 2020 7 26 57 softiockusercert EG softock softlock AE E490 08 92 43 2A F0 CD D6 6F 2491 33 DC EE 0C ionni Protection Techniques Migration In this model the vendor will be able to change the Protection Technique of the software without the requirement of going through the whole Application and Data protection process The protection technique migration depends on the license update operation The protection technique process is done by the following steps Migrating from CD to Safe Key 1 Vendor starts protecting the application and data 2 Vendor issues a license with CD protection type e Code Sealing Information 3 Vendor prepares the NRG image replicate and distribute the CDs The following steps
44. ollowing license has the following properties that can be very useful as a Network License 1 Issued for Safe Key protection 2 Issued with Multi User License and identified as Server License 3 Only 5 Users can run the software simultaneously General License Label Sw2 F2 PO License Key NETWORK License Sequence Number Protection Type Safe key k Enabled Activation By Phone _ Run on First Computer Only Enable SDK 4PIs Authentication Type On each startup Ke Multiuser License Modules Module Information v Module N Module T odule Name odule Type Rights Conditions Default Module MODULE Executables Expiration Dake Expiration Running time Minutes Edit Read Write Print Max no of users Copy Max no of sessions Expiration Period Months Max no of trials Using a Server License requires installing E Code Network Service on the License Server In this model the license can control the number of users running the software and the number of sessions the whole users can run on their machines simultaneously e Code Sealing Information The Multi User license can include any conditions that provide Trial or Rental licensing model The next figure illustrates how multiple users running the applications on their machines while connecting single Safe Key and Network License to the server License Organization Network License Server Note This
45. on of E Code and possibly other copyright or trademark owners All other trademarks and copyrights are the property of their respective owners 2015 E Code nn e Code Sealing Information III E CODE PROTECTION STUDIO V5 3 4 Introduction The next figure illustrates an example of a software distribution process Where the software vendor needs to protect his intellectual property and his copyright as well He also needs to enforce different protection conditions for each software release like trials or expiration date a Wf OR OR Fapt 2 Control ia Customers Serials ye Activation Protected Protected USB Server CD DVD Dongle Software Vendor BT A P S Authentication Mechanisms Protected Application Authenticates Run Customer The example displays four effective techniques for the software protection via e USB Hardware authentication device e Machine authentication with serial numbers e CD authentication e DVD authentication e Code Sealing Information E Code Protection Studio Process E Code provides Software Protection Studio v5 3 4 to automate the software protection process The protection is characterized as multi layered protection that can be customized to meet the software vendor requirement The challenging security in this solution is that it is based on hardware protection as mentioned in the previous figures which resists all piracy operations E
46. on type and with Enable Phone Activation 3 Vendor prepares the NRG image replicate and distribute the CDs If one of the users CD failed to activate 1 Vendor gets the System Code from the user in the Error Message 2 Vendor enters the System Code in the User Machine ID field from Generate Activation Code 3 Vendor clicks on Generate and Send the resulting Unique Activation Code to the user b License Demos Title Softlock Protection Studio Version 5 0 Style Title Protection Management Operations ec d P wa Ei L amp Gaz Wi Burn Generate Prepare CD Generate Register Activate Generate Generate DAT Files Image Activation Code Profile Title Serial Activation Code Safe Key Safe CD CDR Safe Activation License General DataBase Licenses MET Licenses License Label Safe CD Licence License Sequence Number 0 B Public no certificate Protection Type Safe CD CDR v V Enabled Activation By Phone Run on First Computer Only A Default Safe Activato Get a CD Licenses Authentication Type On each startup Multiuser License Server Hyprid Activation Si e Token Licenses EE Shell Licenses Modules Module Information j e Rights s e Conditions Executables Execute Expiration Date 10 18 2010 m Data Expiration Running time V Edit Expiration Period Read 7 Write Max no of trials J Print Max no of users Copy Max no of sessions
47. pe Protect EXE Encrypt Data if required Generate DAT files according to remaining free size of the CD Create a new image file for all the contents of the CD Using any Image creator software Prepare the generated image using E Code Protection Studio with CD PRO Burn the Image onto CD Stamper oo Eo S e Start replication of the CDs In case of preparing a PreStamper CD in step 6 Prepare CD PRO Pre Stamper This PreStamper can be used in testing the protection before mass production using Final stamper fF de ke 123 124 Si e sea iea Generate Prepare CL Generate Register Activate Generate Generate DAT Files Image Activation Code Profile Title Serial Activation Code CD DVD STD Safe Activation License E Ta wmd DE DataBase Lice Fna oe NET irona cd BIET I weer e Code Sealing Information Safe CDR Protection Safe CDR Protection is very popular in the field of protecting Multimedia Games and small software The purpose of this protection technique is in its low price and limited distribution E Code Protection Studio v5 3 4 provides Safe CDR Protection in order to meet many vendors requirements that is available in market Technology Safe CDR depends on Special Signature Technology This technology provides the strength for CDRs to prevent any illegal copy of the CDR contents Characteristics Safe CD version2 is characterized by 1 Suitable for limited n
