UniKey Enveloper Tool
Contents
UniKey Enveloper User Guide
Version 8.4
Version | 1.0 | 1.1 | 1.2 | 1.3 | 2.0 | 2.1 | 2.2 | 3.0 | 4.0 | 5.0 | 6.0 | 7.0 | 7.1 | 7.3 | 8.0 | 8.1 | 8.2 | 8.3 | 8.4 |
Date | 2006.1 | 2006.8 | 2006.10 | 2006.12 | 2007.2 | 2007.4 | 2007.8 | 2008.5 | 2008.8 | 2009.3 | 2010.4 | 2010.6 | 2010.8 | 2010.9 | 2012.3 | 2012.4 | 2016.5 | 2016.7 | 2016.12 |
About UniKey Enveloper
UniKey Enveloper is a powerful tool that can protect your software from illegal usage. It secures your application by wrapping it in a shell. UniKey Enveloper provides the fastest and easiest automatic software solution to protect your executables, DLLs and data used in and by your applications.
The greatest advantage of using UniKey Enveloper is that you do not have to access the source code of your application. By running this tool and setting up the protect parameters, you can wrap your software in a secure shield, which can guarantee that no one else without your permission can use this protected software. Meanwhile, when you are using Enveloper to protect your application, an anti-debug mechanism will automatically be added to you application, rendering pirates who want to use reverse engineering method to hack your software impossible.
What can be Protected?
You can apply protection directly to data files, executables and DLLs. The protection can be applied by the Enveloper directly which is easy and fast to implement.
Protection Procedure
Protecting software with UniKey Enveloper is simple; users can enable it by following the procedure described below:
- Start UniKey Enveloper in the
SDK\Utilities\Enveloper\UniKey Envelop Tool
- Specify the program which you want to protect
- Set protection parameters for the program and execute
- Send your protected software together with the corresponding UniKey to your customer
The Structure of the UniKey Enveloper Interface
The Enveloper is stored in UniKey_SDK\Utilities\Enveloper\
To launch the Enveloper, double click on the Enveloper icon, and the Enveloper control panel will appear.
The UniKey Enveloper provides two different interface modes (Guide Mode and Professional Mode) to accommodate different user preferences. Users can switch between the two modes by clicking on the button in the upper right corner of the main panel or alternatively select the working mode from the View menu in the menu bar.
Guide Mode is specially designed for beginners, as the system will guide users step by step to configure their desired setting. Guide Mode is a simple way to get started. Professional Mode is suitable for advanced users who are familiar with the UniKey system. You can modify settings by selecting the specific parameters from the solution window (left hand window). By default, when you start the Enveloper, the main interface will be displayed in Guide Mode, as shown in the following pictures.
Guide Mode Interface Components and Layout
Guide Mode's interface consists of the:
- menu bar;
- input window;
- progress navigation bar and
- output window.
Menu Bar
File menu |
|
Protect menu |
|
View menu |
|
About menu |
|
Drop down list |
|
Protect button |
|
Working mode switch button |
For example, if you are currently using Professional Mode, the working mode button will display Guide Mode, and by clicking on it, the system will toggle to Guide mode, and vice versa. |
Input Window
In Guide mode, the input window lets you specify options step by step, guided by system.
The Progress navigation bar is a user-friendly tool that helps guide users in completing their configurations and indicates their current progress. The users progress will be highlighted by a yellow box.
Output window
The output window displays information about errors and the Envelopers running status.
Professional Mode Interface and Layout
Professional Mode consists of the following four components:
- menu bar;
- solution window;
- input window;
- output window.
The function and content of 1) menu bar and 4) output window in Professional Mode are the same as Guide mode, for more details about these sections please refer to the above section.
Solution Window
The solution window displays every project in the solution, and all the steps for setting each project in a tree view. By click on the settings in the solution window, you can easily access every setting.
- Device Type: The drop down allows you to change the type of UniKey device you want to protect the program with.
- Insert Device Mode: By default, the box is checked, and hence a UniKey is required to be present in the local port when protecting the software. If unchecked, under the option "Bind HID with selected HID", Add and Delete buttons are unlocked for you to add into the HID database for protection of software programs without needing to have the UniKey present.
Input Window
For every setting, the input window provides an interface for users to specify desired settings. Users can use the solution window to configure the content in the input window.
