Software License Management using the Polymorphic Encryption Algorithm White Paper

Size: px
Start display at page:

Download "Software License Management using the Polymorphic Encryption Algorithm White Paper"

Transcription

1 pmc-ciphers.com Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007, first published in January 2003 PMC Software License Management 1

2 Software License Management using the Polymorphic Encryption Algorithm White Paper Published: May 2007 For the latest information, please see Introduction Software piracy is a serious threat to software companies. The Software and Information Industry Association publishes on May 24, 2000: Business Software Alliance (BSA) has found that global average software piracy rate in 2006 was 35%, virtually unchanged from This amounted to nearly US$40 billion in losses to software companies, according to BSA. Existing software based piracy protection schemes are obviously inadequate; many are also quite intrusive into the end-user system, which is an aspect that no one appreciates. Hardware protection devices (dongles, etc.) are also a failing attempt; an expensive hassled one at that; these devices have been in existence for more than 15 years, yet such protected software sells on the street in China for less than $2; at least slightly below what the software manufacture had intended and not even to mention the fact that they see 0% of profits generated at this point. The bottom line: current fixed-parameter license management systems are a violation and insult to the honest end user and a false sense of security to the software manufacturer; there are no benefits to anyone. PMC Software License Management self-compiling crypto code makes reverse-engineering impossible Our first customer/implementation of this protection scheme actually had the idea to protect their satellite data broadcasting system with our PMC crypto engine. A hacker had been able to crack the conventional licensing system that was previously employed and had published a cracked version of the data decoding software on the internet; this obviously created a professional disaster for the company The key to protect the system is a piece of software which creates an infeasibility in terms of reverse-engineering procedure; the creation of indiscernible variations of PMC Software License Management 2

3 the code itself. Each individual copy of the decoding software has to be personalized with an activation key which consists of the user-specific information, which represents constant data of the target computer. This key is used to yield a set of predefined results; as all users receive the same source code, consequently all licenses must execute the very same instructions in order to decode the data properly. This applies to digital rights management, software installation, licensing schemes, and virtually any other related procedure designed to control and protect data distributions. A good security software specialist must already have cracked one or more programs; knowledge truly is nothing more than experience. Cracking a piece of software is sometimes quite easy to do; often, it is only necessary to change a JNZ command into JZ (jump if accumulator is zero). It is only a single bit of the machine instruction code which must be toggled! After entering the correct licensing code, this cracked software refuses to run, but when total rubbish is entered, one can play the game - without paying. In order to prevent hackers from analysing our original customer s satellite data decoding software, a very clever approach had to be taken; an original an unconventional approach. Little is more vulnerable than a data stream which is decoded by all users in the very same way; or any other broadcast for that matter. The only feasible way is in merging the licensing system with the key functionality of the software itself. In addition, the machine instructions which are analysed by hackers have to be different on every target computer. Therefore, even if one system is compromised by a genius hacker after what would definitely have been a very frustrating and time consuming task to say the least, he would have to start from scratch for another computer...such a concept states the level of protection achievable with PMC and the PMC Software License Management incorporation thereof. PMC Software License Management supplies programmers with the possibility to merge the licensing system with the source code of the application and it makes the software unique for each target computer or end customer or both. The implemented scheme is variable and only depends and the licensing strategy of our customers; much is left to application specific customization. Operating principle of PMC Software License Management In 1949 C.E. Shannon describes the principles of data encryption as confusion and diffusion. He describes confusion as being the use of enciphering transformations that complicate the determination of how the statistics of the ciphertext depend on the statistics of the plaintext. Diffusion simply means spreading the influence of individual pieces of plaintext data over the full ciphertext or at least over big areas of ciphertext. By doing this, the statistics which might be inherent in the plaintext can be hidden. For a licensing engine, this means that a licensing system is good if a hacker faces a lot of operations which cannot be classified properly as relevant or irrelevant for his task (to crack the software). Diffusion is maximized when a large number of operations influence some other operations which are executed by the PMC Software License Management 3

