Moway I USB dongle is the latest hardware lock (Dongle) for software protection with easy to use, cost effective functions to software developer. Equipped with 32 bits smart card inside and security level up to CC EAL4+, Moway I USB dongle supports multi advanced encryption algorithm to protect software and also provides large data storage capacity (varies from 8K/32K) to store and protect the license and critical data.
Operation System we support Windows, Linux, macOS. C/C++,C#, Delphi XE7 and above version, Java, VB, labVIEW, Python, Lua, Pel, R, Ruby, PHP, MATLAB; AutoCAD ARX, Revit, UE4, Unity3D
Moway I USB dongle supports HMAC identity authentication, Remote upgrade, Driverless mode and be flexible used in different scenario. In cooperate with Moway I USB dongle Virbox Protector and other toolkits, Software developer will be easily and quickly to complete the highly secured software protection scheme to safeguard their software program far away from piracy.
Easy to use, Secured and Cost effective software copyright protection solution for software developer.
Moway USB dongle equipped with 32 bits smart card which dramatically increase the performance and security level to protected software, together with a series tools, it supports software developer to complete an absolutely reliable protection scheme to your software. Built in File management system, support developer to store and protect the license, key or data in the dongle.
AES、DES、TDES、RSA and ECC supported, critical data would be stored as file in the smart card chipset. File can be used inside of smart card and can not be read which to keep the security of key and protected data. Software developer may access the file by file name not by the boring data block and call API to use the key file.
To protect the communication between dongle and protected software, Moway I use AES algorithm to establish the secured communication tunnel to prevent the data leakage. And random scrambling technology used to prevent cracker insert the probe to detect and obtain the valid information when communicated and enhance and improve the security level of protected software.
Universal Unique ID has been set to each Moway I hardware lock which is hardware serial ID Set before Moway I shipped to the software developer, you can use this UUID to bind with your protected software and use the UUID to trace and track your software program.
Technical Specification, Physical Parameter, Protection/Encryption, Licensing Functions...
Moway I provides HMAC-SHA1、HMAC-SHA256、HMAC-MD5 algorithm to developer, and support to be used for the authentication mode with the "challenge-response" which guarantee the identification of authentication user. So developer may also use this function and related algorithm to develop your application for authentication.
All critical components of Moway I, includes CPU, RAM, ROM and non-volatile memory are all integrated in single chipset which guarantee the Moway I quality and stability in high level and minimizing the risk coming from hardware damage.
Virbox Protector, A highly secured protector provided with Moway 1, helps developer to save most of workload to complete highly secure protection scheme; A series of Tools Available for Testing, Encryption, Volume Setting, Remote Updating the Moway I dongle;
Software Publisher may put all resource and focus to software and business development and leave software protection and licensing to Virbox LM, Virbox LM will help you to solve all everything
Moway I Solution supply envelop tool to the software to be protected. Only by “select and click” Virbox Protector (MowayI Version) the software can get high security, and no coding needed.
Virbox Moway I provide file manage system. No offset needed to manage the data block in the chipset. As the data would be stored as file, that could be defined freely by software developer. You can access the file by file name not by the boring data block.
Virbox Moway I provide key file generation tool to manage the key file. The key file would be stored as file and software developer can call API to use the key file by assign the file name. In this way to complete the encryption, decryption, signature, and signature verification operation.