?
Solved

Bypass Hardware Identification Module

Posted on 2011-10-21
5
Medium Priority
?
422 Views
Last Modified: 2013-12-27
Hello Experts,

I have a potential client who has enquired whether it would be possible to bypass a Hardware Identification Module that is built into a Windows Mobile App.

Basically, he obtains the software, which is already preloaded into a HTC P3470 Windows Mobile 6 from some company. He then uses a another software called Sprite (I think), to clone the original software and set it up on another HTC P3470. However, the HTC on which the software is cloned comes up with a message saying "Wrong Target Device" or something along those lines. He does not have any code for the software.

Question is, is it possible in any way to bypass the module that recognises the device without having the code?

The latest versions of the Mobile Folders can be downloaded from the following locations:

https://rapidshare.com/files/2206283934/DEVICE.rar
https://rapidshare.com/files/1039795919/Stotage_CArd.rar

ref-IT
0
Comment
Question by:ref-IT
  • 2
  • 2
4 Comments
 
LVL 38

Accepted Solution

by:
Jim P. earned 2000 total points
ID: 37042952
I have a potential client who has enquired whether it would be possible to bypass a Hardware Identification Module that is built into a Windows Mobile App.

We as experts at EE can not really help you with this question.

If you are replacing a phone because it went bad, you would call the SW company and explain your phone was replaced. They should then help you reset the app to work on the new phone.

If this is not a replacement phone then you would a new (or additional) license to run the app. If this an orphan software there probably isn't much you can do.

But as experts -- we are prohibited from helping you as it would be a violation of the EE ToU for hacking/cracking.

Sorry for the bad news.
0
 
LVL 2

Author Comment

by:ref-IT
ID: 37043760
Hello jimpen,

Thank you for your comment.

As a professional software services provider, I did advise the client that the best way to go forward in such a situation was to have a similar bespoke software developed without violating the copyrights of the Company he initially obtained the Software from. As trying to get the obtained Software to work by either Reverse Engineering, Hacking or Cracking would account to a technical fraud.

However, having a similar Software designed would not infringe copyrights ... I wanted to have some expert view point clarify this for me further.

Any final comments to add on to that before I award the points to you?

Well Appreciated,

ref-IT
0
 
LVL 38

Assisted Solution

by:Jim P.
Jim P. earned 2000 total points
ID: 37044555
That pretty much sums it all up.

He may also consider that the development cost may be more than an additional licensing fees.
0
 
LVL 2

Author Closing Comment

by:ref-IT
ID: 37045441
Although the expert did not actually say if it was possible to to by pass the Hardware Identification Module - I gave full grades because, as a Developer myself, he was very fair in pointing and confirming the professional eithics that we have to abide with when dealing with Clientelle advice.

I pretty much hold that in high esteem and truly appreciate the asisstance.

Regards,

ref-IT
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Understanding the various editions available is vital when you decide to purchase Windows Server 2012. You need to have a basic understanding of the features and limitations in each edition in order to make a well-informed decision that best suits …
Recently, I read that Microsoft has analysed statistics for their security intelligence report. It revealed: still, the clear majority of windows users do their daily work as administrator. An administrative account is a burden, security-wise. My ar…
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
Suggested Courses

571 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question