4 microprocessor in the far future. When these two principles are combined, an unbreakable licensing engine can be realized! In 1999 C.B. Roellgen invented a data encryption algorithm which uses a compiler to generate the actual encryption algorithm out of a passphrase. After being declassified as state secret, it is now possible to develop commercial applications based on this algorithm. The underlying method is called the Polymorphic Encryption Algorithm, or PMC. PMC is very useful for applications which need a piece of software to be customized for every user or every target machine. Registration data or simply the name of the user can be compiled into a useful piece of machine code at runtime. An incorrect username compiles into totally different machine code. A microprocessor which executes this machine code at some point of time yields completely different results. Here s a brief explanation of a simple PMC licensing engine: Passphrase (user info, registration key, etc.) Crypto Compiler Compiled Crypto Code Building block 1 Building block 2 Building block 3 Building block 2 Data Array for the internal state. It contains a number of variables which are used by the application which is to be protected Building block 3 propagated internal state Fig. 1: Structure of a PMC implementation for use in a licensing engine A passphrase consisting of registration information which is known to the software manufacturer is compiled into machine code. The compiler simply assembles standardized pseudo-random number generators, the so-called building blocks, adjust addresses as well as entry and exit points to generate a piece of machine code which acts like a huge pseudo-random number generator that is working on the Internal State. The Internal State is a data array which is used throughout the complete operation of the software application. A powerful implementation will combine a set of global variables used by the application software (which is to be protected) in this data array. After initializing the history data array with part of the passphrase, the instruction pointer of the microprocessor on the target machine is set to the start of the Compiled Crypto Code. After finishing the execution of the Compiled Crypto Code, the bit pattern stored in the history data array consists of near-random data. Without being noticeable by a hacker, the Internal State array can even be set to some predefined bit pattern. PMC Software License Management 4

5 The Compiled Crypto Code can be pretty long. If necessary, the crypto compiler generates megabytes of machine instructions within a fraction of a second; the average hacker gets lost when he tries to analyse this code. Professionals go beyond that point they look at the results which are returned by the software. However, as the crypto code affects several variables, but more importantly vital ones for yielding a correct result, and because the crypto code doesn t return anything, even professionals are thwarted. As the whole system avoids using yes/no decisions, it s easy to locate the machine instruction which is responsible for displaying the message invalid license code, but not the others which strike any time and which just change data in a way that makes the software obviously useless. Considerations for the implementation of PMC Software License Management Every copy protection and licensing system should be different. Otherwise, hackers get used to a certain class of algorithms and methods; this is why PMC Software License Management is defined in a different way for each customer. Even the complete mode of operation can be adapted! A good example and available demonstration model is our hierodrive full volume encryption software. This disk encryption software can be downloaded from the internet or it can be distributed as CD shareware; this is perfect because the demo version can be distributed freely! Users then are more willing to install it, test it and then are more likely to purchase a license. All they have to do is to enter a code number which is specific for each target computer, customer ID, IP address, etc. Each user reads a different registration code on the screen and sends it to the distributor, along with his credit card any other relevant purchase details as defined by our customers pre-defined parameter sets. Subsequently this information is then processed to compute the corresponding registration code number. This code number is then passed to the customer. After entering the code number and re-launching the application, the customer has a full version up and running; immediately. There s nothing more to install and if an update is available, we grant our users the right to download it and to use it as a full version. This technique can as well be used for licensing the very same software for a number of different levels (e.g. Demo version, Private Edition and Professional Edition); this obviously simplifies the distribution process even further, while for the first time, maintains intellectual property safeguards. The licensing engine in hierodrive uses compiled crypto code to influence a number of vital variables and writes undefined results to them. Unless an attacker has the required registration key, the results remain undefined and the software will not be able to run correctly. After some time, the license level is finally identified by the application software. An attacker has a tough time to figure out which variable is good for what. As there is no single yes/no response, it s extremely difficult to crack this system. For each customer the licensing system is different; what is good for one application can be disadvantageous for another application. PMC Software License Management 5

