end of illegal copies

18

Upload: vatari-corporation

Post on 07-Jul-2015

820 views

Category:

Investor Relations


0 download

DESCRIPTION

Our inspiration came from the world of humans. No two human individuals are composed of exactly the same genetic DNA profile which is a fact we like. We have been working on applying this process on our protection software for the past 6 years. It means your software is going to have a revolutionary protection based on its own unique protection mechanism similar to human's DNA. There is no Human Clone, there will be no Software Copy with Vatari. Vatari redefines how we think of software. The term Copy stops existing. The world will be full of originals. Let`s enter the future standard of protection.

TRANSCRIPT

Page 1: End of illegal copies
Page 2: End of illegal copies

We believe we can change how people think of software and their own value in this world. Our

inspiration came from the world of humans.

Vatari is the Future standard of protecting software

Page 3: End of illegal copies

Some of the DRM software used today includes

SecuROM Starforce SafeDisc / Safecast XCP (Extended Copy Protection) Tages Solidshield Ubisoft’s new Online Services Platform Metafortress

Page 4: End of illegal copies

• Most of it doesn’t last past few hours after the title launch • Some are extremely easy to bypass through key generators or cracked executables • Some put limits on the opportunity to play • They all have limited management possibilities • The toughest ones give publisher bad PR

• The best ones ensure at least few days of pirate less sales after launch

Page 5: End of illegal copies

• Simple installation code dependency • Centralized control point of protection • Heavy generality throughout the protection. • Identifiable protected parts in the code. • Relying on the cracker’s low skills. • Expecting that crackers will give it up soon. • Trying to outsmart the smartest guys in the field. • Protections are designed as layers. • No experience-based deterring system. • No unique copy-per-customer technology.

Page 6: End of illegal copies

• Doesn’t use centralized point of protection (easiest point to crack into an application protection layer)

• Doesn’t need original source code to be able to morph protection into it (injects the protection code on the level of raw PE and PE+ executable)

• Creates unique executables for each machine game should be played on

• Creates symbiotic code with original application and is nearly impossible to detect (and hence remove from) there

Page 7: End of illegal copies

• Extremely flexible management and configuration tools (e.g. proper “no. of installs” solution)

• Character of the protection makes the cracker to manually reverse engineer it in order to remove all the protection (estimates based on currently running test = 10-12 months)

• No online bugging the consumer after the installation is finished

• However needs one time online activation (but we have “offline” solution too)

Page 8: End of illegal copies

• Doesn’t use centralized point of protection (easiest point to crack into an application protection layer)

• Doesn’t need original source code to be able to morph protection into it (injects the protection code on the level of raw PE and PE+ executable)

• Creates unique executables for each machine game should be played on

• Creates symbiotic code with original application and is nearly impossible to detect (and hence remove from) there

Page 9: End of illegal copies

!"#$%#&'(%)*%+,)-+. ! " " " " " " !"#$%&'#(/0"1%2"(.3%4&5.0 ! " " " )#*"&%+&#,%+(%%,%, " " !"#$%&'#(

6",5&7%8$.&3(%!,9),. ! " " " " " " !"#$%&'#(:&%;<=<><%3.-+)3.5 ! )%&*-./+!0+#(12 !+3!"#0&'4%+#(125 " ! ! ! !"#$%&'#(

?&0(7&3'$)*7 ! " " " " " " !"#$%&'#(4&&,@"0A%*1."01$%#&5. ! " " " " " " !"#$%&'#(

?"**)B.%'3&1.#C&,%&D.3.5 ! " " " " " " !"#$%&'#(/&3.,*)#%)5.,CE#"C&, !+3&"6&7+"%898':1%5 " " " " " " !"#$%&'#(<)3.#1%?!=?!F%),G.#C&, ! ;/+%(<9(%+*8%, ;/+%(<9(%+*8%, )#*"&%+&#,%+(%%,%, )#*"&%+&#,%+(%%,%, =>0 ;9"$*61+?91%+)28$%@ !"#$%&'#(H,C5.I+9%J%H,C.7+0 AB$"%@%12+8$"#(< -9,9&*1#*8 0,46(&%, -9,9&*1#*8 A682 -9,9&*1#*8 -9,9&*1#*8 !"#$%&'#(

:&%),1.3,.1K%H#CB"C&,%'&**)I0.L !+3C#+0&'46$#"5 " " =>0 " =#+D62E " !"#$%&'#(6."#CB"C&,*%"*%,..5.5 !+3@6F#"+6(,+@9(#"5 .(12+G+6(,+$H6$I8+9$E J9@9$%, =>0 " =>0 =>0 !"#$%&'#(?0"(),9%&,%5)D.3.,1%?;* !+3K"64%1+@#,%5 G+'@%8+#(12L " =>0 " ! ! !"#$%&'#(

