473,385 Members | 1,641 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,385 software developers and data experts.

Encryption algorithms for product licensing

Hi
Can anyone point me in the right direction to find some encryption routines
/ algorithms for use with product licensing??

I want to pull data such as the computer name etc etc, and encrypt them
against a string of mine, which will then create a product key.

Does anyone have a piece of code to do this, or any type of encryption that
may be useful in .NET

Thanks
Paul
Nov 16 '05 #1
3 5178
There are a lot of possibilities.

This is one of them.

Collect some informations (that rarely change) from client ex.: Computer
Name, Network MAC Address, ... and concatenate them into a string.
(ss="PCNAMEAB0F45DC")

Computete Hash Code:
System.Security.Cryptography.SHA1
h=System.Security.Cryptography.SHA1.Create();
byte[] bb=h.ComputeHash(System.Text.UnicodeEncoding.Unico de.GetBytes(ss));
Convert this binary result into hexadecimal string (323426534213423 ==>
XXXXXXXXXXXXXXXX).

Group into small piece if you want (XXXX-XXXX-XXXX-XXXX).

Andrea.

"Paul Aspinall" wrote:
Hi
Can anyone point me in the right direction to find some encryption routines
/ algorithms for use with product licensing??

I want to pull data such as the computer name etc etc, and encrypt them
against a string of mine, which will then create a product key.

Does anyone have a piece of code to do this, or any type of encryption that
may be useful in .NET

Thanks
Paul

Nov 16 '05 #2
What do you mean by "encrypt them against a string of mine"? You are
going to provide a key (string) and use that to encrypt your data?
Where would that key be stored? In the binary? That's not too secure.

Nov 16 '05 #3
You should think long and hard before you implement any form of
licensing youself that uses product activation (ie locks the license to
a single PC). Unless you have only a very few customers or else have
enough resources to offer 24/7 email and phone support then I would
look at some of the commercial products (xheo, xenocode etc) that do
this type of licensing and can provide that level of support.

Our company offers a simpler encrypted licensing solution because we
believe that product activation is actually a bad business model - see
our web page for the reasons why (www.infralution.com/licensing.html)

Regards
Grant Frisken

Nov 16 '05 #4

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

6
by: Richard | last post by:
I'm looking to do my own basic encryption. I've been tyring to do a concept such as: I pass this function the string, key and number of rounds I want to do the encryption. because im round...
14
by: Ray Cassick \(Home\) | last post by:
Ok, time to ask the question here.. I have been battling over this one for sometime now and just have to ask it. I have created a few classes that I use to act a security keys. These classes get...
113
by: Bonj | last post by:
I was in need of an encryption algorithm to the following requirements: 1) Must be capable of encrypting strings to a byte array, and decyrpting back again to the same string 2) Must have the same...
11
by: Paul Aspinall | last post by:
Hi Can anyone offer any hints / tips for creating registration keys / application activation, as software copy protection measures for a Winform app developed in C#? Thanks
7
by: Alan Silver | last post by:
Hello, I am writing a page where sensitive data is collected (over SSL) and stored in a database. I have been looking at the .NET encryption classes, but am a bit confused as to which is best...
0
by: John | last post by:
I am using SSLStream to send data between the client and server. From the client, 1) I am looking for a way to turn off the Encryption. In SSLStream, there is a READ-ONLY Encryption property....
4
by: Sylvie | last post by:
http://www.obviex.com/samples/Encryption.aspx According to this link, I am using Rijndael Encryption & Decryption Algorithms, But I want my encrypted strings just CAPS string and just...
3
by: =?Utf-8?B?TG9yZW4=?= | last post by:
I’m trying to encrypt and decrypt a file in vb.net. I am using the TripleDESCryptoServiceProvider encryption found in System.Security.Cryptography. Below is the code for my Encrypt and Decrypt...
1
by: Robert Blass | last post by:
I am looking to get my feet wet with encryption. When I say encryption program I am talking about something to get me off to a quick start. Something very simple, far less than the 40+ bit...
1
by: CloudSolutions | last post by:
Introduction: For many beginners and individual users, requiring a credit card and email registration may pose a barrier when starting to use cloud servers. However, some cloud server providers now...
0
by: Faith0G | last post by:
I am starting a new it consulting business and it's been a while since I setup a new website. Is wordpress still the best web based software for hosting a 5 page website? The webpages will be...
0
by: aa123db | last post by:
Variable and constants Use var or let for variables and const fror constants. Var foo ='bar'; Let foo ='bar';const baz ='bar'; Functions function $name$ ($parameters$) { } ...
0
by: ryjfgjl | last post by:
If we have dozens or hundreds of excel to import into the database, if we use the excel import function provided by database editors such as navicat, it will be extremely tedious and time-consuming...
0
by: ryjfgjl | last post by:
In our work, we often receive Excel tables with data in the same format. If we want to analyze these data, it can be difficult to analyze them because the data is spread across multiple Excel files...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
1
by: Sonnysonu | last post by:
This is the data of csv file 1 2 3 1 2 3 1 2 3 1 2 3 2 3 2 3 3 the lengths should be different i have to store the data by column-wise with in the specific length. suppose the i have to...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.