6 A crypto compiler can be an overwhelming obstacle to an attacker, provided that it is implemented correctly; imagine that there is an intangible piece of software that isn t present on the hard disk, but which is compiled during runtime of the application program and then decides whether the software will later run correctly or not. Privacy statement Customer data is kept secret for at least 15 years on our standard non-disclosure policy procedure. This is especially true for the company name and for the products which are protected by using some or all of the features of PMC Software License Management. In return, we expect our customers to keep all information which is not publicly known about PMC Software License Management undisclosed for at least 15 years after signing a non-disclosure agreement with us. PMC Ciphers, Inc reserves the right to adopt improvements and new features of PMC Software License Management, which are being conceived or invented in the course of a running development for one customer, in PMC Ciphers, Inc products including PMC Software License Management. PMC Software License Management 6

7 For more information: This is a preliminary document and may be changed substantially prior to final commercial release. This document is provided for informational purposes only and PMC Ciphers, Inc makes no warranties, either express or implied, in this document. Information in this document is subject to change without notice. The entire risk of the use or the results of the use of this document remains with the user. The example companies, organizations, products, people and events depicted herein are fictitious. No association with any real company, organization, product, person or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of PMC Ciphers, Inc. PMC Ciphers, Inc may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from PMC Ciphers, Inc, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property ciphers.de, PMC Ciphers, Inc., All rights reserved. Company and product names mentioned herein may be the trademarks of their respective owners. PMC Software License Management 7

Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software

Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software Visualisation of potential weakness of existing cipher engine implementations in commercial on-the-fly disk encryption software C. B. Roellgen Global IP Telecommunications, Ltd. & PMC Ciphers, Inc. August

More information

Pipeliner CRM Phaenomena Guide Opportunity Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Opportunity Management. 2015 Pipelinersales Inc. www.pipelinersales.com Opportunity Management 205 Pipelinersales Inc. www.pipelinersales.com Opportunity Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT. Creating and sharing

More information

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner

More information

Pipeliner CRM Phaenomena Guide Lead Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Lead Management. 2015 Pipelinersales Inc. www.pipelinersales.com Lead Management 205 Pipelinersales Inc. www.pipelinersales.com Lead Management Learn how to use sales lead management with Pipeliner Sales CRM Application. CONTENT. Creating and sharing the Sales Lead

More information

UPGRADE. Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV. Microsoft Dynamics Entrepreneur Solution.

UPGRADE. Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV. Microsoft Dynamics Entrepreneur Solution. UPGRADE Microsoft Dynamics Entrepreneur Solution Upgrading Microsoft Dynamics Entrepreneur to Microsoft Dynamics NAV White Paper June 2008 The information contained in this document represents the current

More information

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Add-In for MS Outlook. 2015 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook 205 Pipelinersales Inc. www.pipelinersales.com Add-In for MS Outlook Learn how to use sales lead management with Pipeliner MS Outlook Add-In. CONTENT. Setting up Pipeliner Add-In

More information

for Java developers Building Mobile Applications Introduction 1 Building Mobile Applications

for Java developers Building Mobile Applications Introduction 1 Building Mobile Applications Introduction Building Mobile Applications for Java developers Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted,

More information

Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Target Tracking. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking 05 Pipelinersales Inc. www.pipelinersales.com Sales Target Tracking Learn how to set up Sales Target with Pipeliner Sales CRM Application. CONTENT. Setting up Sales Dynamic Target

More information

Windows Small Business Server 2003 Upgrade Best Practices

Windows Small Business Server 2003 Upgrade Best Practices Windows Small Business Server 2003 Upgrade Best Practices Microsoft Corporation Published: May 2005 Version: 1 Abstract To ensure a successful upgrade from the Microsoft Windows Small Business Server 2003

More information

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Sales Pipeline Management. 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management 2015 Pipelinersales Inc. www.pipelinersales.com Sales Pipeline Management Learn how to manage sales opportunities with Pipeliner Sales CRM Application. CONTENT 1. Configuring

More information

Enable File and Folder Auditing

Enable File and Folder Auditing Enable File and Folder Auditing Publication Date: Feb 9, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About this Guide: This guide will help the end user to enable auditing

