HID dongle/shell-type case. The API, which serves as a point of contact with users, comes with long-term support guarantees while being gradually improved.
We have released an HID-type dongle that does not require a dedicated driver. It also features a shell-type case that resolves contact issues between the connector and the main body, which can cause problems when using USB keys. Currently, HID dongles and shell-type cases have become the de facto industry standard. While we continue to make gradual improvements to the hardware, we also guarantee long-term compatibility for the APIs that affect user programs. The API incorporated into programs at the time of the domestic release in 2005 can still be maintained with the current API. The maintenance costs associated with program protection using dongles are reduced due to the long-term compatibility guarantee. The SDK is included as standard. It supports Windows, Linux, and Mac. One Matrix key can be used with various versions of Windows, Linux, and Mac programs. A network API is included for small LAN support. The dongle cannot be operated by OS functions. There is no need to worry about virus infections. Additionally, there is no need for extraction operations; it can be removed at any time. Our company develops and provides authentication products using the Matrix USB key, and we have accumulated the know-how necessary for product support, including usage instructions, precautions, and stability.
Inquire About This Product
basic information
Two sizes are available: standard and short type. The specifications other than physical size are the same. Security and usability are well balanced. Increasing security can make operations cumbersome and difficult to use. The specifications maintain security while ensuring good usability. No login operation is required to access the USB key. Each USB key has a user-specific user code. The user code functions like a PIN for accessing the key. Since the firmware differs for each user, the user program will only operate with the user's Matrix key. Each USB key is also assigned a key-specific serial number. If you continuously scan to find the user code, the Matrix key will become unusable due to the hacker lock feature. Inside the dongle, 128-bit symmetric key encryption/decryption is performed, and the key cannot be extracted outside the dongle. The dongle's internal memory, which varies by model (64/316 bits), is used as a secure and portable storage area for data. Data can be securely stored using only API operations.
Price information
Example: MLU-60 4500 yen (1-9 pieces), 3700 (10-99 pieces)
Price range
P1
Delivery Time
※The price varies depending on the quantity and model.
Applications/Examples of results
【Uses】 ○ Program protection ○ Authentication ○ Secure data storage Protecting a program involves the issue of who is allowed to use the program. The Matrix Software Protection System provides the functionality to authenticate that individual. Since authentication is a fundamental feature, it can also be applied to user authentication in addition to program protection. Our company has applied it to Windows login authentication and web authentication products. Securely storing data used in application software can be cumbersome. When storing on a hard disk (files/registry), it must overcome limitations such as being accessible to anyone, and if permission settings are applied, the program may not retain those permissions. By using a dongle, all of this can be cleared with just a few lines of API calls. Furthermore, the data is portable. The Matrix API is lightweight, stable, and user-friendly because it is specialized for Matrix keys, eliminating the need for the versatility of standard cryptographic key specifications like PKCS#11, which lowers the implementation cost and barriers to entry.
catalog(1)
Download All CatalogsCompany information
Contributing to the common computing infrastructure and providing tools/support/services to protect the unique core assets of each company/individual, thereby contributing to sustainable activities based on core assets.