Enveloper Settings
Parameters | |
Source File | The executable file or .DLL to be protected. |
Data File | Data file associated with the source file. |
Output Location | The destination folder where the protected file will be saved. |
Password | UniKey has two-level security permissions by using four passwords. Login as a user by providing the first two passwords or as a vendor by providing all four passwords. When using the Enveloper to protect software, you must input all four passwords. |
Module settings | Let you assign a module number for your protected software. When the specified module number in the UniKey device is enabled, the protected software can be started or accessed.
|
Time settings | The UniKey time model has 16 time modules. You can bind your software to a specific time module, and indicate the expiration date or time duration.
|
HID settings | The UniKeys unique identification number. You can bind your software to this number to ensure that only when the corresponding UniKey is presented, the protected software can run.
|
SID settings | The UniKeys soft identification number. You can bind your software to this number to ensure that only when UniKey with the corresponding SID is presented, the protected software can run.
|
Background settings | When the protected software starts working, the software will check the UniKey device every Loop Time (self-defined) in seconds. This ensures that the UniKey device must be connected to the computer while the protected software is under use (not supported on Linux). |
Debugger settings |
This function lets you protect your software from being cracked by using debugger techniques, such as:
|
Network settings |
UniKey PRO, Time and Drive provide software protection in a local network environment. When this function is enabled the UniKey device will search through the network. The software will only work properly if the right device is detected. To use the network function, the following parameters need to be configured: Working Mode
Access Mode
Searching Mode
Server IP: The Server IP address where the UniKey is connected. Server Port: The port number used for the connection between server and client. Time Out: Defines the time-out value of the communication between the server and clients. |
Start Dialog Settings | Enable or disable the start screen display function. |
Warning Message | Define the warning and error output message. |
Protect Software using Enveloper
Enveloper protects software without changing the source code. At any time you can start the Enveloper to adjust settings and perform upgrades to your protected software.
New Solution
Create a solution by selecting the File→New Solution from the menu bar, and the following window will appear.
Select the UniKey Type you are going to use to protect your software. Enter a name and description for your newly created solution, and select the destination folder where the solution file will be stored. Click on the OK button to confirm your settings. The window will close and the Enveloper main panel will switch to Guide Mode automatically, as shown in the following picture.
The system will create a new project called [your solution name]_1 automatically.
Select Files
Click on the Add button to add the software you want to protect to the current project, you can add software through the file explorer. Once a file has been added you can click Edit to bring up a File Editor window.
This button next to the Source File input box allows you to locate the software you want to protect, or input the software location directly. If there are some data files associated with your software, you can protect these data files by clicking on the Add button to add them into the data files box. The similar button next to the Output Location input box allows you to specify where the protected software will be stored or input the destination folder directly. Click on OK to finalize the file settings for this software. You can add one or more executable(s) or DLL file(s) to each project. To add another program, please repeat the steps described above, you can add zero or more data files associated with one executable or DLL file.
Device Settings
Device Settings consist of:
- Password
- Bind Module
- Bind Time
- Bind HID
- Bind SID
- Background Check
To use a UniKey device to protect your software, you must input the correct password to the UniKey device. Click on Setting next to the password option, and the interface will switch to the Password Setting interface, click on Guide Mode in the top right corner to go back at any time. To enable a setting, just check the option box following the respective setting. When the colour of a check mark ✔ changes to green, the setting is enabled. For more detailed options, click on the Setting button. Settings with a shaded check mark ✔ means that the corresponding setting is not enabled. More settings please refer to #Enveloper Settings.
Use this icon in the progress navigation bar to switch to Device Settings
Password Settings
Enter the correct four passwords, and then continue to next settings or click Guide Mode to switch back to the previous window.
Module Settings
Module settings please refer to #Enveloper Settings, and then continue to next settings or click Guide Mode to switch back to the previous window.
Time Settings
Time settings please refer to #Enveloper Settings, and then continue to next settings or click Guide Mode to switch back to the previous window.
HID Settings
HID settings please refer to #Enveloper Settings, and then continue to next settings or click Guide Mode to switch back to the previous window.
SID Settings
SID settings please refer to #Enveloper Settings, and then continue to next settings or click Guide Mode to switch back to the previous window.
Background Settings
Background settings please refer to #Enveloper Settings. For ease of use, the system provides some default settings, therefore if you want to use the default settings, you can check the option box to enable the function directly. For example, the system will automatically enable background checks by default.
After you have finished with all device settings, click on this icon to begin configuring system settings.
System Settings
System Settings consists of:
- Start Dialog
- Network
- Anti-Debugger, this is enabled by default
- Warning Message
You can choose to enable and configure any protection function by checking the corresponding tick box and clicking on the setting button. If you enable network functionality, you must click on the corresponding setting button to set the server address. Please note that only the UniKey Pro, Time, and Drive support this function.
Click on this icon to go to the final step.
Build Project
The input window displays all the details about your solution. You can check your configuration from this window, and click on the Protect button to execute your software protection with the Enveloper tool.
Professional Mode
Professional Mode provides an interface for advanced users to set the UniKey hardware and system configuration. To switch to Professional Mode, after creating a new solution, click on the Professional Mode button.
Solution
By clicking on the parameters in the solution window, you can start to configure the parameters in the input window directly. After finishing all configurations, click on the protect button to execute protection.