More information

Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Administration & Setup. 2015 Pipelinersales Inc. www.pipelinersales.com Administration & Setup 05 Pipelinersales Inc. www.pipelinersales.com Administration & Setup Learn how to manage your sales team with Pipeliner Sales CRM Application. CONTENT. Managing Pipeliner s Users

More information

2007 Microsoft Office System Document Encryption

2007 Microsoft Office System Document Encryption 2007 Microsoft Office System Document Encryption June 2007 Table of Contents Introduction 1 Benefits of Document Encryption 2 Microsoft 2007 Office system Document Encryption Improvements 5 End-User Microsoft

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013

Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013 Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager Published: 07 March 2013 Copyright Information in this document, including URL and other Internet Web site references,

More information

Microsoft Dynamics GP. Electronic Signatures

Microsoft Dynamics GP. Electronic Signatures Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

TOPS Internet Backup Service User Guide

TOPS Internet Backup Service User Guide TOPS Internet Backup Service User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 09 2006 TOPS IBF AA 3.2.1 The

More information

Apache: Analyze Logs for Malicious Activities & Monitor Server Performance

Apache: Analyze Logs for Malicious Activities & Monitor Server Performance Apache: Analyze Logs for Malicious Activities & Monitor Server Performance EventTracker v7.6 Publication Date: Feb 12, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About

More information

http://www.microsoft.com/middleeast/arabicdev/farsi/wpaper.asp Office Language Interface Pack for Farsi (Persian) Content

http://www.microsoft.com/middleeast/arabicdev/farsi/wpaper.asp Office Language Interface Pack for Farsi (Persian) Content Page 1 of 11 Office Language Interface Pack for Farsi (Persian) Abstract Microsoft Office Language Interface Pack (LIP) is a high-quality, localized skin for emerging and minority language markets. LIP

More information

Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software. Published: February 2013 Software version: 5.

Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software. Published: February 2013 Software version: 5. Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software Published: February 2013 Software version: 5.0 Contents Introduction... 1 Safe AutoLogon solution... 2 Installation

More information

Windows Embedded Security and Surveillance Solutions

Windows Embedded Security and Surveillance Solutions Windows Embedded Security and Surveillance Solutions Windows Embedded 2010 Page 1 Copyright The information contained in this document represents the current view of Microsoft Corporation on the issues

More information

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On Load Balancing Exchange 2010 OWA for External Access using WebMux Published: April 2011 Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Overview of Microsoft Office 365 Development

Overview of Microsoft Office 365 Development Overview of Microsoft Office 365 Development Office 365 Hands-on lab In this lab, you will work with existing Office 365 apps. This document is provided for informational purposes only and Microsoft makes

More information

Hyper-V Server 2008 Setup and Configuration Tool Guide

Hyper-V Server 2008 Setup and Configuration Tool Guide Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V

More information

RedBlack CyBake Online Customer Service Desk

RedBlack CyBake Online Customer Service Desk RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility

More information

How To Use Pretty Good Privacy (Pgp) For A Secure Communication

How To Use Pretty Good Privacy (Pgp) For A Secure Communication Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security

More information

Product Development. Using Critical Path EVM for the Microsoft Project Desktop Application Readme

Product Development. Using Critical Path EVM for the Microsoft Project Desktop Application Readme Product Development Using Critical Path EVM for the Microsoft Project Desktop Application Readme Published: June 2009 Table of Contents Introduction... 1 System Requirements... 1 Installing the Critical

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Hyper-V Server 2008 Getting Started Guide

Hyper-V Server 2008 Getting Started Guide Hyper-V Server 2008 Getting Started Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide helps you become familiar with Microsoft Hyper-V Server 2008 by providing

More information

Microsoft Dynamics GP. Pay Steps for Human Resources Release 9.0

Microsoft Dynamics GP. Pay Steps for Human Resources Release 9.0 Microsoft Dynamics GP Pay Steps for Human Resources Release 9.0 Copyright Copyright 2006 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Windows BitLocker Drive Encryption Step-by-Step Guide