M,*1",1%83)"0%7&5. ! " " " " MH%(+&"6&7%,+N5 ! !"#$%&'#(N%?"3.,1"0%;&,13&0 ! " " " " " " !"#$%&'#(%%N%H0.31%O(*1.7 ! " " " " " " !"#$%&'#(

%N%P.&2&#"C&,%H0.31 ! " " " " " " !"#$%&'#(N%6.7&1.%2&G"#A ! " " " " " " !"#$%&'#(

QOM<%5"1"I"*.%*+''&31 ! " " " " " " !"#$%&'#(6.R.3"0*%",5%4&CB"C&,* !+3#O'#(615 " " " " " " P98$"9:*'#(

;&3'&3"1.%*&0+C&,* ! " !"#0&'4%+#(12 " " " " !"#$%&'#(QOS%2"+,#$%8&A.,%A.( !+3;9O%"+7%2Q+#O$L5 " " " " " " !"#$%&'#(O&#)"0%,.1@&3A),9 !+3"%6,2+R#"+"%R%"6185 " " " " " !6"'6112 P98$"9:*'#(N;0&+5%*1&3"9. !+36(2+S1%5 " " " " !6"'6112+3864%8+#(125 ! T#@R#"$

<)9)1"0%O13),9%8.#$&0&9( !+3R*112+8*OO#"$%,5 " " " " " " !"#$%&'#(?T?%:.1@&3A*%+C0)U"C&, !+3#O'#(615 " " " " " " P98$"9:*'#(S)18&33.,1%+C0)U"C&, !+3#O'#(615 " " " " " " P98$"9:*'#(

<.#.,13"0)U.5%5)*13)I+C&, !+3P)K+$%&H(#1#<25 " " " " " !6"'6112+3P;PQ+)$%6@5 P98$"9:*'#(N%VV%.(+&19%($8+,%@6(,

U86<%O1."7@&3A*

;&7'"3.%>H8H6M%",5%/..0%O.#+3.

?%6$*"%8 >"1"3) O.#+6W4 O1"3R&3#. 8"9.* 4.1"R&313.** QSM'0"(

Page 10: End of illegal copies

  Standard “wrapper” protection   Creates additional protective layer for the

application   All IN/OUT operations are redirected through

own IDT table that creates zombie controlled application layer

  Vulnerability in operating memory, where it’s easy to trace frequent routine jumps to centralized control area

  Typical protection that lasts about 6 hours

Page 11: End of illegal copies

  Most similar to Vatari, however…   Needs application source code to create

injected protection layer   Uses centralized point of protection and

libraries for digital signing, CRC32 control, memory control (CRC32 control can be switched of, integrity control module can be disabled too – both typical starting points for any cracker)

Page 12: End of illegal copies
Page 13: End of illegal copies

• New ground-breaking technology that learned from the mistakes of the currently used protections

• Difficult to break, and breaking one doesn’t create generally usable crack solution

• Easy on consumer, especially compared to SecuROM or Ubi protection

• Great for both online and offline distribution

• We promise you wouldn’t regret trying it!

Page 14: End of illegal copies

Gamster Center  Desktop client for end-user  Allows complete management of games/applicatiopns portfolio  Do we have web interface?

Torrent support  Cost efficient data/content distribution  Own torrent client  Integrated Seed2See motivational program (seed and get points to buy DLC or bonuses)

Page 15: End of illegal copies

Cloud Storage  Mirroring of selected files/folders on the server  E.g. saved positions for those who travel or simply use more computers

Trial functions for games/applications  Vatari allows limited number of starts, time limited (as play time or as calendar time)

Viper USB Key  HW login into user account, allows installing and playing games on other computers as long as USB is inserted  “offline” activation of games/applications

Page 16: End of illegal copies

Parental lock  Allows e.g. set number of hours a game can be played every day  Includes alert system, that provides email alerts to parents about played games  Includes LoJack, remote disabling of game/application on specific account or computer

Travel & Play  Allows simultaneous installations on more devices, but play only on one at a time

Social networking  Twitter / Facebook updates

Page 17: End of illegal copies

USID system  Application on each machine is unique  This allows forensic identification, passive software protection, also identification for call center, etc.

Page 18: End of illegal copies

[email protected] www.vatari.com

00 421 915 104 103