How the dongle works:
We take an example to illustrate the use of single chip algorithm. For example, A program might say: A=Fx(3). The program uses the constant 3 to get the value of the variable A. Thus, we can rewrite the original program as follows: A=Fx(DogConvert(1)-12342). The constant 3 does not appear in the original program. Instead, DogConvert(1)-12342 is used. This way, only the software writer knows that the actual constant called is 3. However, without the software dongle, the DogConvert function would not return the correct result, and the result calculation A=Fx(DogConvert(1)-12342) would certainly not be correct. This kind of encryption, which deprives pirated users of the value of the software, is gentler, more subtle, and more elusive to decrypters than the method of warning and stopping illegal use. In addition, the software dongle has read and write functions that can be used to read and write the memory inside the software dongle. We can then write 12342 from the above formula into the dongle’s memory as well, making the value of A entirely dependent on the results of DogConvert() and DogRead() functions, making decryption even more difficult. However, generally speaking, the algorithm difficulty of software dongle microcontroller is lower than some public encryption algorithms, such as DES, because decrypters have to face many difficulties before reaching the algorithm of software dongle.
PROSOFT RLX2-IHNF-A 802.11ABGN FAST INDUSTRIAL HOTSPOT