Windows BitLocker Drive Encryption Step-by-Step Guide Windows BitLocker Drive Encryption Step-by-Step Guide Microsoft Corporation Published: September 2006 Abstract Microsoft Windows BitLocker Drive Encryption is a new hardware-enhanced feature in the Microsoft

More information

FLoader User's Manual

FLoader User's Manual FLoader User's Manual Version 1.0.07 Build February 12, 2002 Copyright Topcon Positioning Systems, Inc. 2002 All rights reserved Last Revised February 14, 2002 INTRODUCTION / TERMS AND CONDITIONS Thank

More information

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab

Techniques of Asymmetric File Encryption. Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Techniques of Asymmetric File Encryption Alvin Li Thomas Jefferson High School For Science and Technology Computer Systems Lab Abstract As more and more people are linking to the Internet, threats to the

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Intellectual Property

Intellectual Property Intellectual Property Ethics and Computing Chapter 8 Summer 2001 CSE 4317: Intellectual Property 1 Motivation Most new ideas in the computer field involve intellectual property Intellectual property must

More information

ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT

ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT This Oracle CRM On Demand Development Addendum (the " CRM On Demand Addendum ") is between you ( Developer ) and the Oracle

More information

What Are Certificates?

What Are Certificates? The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form

More information

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA SYSTEMS AND SECURITY WHITEPAPER SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of

More information

Microsoft Solutions for Security. Delivering the Windows Server 2003 Security Guide

Microsoft Solutions for Security. Delivering the Windows Server 2003 Security Guide Microsoft Solutions for Security Delivering the Windows Server 2003 Security Guide Information in this document, including URL and other Internet Web site references, is subject to change without notice.

More information

Deploying the Workspace Application for Microsoft SharePoint Online

Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This

More information

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems

The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems The Feasibility and Application of using a Zero-knowledge Protocol Authentication Systems Becky Cutler Rebecca.cutler@tufts.edu Mentor: Professor Chris Gregg Abstract Modern day authentication systems

More information

Microsoft Dynamics GP. Bank Reconciliation

Microsoft Dynamics GP. Bank Reconciliation Microsoft Dynamics GP Bank Reconciliation Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Content Teaching Academy at James Madison University

Content Teaching Academy at James Madison University Content Teaching Academy at James Madison University 1 2 The Battle Field: Computers, LANs & Internetworks 3 Definitions Computer Security - generic name for the collection of tools designed to protect

More information

Princeton University Computer Science COS 432: Information Security (Fall 2013)

Princeton University Computer Science COS 432: Information Security (Fall 2013) Princeton University Computer Science COS 432: Information Security (Fall 2013) This test has 13 questions worth a total of 50 points. That s a lot of questions. Work through the ones you re comfortable

More information

The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions

The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions The 2007 R2 Version of Microsoft Office Communicator Mobile for Windows Mobile: Frequently Asked Questions Published: December 2008 Information in this document, including URL and other Internet Web site

More information

Insight Guide. Encryption: A Guide

Insight Guide. Encryption: A Guide Encryption: A Guide for Beginners If you read anything about information security, you re likely to have come across the word encryption. It s a fundamental building block when it comes to securing your

More information

Company Profile. Dhyey Consulting Services Pvt. Ltd. Directors. Solutions. Partners. June 18 th 2013. Nilesh Mandani Nilesh Panchal Sahil Amin

Company Profile. Dhyey Consulting Services Pvt. Ltd. Directors. Solutions. Partners. June 18 th 2013. Nilesh Mandani Nilesh Panchal Sahil Amin Company Profile Dhyey Consulting Services Pvt. Ltd. June 18 th 2013 Directors Nilesh Mandani Nilesh Panchal Sahil Amin Solutions Enterprise Resource Planning Customer Relationship Management Business Intelligence

More information

WINDOWS 7 & HOMEGROUP

WINDOWS 7 & HOMEGROUP WINDOWS 7 & HOMEGROUP SHARING WITH WINDOWS XP, WINDOWS VISTA & OTHER OPERATING SYSTEMS Abstract The purpose of this white paper is to explain how your computers that are running previous versions of Windows

