Bypass Hardware Identification Module

Posted on 2011-10-21
Last Modified: 2013-12-27
Hello Experts,

I have a potential client who has enquired whether it would be possible to bypass a Hardware Identification Module that is built into a Windows Mobile App.

Basically, he obtains the software, which is already preloaded into a HTC P3470 Windows Mobile 6 from some company. He then uses a another software called Sprite (I think), to clone the original software and set it up on another HTC P3470. However, the HTC on which the software is cloned comes up with a message saying "Wrong Target Device" or something along those lines. He does not have any code for the software.

Question is, is it possible in any way to bypass the module that recognises the device without having the code?

The latest versions of the Mobile Folders can be downloaded from the following locations:

Question by:ref-IT
    LVL 38

    Accepted Solution

    I have a potential client who has enquired whether it would be possible to bypass a Hardware Identification Module that is built into a Windows Mobile App.

    We as experts at EE can not really help you with this question.

    If you are replacing a phone because it went bad, you would call the SW company and explain your phone was replaced. They should then help you reset the app to work on the new phone.

    If this is not a replacement phone then you would a new (or additional) license to run the app. If this an orphan software there probably isn't much you can do.

    But as experts -- we are prohibited from helping you as it would be a violation of the EE ToU for hacking/cracking.

    Sorry for the bad news.
    LVL 2

    Author Comment

    Hello jimpen,

    Thank you for your comment.

    As a professional software services provider, I did advise the client that the best way to go forward in such a situation was to have a similar bespoke software developed without violating the copyrights of the Company he initially obtained the Software from. As trying to get the obtained Software to work by either Reverse Engineering, Hacking or Cracking would account to a technical fraud.

    However, having a similar Software designed would not infringe copyrights ... I wanted to have some expert view point clarify this for me further.

    Any final comments to add on to that before I award the points to you?

    Well Appreciated,

    LVL 38

    Assisted Solution

    by:Jim P.
    That pretty much sums it all up.

    He may also consider that the development cost may be more than an additional licensing fees.
    LVL 2

    Author Closing Comment

    Although the expert did not actually say if it was possible to to by pass the Hardware Identification Module - I gave full grades because, as a Developer myself, he was very fair in pointing and confirming the professional eithics that we have to abide with when dealing with Clientelle advice.

    I pretty much hold that in high esteem and truly appreciate the asisstance.



    Featured Post

    IT, Stop Being Called Into Every Meeting

    Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

    Join & Write a Comment

    The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
    It was really hard time for me to get the understanding of Delegates in C#. I went through many websites and articles but I found them very clumsy. After going through those sites, I noted down the points in a easy way so here I am sharing that unde…
    In this video, we discuss why the need for additional vertical screen space has become more important in recent years, namely, due to the transition in the marketplace of 4x3 computer screens to 16x9 and 16x10 screens (so-called widescreen format). …
    With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

    745 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    20 Experts available now in Live!

    Get 1:1 Help Now