Solved

VB.net Security Key

Posted on 2014-01-18
5
399 Views
Last Modified: 2014-01-18
Hi

A few months ago I looked at the following security key generator provided by Eric Moreau

http://www.emoreau.com/Entries/Articles/2007/12/Licensing-a-VBNet-application.aspx

I still don't understand the fundamentals. Could anyone please explain briefly how
this works and what stops multiple people using the same key to install the app on multiple machines?

I don't understand how the following process works "This method is using the registry (the CurrentUser section) to store encrypted information to keep track of everything. Symmetric encryption is used (a single key used to encrypt and decrypt). This demo is using a textbox (titled Pass Phrase) for you to try different combination. "
0
Comment
Question by:murbro
  • 2
  • 2
5 Comments
 
LVL 18

Expert Comment

by:Steven Harris
ID: 39791337
I still don't understand the fundamentals. Could anyone please explain briefly how
this works and what stops multiple people using the same key to install the app on multiple machines?
The key that is generated is specific to the machine.  As a quick and dirty example (not specific to the code, but as an example only):

I have a computer that is named "TOS4567890"     <-- string value specific to my PC
You are using a passphrase of "HelloWorld!"     <-- string value only known to you
The generated key is "HTeOlSl4o5W6o7r8l9d0!"     <-- the above two interact to make this (can you see how I combined the two?)

Think of this as the Username/Password combination.  You have to know both in order to gain access.
0
 

Author Comment

by:murbro
ID: 39791363
Thanks. The part that confuses me is that I generate the key on my machine using the middle two boxes. Then I send them the username and password. Am I doing it incorrectly?
0
 
LVL 18

Accepted Solution

by:
Steven Harris earned 250 total points
ID: 39791396
Remember, the example I gave was not indicative of the code as written, but was in relation to the hashing method. to generate said key.

Other than that, you are assigning the key correctly.  You are both running the same algorithm (you encrypt in your program, they decrypt in their program), so the program can validate that they key is correct.

For the part I missed in your original post:

...what stops multiple people using the same key to install the app on multiple machines?

I have not tested the method myself, but from what I can see:  Nothing.  You would need some type of check in place (like a server) that validates the use of the key and to see if it is already in use.
0
 
LVL 27

Assisted Solution

by:Ark
Ark earned 250 total points
ID: 39791725
Please see this tutorial
0
 

Author Closing Comment

by:murbro
ID: 39791763
Thanks very much for the advice
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
System32Int Error 8 57
Round a string to two digits 12 32
Open form in the top right hand corner of screen 5 36
Access to class from any project within a solution. 6 14
A while ago, I was working on a Windows Forms application and I needed a special label control with reflection (glass) effect to show some titles in a stylish way. I've always enjoyed working with graphics, but it's never too clever to re-invent …
Introduction As chip makers focus on adding processor cores over increasing clock speed, developers need to utilize the features of modern CPUs.  One of the ways we can do this is by implementing parallel algorithms in our software.   One recent…
This Micro Tutorial will give you a basic overview how to record your screen with Microsoft Expression Encoder. This program is still free and open for the public to download. This will be demonstrated using Microsoft Expression Encoder 4.
This Micro Tutorial demonstrates using Microsoft Excel pivot tables, how to reverse engineer competitors' marketing strategies through backlinks.

920 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now