Improve company productivity with a Business Account.Sign Up

x
?
Solved

VB.net Security Key

Posted on 2014-01-18
5
Medium Priority
?
437 Views
Last Modified: 2014-01-18
Hi

A few months ago I looked at the following security key generator provided by Eric Moreau

http://www.emoreau.com/Entries/Articles/2007/12/Licensing-a-VBNet-application.aspx

I still don't understand the fundamentals. Could anyone please explain briefly how
this works and what stops multiple people using the same key to install the app on multiple machines?

I don't understand how the following process works "This method is using the registry (the CurrentUser section) to store encrypted information to keep track of everything. Symmetric encryption is used (a single key used to encrypt and decrypt). This demo is using a textbox (titled Pass Phrase) for you to try different combination. "
0
Comment
Question by:Murray Brown
  • 2
  • 2
5 Comments
 
LVL 18

Expert Comment

by:Steven Harris
ID: 39791337
I still don't understand the fundamentals. Could anyone please explain briefly how
this works and what stops multiple people using the same key to install the app on multiple machines?
The key that is generated is specific to the machine.  As a quick and dirty example (not specific to the code, but as an example only):

I have a computer that is named "TOS4567890"     <-- string value specific to my PC
You are using a passphrase of "HelloWorld!"     <-- string value only known to you
The generated key is "HTeOlSl4o5W6o7r8l9d0!"     <-- the above two interact to make this (can you see how I combined the two?)

Think of this as the Username/Password combination.  You have to know both in order to gain access.
0
 

Author Comment

by:Murray Brown
ID: 39791363
Thanks. The part that confuses me is that I generate the key on my machine using the middle two boxes. Then I send them the username and password. Am I doing it incorrectly?
0
 
LVL 18

Accepted Solution

by:
Steven Harris earned 1000 total points
ID: 39791396
Remember, the example I gave was not indicative of the code as written, but was in relation to the hashing method. to generate said key.

Other than that, you are assigning the key correctly.  You are both running the same algorithm (you encrypt in your program, they decrypt in their program), so the program can validate that they key is correct.

For the part I missed in your original post:

...what stops multiple people using the same key to install the app on multiple machines?

I have not tested the method myself, but from what I can see:  Nothing.  You would need some type of check in place (like a server) that validates the use of the key and to see if it is already in use.
0
 
LVL 28

Assisted Solution

by:Ark
Ark earned 1000 total points
ID: 39791725
Please see this tutorial
0
 

Author Closing Comment

by:Murray Brown
ID: 39791763
Thanks very much for the advice
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

If you're writing a .NET application to connect to an Access .mdb database and use pre-existing queries that require parameters, you've come to the right place! Let's say the pre-existing query(qryCust) in Access takes a Date as a parameter and l…
The ECB site provides FX rates for major currencies since its inception in 1999 in the form of an XML feed. The files have the following format (reducted for brevity) (CODE) There are three files available HERE (http://www.ecb.europa.eu/stats/exch…
If you are looking for an automated solution for backup single or multiple Office 365 user mailboxes to Outlook data file, then you can use Kernel Office 365 Backup & Restore tool. Go through the video to check out the steps to backup single or mult…
If you are looking for an automated tool which can generate reports for Outlook emails and other items from PST file, then you can go for Kernel PST Reporter tool. The reports which are created by this tool are helpful to analyze and understand PST …

607 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question