48. protection works only for a LAN Network Portable License Hybrid In this model the vendor will protect the software controlled by a license placed in a network server while providing the option for running as a portable license independent from the Server E Code Protection Studio v5 3 4 provides different conditions in order to meet these criteria This model is suitable for 1 Single Server license controlling Multiple Users 2 Controlling Number of Users using the Software 3 Reducing the Hardware Activation and Distribution Ex Single Key runs Multiple Users 4 Enabling selected users to run the software when departed from the network This model is available with the following protection techniques 1 Safe Key 2 Safe Activation In order to achieve this model Software vendor will issue two licenses 1 Network License License placed on the Server License for multi user license 2 Client License License placed with user that enables the user to run the application independent from the Network License The following license has the following properties that can be very useful as a Network License 1 Issued for Safe Activation protection e Code Sealing Information 2 Issued with Multi User License and identified as Server License Only 5 Users can run the software simultaneously in the network 4 Server License is issued as a Public License which must be activated on the License Server Machine using Internet Acti
49. rTrials gt o lt MaxNumberOfT rials gt lt GrantID gt 1 lt GrantID gt lt grant gt lt grant gt lt KeyHolder licensePartIdRef User Public Key gt lt execute gt lt read gt lt write gt lt edit gt lt copy gt lt print gt lt ProtectedObject gt EE licensePartiIdRef SW Key gt lt MaxNumberOtTrials gt 10 lt MaxNumberOtTrials gt lt GrantID gt 2 lt GrantID gt lt grant gt lt grant gt e Code Sealing Information The figure illustrates part of the license associated with the sample The following figure illustrates the Safe Activation sample application indicating the encrypted GIF image and the different software features controlled by the license executable and data files using both Shell and SDK modes The main executable file is protected using illustrates the protection of internal software features modules using SDK mode mk TKS 10 Records e Code Sealing Information Safe Key Sample Safe Key sample provides a simple illustration for USB Dongle Token protection The authentication type available for Safe Key samples are 1 Periodical Check checking for the existing of the USB key with certain time interval 2 Multi User License a sample with Server License and Multi user control Safe Key sample is the same as Safe Activation sample provides a clear sample for Automatic Data Encryption Decryption The encrypted data includes 1 SLPS GIF Image appear
50. s in the sample 2 Database mdb MS Access data base where the protected sample performs Read Write operations Safe Key also provides a clear example for Software Features Modules protection The protected modules using SDK are 1 Add module Adding new records to the database The limitation is on the number of records to be added 2 Delete module Deleting records from the database The limitation is on the number of records to be deleted 3 Edit module Editing records from the database The limitation is on the number of records to be edited The Multi user sample will require installing E Code Protection Solution Network Service and installing the Server License on the server along with the USB Key e Code Sealing Information VI SPECIFICATIONS E Code Protection Studio v5 3 4 Supported Operating System Windows 2K XP 2003 Vista 7 2008 License Activation Available in Two Modes 1 Safe KEY protected Protection Studio 2 Safe ACTIVATION protected Protection Studio Requires Internet connection Protection Techniques Safe SHELL Safe CD CDR Safe KEY and Safe ACTIVATION support Controlled by Protection Studio License Software Interface SDK Library and SDK COM Cryptography AES 3DES RSA Safe CD CDR Supported Operating System Windows 2K XP 2003 Vista 7 2008 Production CD Replication based on CD Stampers 2 CDR Replication based on regular CD Writers and Replicators with raw write mode
51. tection Studio Profiles Editor Profiles DataBase Creation Date Thursday April 08 2010 Nendor ee Ee ke ec Profile Information Vendor ID GAUOOUUO 00000000 Creation Date Sunday March 14 2010 e Code Sealing Information Protection Titles After importing a profile creating Titles is the step to start applying protection to the software and data Titles are used to identify specific protection project Each title includes some information in addition to some security parameters like the protection key and Software Certificate Each title will be assigned a Unique Protection ID This Protection ID will be a sequence based on the vendor ID and will describe all the protection operations within the studio The next screen shot describes Title s parameters Titles can be categorized as 1 Software and Data Title 2 Data only Title While title protection mode can be 1 Test Mode Title 2 Final Mode Title The mode of the title affects how the protection is applied Software and Data Title This type of titles will enable the vendor to protect EXEs and Encrypt Data files within the title Data Only Title This type of titles will enable the vendor to Encrypt Data file only It will require a Viewer S W Certificate Viewer S W Certificate will be publicly available by E Code or can be generated by the vendor This certificate will be used by the Viewer a protected EXE in order to view data files encrypt
