Copyright © 2016
Tag - Key
Good ol' fashioned lock-and-key mechanisms are currently some of the most convenient and decent home security measures you can take. But there's a lot of problems with keys as well: they're bulky, they're loud, they're prone to scratching the screen of electronics, and forget about trying to drop them in your pocket, unless you actually enjoy shanking yourself every time you sit down. Shouldn't there be another way, already? Well, it turns out there is -- the Keyport.
SecuTech Solution this week announced UniKey, a driverless USB security key that functions as a 'hardware version of a password'. Cheap enough to be supplied with new software, the USB dongle is designed to act as a 'key' to both the software EULA and provide user access. Aimed at reducing piracy rates, users of UniKey-enabled software that do not have the correct key plugged in, would be 'locked out' of the application.
Apple today unveiled a firmware fix for MacBook and MacBook Pro owners, remedying some long-standing keyboard issues. The update says it addresses a problem where the computer would ignore the first key pressed after a period of inactivity, also addressing "some other issues", according to the supplied literature. Some users were having similar issues, but related to typing in a text field, regardless of whether or not the computer had been sitting idle.
After many years of having its software not subject to copy protection or digital rights management, Apple may be looking to correct this with a new patent application entitled "Run-Time Code Injection To Perform Checks". PC World reports that the patent, dated December 13th, would be some sort of digital rights management system that would "restrict execution of that application to specific hardware platforms." Apple notes that some users that are proficient at circumventing protection methods could easily bypass dongles or encrypting software if it is worth enough to them, so Apple's approach relies on hardware-embedded cryptographic key mechanism that would inject bits of code into the application's execution stream, generating data that compares the digitally signed code with the DRM module.