More information

How To Create An Intelligent Infrastructure Solution

How To Create An Intelligent Infrastructure Solution SYSTIMAX Solutions Intelligent Infrastructure & Security Using an Internet Protocol Architecture for Security Applications White Paper July 2009 www.commscope.com Contents I. Intelligent Building Infrastructure

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Credit Card Extension White Paper

Credit Card Extension White Paper Credit Card Extension White Paper March 2010 Copyright Copyright 2004 Azox, Inc.. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web

More information

Module 1: Introduction to Designing Security

Module 1: Introduction to Designing Security Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

Mobile Money Payment Gateway System - An Overview of System Process. Prepared by: Neowave E-commerce Team Version 1.0 25/2/2006

Mobile Money Payment Gateway System - An Overview of System Process. Prepared by: Neowave E-commerce Team Version 1.0 25/2/2006 Mobile Money Gateway System - An Overview of System Process Prepared by: Neowave E-commerce Team Version 1.0 25/2/2006 PAYMENT MODE 1 - REMOTE PAYMENT REMOTE OR DELAYED ORDERING PAYMENT BY SECURITY PIN

More information

New VoIP Solutions in Windows Embedded CE 6.0 R2

New VoIP Solutions in Windows Embedded CE 6.0 R2 New VoIP Solutions in Windows Embedded CE 6.0 R2 Writer: Douglas Boling Published: November 2007 Summary: Windows Embedded CE 6.0 R2 contains new VoIP solutions. This paper describes those VoIP Solutions

More information

The Misuse of RC4 in Microsoft Word and Excel

The Misuse of RC4 in Microsoft Word and Excel The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore hongjun@i2r.a-star.edu.sg Abstract. In this report, we point out a serious security flaw in Microsoft

More information

HIPAA: The Role of PatientTrak in Supporting Compliance

HIPAA: The Role of PatientTrak in Supporting Compliance HIPAA: The Role of PatientTrak in Supporting Compliance The purpose of this document is to describe the methods by which PatientTrak addresses the requirements of the HIPAA Security Rule, as pertaining

More information

ZIMPERIUM, INC. END USER LICENSE TERMS

ZIMPERIUM, INC. END USER LICENSE TERMS ZIMPERIUM, INC. END USER LICENSE TERMS THIS DOCUMENT IS A LEGAL CONTRACT. PLEASE READ IT CAREFULLY. These End User License Terms ( Terms ) govern your access to and use of the zanti and zips client- side

More information

CINSAY RELEASE NOTES. Cinsay Product Updates and New Features V2.1

CINSAY RELEASE NOTES. Cinsay Product Updates and New Features V2.1 CINSAY RELEASE NOTES Cinsay Product Updates and New Features V2.1 2011, 2012, 2013 Cinsay, Inc. All rights reserved. Use of the Cinsay software to which this document relates is governed by, and subject

More information

Understanding Automotive EDI Automating and Integrating EDI for Increased Efficiency and Improved Delivery Performance

Understanding Automotive EDI Automating and Integrating EDI for Increased Efficiency and Improved Delivery Performance WHITE PAPER Understanding Automotive EDI Automating and Integrating EDI for Increased Efficiency and Improved Delivery Performance September 1, 2010 Written by Donna M. Ward PMP and former co-chair of

More information

Product Information about. GEDO-TEC ContactManager

Product Information about. GEDO-TEC ContactManager Product Information about GEDO-TEC ContactManager Page 1 of 11 Licence Information: GEDO-TEC Software is try-before-buy software. This means: 1. All copyrights to GEDO-TEC ContactManager are exclusively

More information

One Time Pad Encryption The unbreakable encryption method

One Time Pad Encryption The unbreakable encryption method One Time Pad Encryption The unbreakable encryption method One Time Pad The unbreakable encryption method One Time Pad encryption is a very simple, yet completely unbreakable cipher method. It has been

More information

Microsoft Dynamics GP. Bill of Materials

Microsoft Dynamics GP. Bill of Materials Microsoft Dynamics GP Bill of Materials Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting

More information

Sage CRM Connector Tool White Paper

Sage CRM Connector Tool White Paper White Paper Document Number: PD521-01-1_0-WP Orbis Software Limited 2010 Table of Contents ABOUT THE SAGE CRM CONNECTOR TOOL... 1 INTRODUCTION... 2 System Requirements... 2 Hardware... 2 Software... 2

More information

Enhancing VoIP with Voice Peering

Enhancing VoIP with Voice Peering Enhancing VoIP with Voice Peering The Voice Peering Fabric is a service of Stealth Communications. Jinci Liu, Stealth Communications, Inc. Published: July 2005 (last revised January 2006) Abstract From

More information

Hardware & Software Requirements for BID2WIN Estimating & Bidding, the BUILD2WIN Product Suite, and BID2WIN Management Reporting

Hardware & Software Requirements for BID2WIN Estimating & Bidding, the BUILD2WIN Product Suite, and BID2WIN Management Reporting Hardware & Software s for BID2WIN Estimating & Bidding, the BUILD2WIN Product Suite, and BID2WIN Management Reporting BID2WIN Software, Inc. Updated 05/08/2012 Abstract This document describes the hardware

More information

Microsoft Dynamics GP. Payroll Connect

Microsoft Dynamics GP. Payroll Connect Microsoft Dynamics GP Payroll Connect Copyright Copyright 2005 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting

More information

HP ProtectTools Embedded Security Guide

HP ProtectTools Embedded Security Guide HP ProtectTools Embedded Security Guide Document Part Number: 364876-001 May 2004 This guide provides instructions for using the software that allows you to configure settings for the HP ProtectTools Embedded

More information

Installation and configuration guide

Installation and configuration guide Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For

More information

best practices for encryption in android

best practices for encryption in android best practices for encryption in android SUBHEADER VALUE PROPOSTION STATEMENT GOES HERE developer.motorola.com/enterprise WHITE PAPER BEST PRACTICES FOR ENCRYPTION IN ANDROID 2 introduction Android has

More information

Business Portal for Microsoft Dynamics GP. Requisition Management User s Guide Release 10.0

Business Portal for Microsoft Dynamics GP. Requisition Management User s Guide Release 10.0 Business Portal for Microsoft Dynamics GP Requisition Management User s Guide Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Reprinted with permission from the January 2004 issue of the Intellectual Property & Technology Law Journal.

Reprinted with permission from the January 2004 issue of the Intellectual Property & Technology Law Journal. Reprinted with permission from the January 2004 issue of the Intellectual Property & Technology Law Journal. Beyond the NDA: Digital Rights Management Isn t Just for Music By Adam Petravicius and Joseph

More information

Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration

Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration Windows Embedded Compact 7: RemoteFX and Remote Experience Thin Client Integration Windows Embedded Technical Article Summary: Microsoft RemoteFX is a new Windows Server 2008 R2 SP1 feature that enables

More information

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers

Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart. OV-Chipkaart Security Issues Tutorial for Non-Expert Readers Counter Expertise Review on the TNO Security Analysis of the Dutch OV-Chipkaart OV-Chipkaart Security Issues Tutorial for Non-Expert Readers The current debate concerning the OV-Chipkaart security was

More information

Compter Networks Chapter 9: Network Security

Compter Networks Chapter 9: Network Security Goals of this chapter Compter Networks Chapter 9: Network Security Give a brief glimpse of security in communication networks Basic goals and mechanisms Holger Karl Slide set: Günter Schäfer, TU Ilmenau

More information

Lecture 12: Software protection techniques. Software piracy protection Protection against reverse engineering of software

Lecture 12: Software protection techniques. Software piracy protection Protection against reverse engineering of software Lecture topics Software piracy protection Protection against reverse engineering of software Software piracy Report by Business Software Alliance for 2001: Global economic impact of software piracy was

More information

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide

Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Deploying Microsoft RemoteFX on a Single Remote Desktop Virtualization Host Server Step-by-Step Guide Microsoft Corporation Published: October 2010 Abstract This step-by-step guide walks you through the

