Activation Key = a string of numbers and letters which is used to activate a carrier or algorithm library
Since the structure of the algorithm and carrier libraries are public, someone could use these libraries to extract data from carriers or make a program which searches for data in carriers.
So, in order to secure these libraries, we have implemented a security system based on activation keys.
The keys are generated from a password, known only by the developer of the library. The library is activated with the call of a function which has as parameter the password. If the password is wrong the library will not function. Only east-tec InvisibleSecrets knows how to convert the password to an activation key or vice versa. If a developer wants to make public his library, he makes public also the activation key and not the password. So if the attacker doesn’t know the password he can’t use library.
The activation keys are generated in the Settings Dialog Box.
You’ll find information on how to develop your own carriers or algorithms and implement the activation keys on our Web Site: http://www.east-tec.com