Universal unique hardware ID

Each Rockey 2 dongle contains a globally unique Hardware ID for developers to identify the device. HID is the unchangeable ID that has been burnt into the dongle during production.

Automatic shell encryption tool

The enveloper tool can protect the executable program with well-designed shell encryption technique. No extra developing work is required.

Multiple software programming interfaces

ASM, ASP/PHP, Delphi, PowerBuilder, Python, Fortran, Java, RealBasic, Oracle, SQL2000, FoxPro, VB, VBA, VC, C# and VB.NET etc.

Flexible customizations

We offer complete customization options for to enable the ability of creating your very own Rockey dongle.

Want to know more?

If you wish to request more detailed informations, specifications, quotations, or have any questions regarding FEITIAN Cost-effective Software Protection products, please feel free to contact us.