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

ICOM 5018 Network Security and Cryptography

ICOM 5018 Network Security and Cryptography ICOM 5018 Network Security and Cryptography Description This course introduces and provides practical experience in network security issues and cryptographic techniques. Cryptographic algorithms and protocols

More information

IMPLEMENTATION GUIDE. API Service. More Power to You. May 2008. For more information, please contact support@zedo.com

IMPLEMENTATION GUIDE. API Service. More Power to You. May 2008. For more information, please contact support@zedo.com IMPLEMENTATION GUIDE API Service More Power to You May 2008 For more information, please contact support@zedo.com Implementation Guide ZEDO API Service Disclaimer This Implementation Guide is for informational

More information

SafeNet MSSQL EKM Provider User Guide

SafeNet MSSQL EKM Provider User Guide SafeNet MSSQL EKM Provider User Guide Version 4.8.5 Documentation Version: 20080705 Copyright Information 2009 SafeNet, Inc. All rights reserved All intellectual property is protected by copyright. All

More information

ACER ProShield. Table of Contents

ACER ProShield. Table of Contents ACER ProShield Table of Contents Revision History... 3 Legal Notices... 4 Executive Summary... 5 Introduction... 5 Protection against unauthorized access... 6 Why ACER ProShield... 7 ACER ProShield...

More information

EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports

EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports EventTracker: Configuring DLA Extension for AWStats Report AWStats Reports Publication Date: Oct 18, 2011 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com About This Guide Abstract

More information

Whitepaper: Centeris Likewise Identity 3.0 Security Benefits

Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Author: Manny Vellon VP, Product Development Centeris Corporation Abstract This document describes how Centeris Likewise Identity improves the

More information

SmoothWall Virtual Appliance

SmoothWall Virtual Appliance SmoothWall Virtual Appliance Quick Start Guide Quick Deployment Guide Quick Start Guide Winfrasoft SmoothWall Appliance Quick Start Guide Published: May 2013 Applies to: Winfrasoft Gateway Appliance Web

More information

A Microsoft U.S. Public Sector White Paper by Ken Page and Shelly Bird. January 2009. www.microsoft.com/ government

A Microsoft U.S. Public Sector White Paper by Ken Page and Shelly Bird. January 2009. www.microsoft.com/ government Federal Server Core Configuration (FSCC) A high-level overview of the value and benefits of deploying a single, standard, enterprise-wide managed server environment A Microsoft U.S. Public Sector White

More information

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords

WHITE PAPER AUGUST 2014. Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords WHITE PAPER AUGUST 2014 Preventing Security Breaches by Eliminating the Need to Transmit and Store Passwords 2 WHITE PAPER: PREVENTING SECURITY BREACHES Table of Contents on t Become the Next Headline

More information

Microsoft Dynamics GP. Check Printing

Microsoft Dynamics GP. Check Printing Microsoft Dynamics GP Check Printing Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting

More information

Microsoft Dynamics GP. Electronic Signatures

Microsoft Dynamics GP. Electronic Signatures Microsoft Dynamics GP Electronic Signatures Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without

More information

DISCLAIMER, TERMS & CONDITIONS OF USE

DISCLAIMER, TERMS & CONDITIONS OF USE DISCLAIMER, TERMS & CONDITIONS OF USE Welcome to Universal Devices, Inc.'s online website. By accessing and using this website, you acknowledge that you have read, agree to, and are aware of the following

More information

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion By Kerry Maletsky, Business Unit Director Crypto Products Summary There is a growing need for strong hardware security devices

More information

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide

Dell NetVault Backup Plug-in for Advanced Encryption 2.2. User s Guide Dell Backup Plug-in for Advanced Encryption 2.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT

Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT Canon USA, Inc. WEBVIEW LIVESCOPE SOFTWARE DEVELOPMENT KIT DEVELOPER LICENSE AGREEMENT This Webview Livescope Software Development Kit Developer License ("Agreement") between you, the "Developer" and the

More information

Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations

Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations Security Guide for the BD Remote Instrument Support Solution BD Biosciences workstations 11/2010 This document includes the following topics: About this guide (page 2) TeamViewer remote desktop support

More information