From the birth of the dongle to the present, from the point of view of technical principles, it has been four generations of products, and the fifth generation of products is also being gradually into people’s vision.
The earliest dongle only has the function of storage. Store part of the confidential data in the dongle hardware, the encryption software in the running can random read these data, and to judge. When the data is validated, the software thinks the correct dongle is installed on your computer, and continue to operate normally or stop running. This dongle is relatively simple, generally by tracking and interception of dongle data transmission and by identifying the data law to crack, the difficulty is low. However, the cost of this software dog is relatively low, and therefore it occupies some market share.
Second-generation software dog is placed in a number of…