IOLOCK by KORUM
22 rue blériot
16600 Magnac sur Touvre
FRANCE
+33 (0)5 17 20 60 61
info@iolock.com
UniKey - FAQs

Enveloper Protection (1) - Network Functions (5) - Real-time functions (3) - UniKey Hardware (2) - UniKey Solutions (21)
Security
Does the Unikey dongle analyzes update code inside its hardware?
Yes. Local PC sends messages to UniKey Dongle, and UniKey Dongle analyzes them inside hardware.
If hacker analyzes update code and also the communication between program and unikey dongle during update process, can he possibly get pw3,pw4 passwords?
It's very impossible. All the communication has been encrypted.
Is UniKey dongle a High Security Level dongle?
All the communication between the UniKey copy protection dongle and the application is encrypted with noise being introduced to make cracking more difficult. The UniKey Enveloper also utilizes anti-debug and anti-dump technologies to prevent it being cracked. A strong algorithm with a key length of 128-bits encrypts the application protected by the UniKey Envelope.
Why do we need to provide a seed instead of just inventing 4 password numbers? What advantage do we have out of such approach?
We use a SEED to generate a set of password. Without knowing the SEED, no one can generate the same passwords. Even others can know the password, they cannot generate the same password with you because they do not know the seed. In general, the boss keeps the SEED, and engineers can know the password when develop.
Mon Panier
Votre panier est vide