Base Technologies of StarForce
- Program data protection;
- Licensed disk identification;
- Compilator of program modules strongly protected from analysis and modification;
- C++ source code obfuscator;
- Rebuilding of С++ и .Net modules;
- Software and documents.
Program data protection
Purposes:
This technology is created for protection of unchangeable program data. Those who doesn’t know about existing file will not find it in the program folder. So data file can’t be read and modificated.
Application area:
Can be used for protection any unchangeable data as for distributors, software and content integrators as consumers of IT which are operating with confidential data. Application doesn’t demand from company’s scope.
Example:
If company uses some CMS (content management system) and this system has some unchangeable data such as e-learning courses, orders, normative acts, then it can be protect.
By the way this technology (driver-mode) can be offered to developers of private data protection system.
Using in:
- Disc
- ProActive
- ProActive for Business
- Universal
- Crypto
- MMOG
- Content (for the protection of viewing program)
- Corporative
- Audio/Video
Licensed disk identification
Purposes:
This technology is created for defining authenticity of CD- or DVD-disk. It allows to find distinctions between disks which are printed from one master-disk and which content the same information but were printed on the other production line from other master-disk.
Application area and restrictions:
Can be used for identification of «right» CD/DVD disk in different control processes.
Example:
Technical specialist is installing update on the ATM which has no broadband connection. In such case update must be installed only from authorized disk. Installed on ATM proactive protection will confirm updating only in case of successful disk identification.
Used in:
- Disc
- ProActive for Business
- Universal
- Content
- Audio/Video
Compilator of program modules strongly protected from analysis and modification
Purposes:
Technology is created for compilation of executable program files translated into nonstandard program language p-code.
Application area:
Can be used by software developers for extremely strong protection of program modules source code from the analysis and modification without using external services. Protection process can be integrated in software developing process to avoid using of external servers if it’s need.
Usage sphere of this technology is software development where highest level of protection from cracking is critically important.
Can be offered to developers of source code protection systems.
Used in:
- Disc
- ProActive
- ProActive for Business
- Universal
- Corporative
- Crypto
- MMOG
- Audio/Video (for the protection of StarForce Audio/Video Player)
- Content (for the protection of viewing program)
C++ source code obfuscator
Purposes:
Technology is realized in utility, which takes source code of the C++ program and modifies it into obfuscated source codes which can be compiled by the usual С++ compiler.
Application area:
Can be used by software developers for protecting of C++ of source code analyzing without using external services. Protection process can be integrated in software developing process to avoid using of external servers if it’s need.
Can be offered to developers of source code protection systems.
- Before using the obfuscator you need to point what in source code is need to be obfuscated.
- Obfuscated program works more slowly and that can influence on performance of the system.
- Debugging of obfuscated program is getting harder.
Used in:
Applying of this technology is possible before using any of StarForce products for protection improvement.
Rebuilding of С++ и .Net modules
Purposes:
Technology realized in a program library written on C#. It provides tool to developer for disassembling executable native- и .Net modules, modification it and build it back.
Application area:
Technology can be used for modification of external executable files, analyzing of their work и so on. As example, for developing of system for code-protection from reverse engineering, for file system analyzing during the antivirus scanning, for services of analyzing which collect statistics about quality, types and functions of program code. Besides, regulators can monitor compliance with the requirements for the protection of software code in public institutions and companies.
Number of tasks which be solved with this type of technology is extremely big.
Using in:
- Disc
- ProActive
- ProActive for Business
- Universal
- Corporative
- Crypto
- MMOG
- Audio/Video (for the protection of StarForce Audio/Video Player)
- Content (for the protection of viewing program)
Software and documents
Purposes:
Provides tool for developing and building own system of licenses management of software and any other digital information. By the other allows collecting of protected products usage statistics in real time.
Application area:
Provides to system integrator, vendor or publisher building of your own system for software and data licenses management.
Provides to analytical and marketing departments the opportunity to collect statistics about using software and data in real time from the whole world.
Licenses manager must be integrated to object of licensing and monitoring.
Defining of products sales model, time and regional limits on using, defining of functionality for different levels of users. Activations counting.
Using in:
- ProActive
- ProActive for Business
- Universal
- Corporative
- Content
- Audio/Video