52. tection provides the following 1 Protection against reverse engineering Protection against debuggers Protection against disassembling tools Protection against decompiling tools Protecting the Source Code and Data SE oF a w e Protecting the Intellectual property Exe protection is offered with variable parameters that can increase the protection and security according to software vendors need Protection Levels The protection level provides the vendor to tune the level of protection according to the requirements for balancing security and the performance Protection level depends mainly on the concept of Source code Interceptions which modifies the application original source code and changes its original execution flow during run time Protection level has 3 levels LOW LEVEL There is no source code interception It only depends on Source code Encryption and Anti debugging routines MEDIUM LEVEL The number of Source code Interceptions varies from 50 to 100 The Anti debugging routines are executed more often in run time HIGH LEVEL The number of source code interceptions can reach 300 The Anti debugging routines are executed extensively to detect debuggers Note Increasing the Protection Level may decrease the performance of the running application nn e Code Sealing Information Executable Files Protection Options General Options _ Advanced Options Backup Protected Files Create Log File Protec
53. tes the Public License using one of the Generated Serials Generating Serials can be one of the following two models 1 1 Serial for Single Machine 2 1 Serial for Multiple Machines Once serial is used on the machine the machine Code will be stored on the Activation server The following figure illustrates Machine Activation using Serial nn B e Code Sealing Information System Code 2G6LOSVAHMAS4S9TTHP 7 TSP 9G VEBXSMHP RW4GROFH CMIEC1 F E6GNKSRMO jtik The following figure illustrates the Activation Server Web interface providing registered user activation information fo SECURITY SERVICE PROVIDER Users of serial I8S12MTM79VEGKOFBTUOQY7OCNE Softlock Protection Studio A0000002 0 1 General Logout Account Information Titles User Info Administration MIEINULL2F6EL1H7FQ16HA56F6BR22V6 1 42 Profiles Bob Machine bob eenterprise org 002026958745 Users e Code Sealing Information In order to perform license update Software vendor will issues a new license The new License should be issued to specific user who requires a license update This License is called a Private License Private License can be issued using the following steps Vendor Selects a Private License option Vendor types the User s Machine Code and click on Query i i The User s private certificate will be retrieved from the Activation Server 4 The vendor can issue the Private License to the user The f
54. tion Level Code Interceptions 150 Max 300 C Apply customized solution NahdetMisr NB Executable Status Softlock Protection Solution v5 0 Beta Customized Protection Solutions E Code can provide a customized exe protection solution according to customer needs in order to meet all the protection requirements e Code Sealing Information Data Files Encryption E Code Protection Studio provides strong data files encryption Data protection technique is based on strong encryption technique AES or 3DES yet fast in run time operation The data protection includes another level of protection during run time for DRM The DRM applied to the data file is found in the license associated with it This license is usually the license associated with the exe running the file Data Protection for R W Files Normally data file protection is applied to read only files In order to apply it for R W files it is required to generate SL file beside the data file Normally this option is suitable for protecting MS Access or SQL Lite database files Data Files Protection Options General Options Advanced Options Backup Protected Files Create SL File Associated License Default Associated License Status Softlock Protection Solution v5 0 Beta Data file protection is combined with Safe Shell in order to provide Automatic Encryption Decryption process during run time In this case the protected Viewer
55. tiuser License Modules ee Module M Module T Module Information odule Name odule Type tee Ee Default Module MODULE Executables F Expiration Date e Data Edit A Expiration Running time Expiration Period write C Max no of trials Print Max no of users Copy Max no of sessions The Software will run according to the following constraints 1 If Client Software is running in the network then Network License will dominate and Client License will be ignored 2 If Client Software is running outside the network then Client License will Activate using Internet Activation and ask the User for a Serial This step is followed by issuing a Private License for the User Machine using License Update sequence The following figure illustrates issuing Private License for the Client License using Machine Code e Code Sealing Information License Type Select License Type Private License With Certificate Public License Without Certificate License Certificate User Machine Code 2G6LO3VHHMA4S69IIHP7TSP9GVEBX9MHP Register Updated License Server Default Certificate Export Certificate to file Certificate Information Field Value 2 Serial Number 020000A0470000000A0000005AEBB006 Issuer Common softlockusercert EG softlock softlock 18 10 2010 7 26 57 18 10 2020 7 26 57 softlockusercert EG softlock softlock
56. umber of distribution 2 Prevents illegal contents copy 3 Fast Authentication method Process Safe CDR Production process is straight forward and easy The following are the steps required for performing Safe CDR Protection Create Title Issue License with Safe CD CDR protection type Protect EXE Encrypt Data if required Generate DAT files according to remaining free size of the CDR Create a new image file for all the contents of the CDR Using any Image creator software Prepare the generated image using E Code Protection Studio with CDR yoo Start replication of the CDRs with machines supporting Raw Mode 3 be 123 123 Burn Generate Prepare C Generate Register Activate Generate Generate DAT Files i Activation Code Profile Title Serial Activation Code Safe Key CD DVD STD gt Safe Activation CD PRO e Code Sealing Information Safe Key Protection Safe Key protection is the new version of E Code Dongle protection Safe Key is offered in a new way to meet most vendors requirements Safe Key offers a strong protection that is considered hard to crack Technology Safe Key protection technology is based over E Code Smart Token This protection depends on strong PKI standards that provide the maximum required protection Safe Key protection provides user identification using Hardware Certificates that uniquely identifies the token Characteristics Safe Key is characterized by
57. vation Server General License Label Test Tithe 1 License ACTIVATION Network License Sequence Number Im Protection Type Safe Activation f Enabled Activation By Phone Hun on First Computer Or Enable SDK APIs Authentication Type On each startup k Multiuser License Modules Default Module MODULE Executables Execute JExpiration Date 3 31 2010 Data j _ Expiration Running time fb Edit Expiration Period In Days Max no of trials a Write Sigk Copy Max no of sessions Issue License License Type Select License Type Private License With Certificate Public License Without Certificate License Certificate User Machine Code Query Server mT Register Updated License Default Certificate Export Certificate to file Certificate Information Value e Code Sealing Information The following license has the following properties that can be very useful as a Client License Issued for Safe Activation protection Issued with Multi User License and identified as Client License 3 Client License is issued as a Public License which must be activated on the user machine using Internet Activation Server General License Label Test Title 1 License ACTIVATION Client License Sequence Number Ee Protection Type Safe Activation f Enabled Activation By Phone Run on First Computer Only Enable SDK APIs Authentication Type On each startup Ww Mul
58. with Single License and Multiple Keys In this model the vendor will distribute all Safe Key with a single license In this way a Single License file will be issued to multiple Users This model is suitable for 1 Distributing software for Multiple users without tracking their licenses 2 Future License updates will apply to all Users using a Single file 3 Less effort in Distribution and Production The following steps describe how to use E Code Protection Studio v5 3 4 to perform the mentioned license model 1 Create Title 2 Generate 1 Certificate 3 Burn 1 Certificate on X Tokens Safe Keys as each user should have a unique Key 4 Issue 1 License with the desired conditions with protection type Safe Key with License Certificate that will be distributed to all Users 5 Protect Exe Data if required The following figure illustrates issuing the license for single certificate to be distributed with all Hardware Tokens e Code Sealing Information Issue License License Certificate From Database cafekey C From Token Certificate Information Field Version Serial Number Issuer Common Issuer Country Issuer State Issuer Locality Issuer Organiza Issuer Organiza Issuer Email Valid From Valid To Subject Commo Ce bas ech ee ee Token ID SoftLockSmartToken Si Certificate ID 17 Value 2 g20000A0060000000300000030C60 101 Safekey EG Cairo Nasr City SoftLock Syste
59. x no of sessions Max no of trials e Code Sealing Information Software Licensing Models Trial License In this model the vendor will issue a license for the protected software and data as a Trial license E Code Protection Studio v5 3 4 provides different conditions in order to meet these criteria This model is suitable for 1 Distributing license with Expiration Date 2 Distributing license with Number of Trials 3 Distributing license with Expiration Period Number of Days Months This model is available with the following protection techniques 1 Safe Key 2 Safe Activation The following license has the following properties that can be very useful as a Trial License Issued for Safe Key protection Expires on 30 04 2010 Or 3 Expires after 30 Days of its first run Or 4 Expires after 40 Trials of the Software General License Label Sw F2 PO License Key TRIAL License Sequence Number Protection Type Safe Key k Enabled Activation By Phone Run on First Computer Only Enable SDK APIs Authentication Type On each startup we C Multiuser License Modules Module N Module T Module Information Se Reder Rights Conditions Default Module MODULE Executables Execute Expiration Date 4 30 2010 Data Edit 4 Expiration Period 30 D Rear write Max no of trials 40 Print Max no of users Copy JExpiration Running time Minutes Jax no of sessions
Download Pdf Manuals
Related Search
Related Contents
Emerson EM-237C Bluetooth Headset User Manual Wells Bulit-In Electric Griddles User's Manual YFR-057シリーズ取扱説明書(取付編) Labour Force Survey Longitudinal User Guide (Pdf 95Kb) manual Manual - Multilaser MANUAL DE INSTALACION Y USO STECKERLEUCHTEN PLUG LAMP LAMPE DE FICHE 保守点検マニュアル INSTRUCTION MANUAL MODE D`EMPLOI GEBRAUCHS Copyright © All rights reserved.
Failed to retrieve file