2 Application Encryption and Decryption Operation Procedures

2.1 Application and Game Encryption and Decryption Operation Environments

1.Check whether the version of the Pico encryption tool software at the PC terminals V2.0.3 and above (Link: https://drive.google.com/open?id=1m8DMg2YlDE97KJZXFnRf6_iXF5vN9xTs).

2.Ensure that the applications & games are developed using Pico SDK (http://us-dev.picovr.com/sdk).

3.Ensure that the developers participated in, and designed the UI prompts or pictures corresponding to the cases where there is not a key, the key is wrong or the authorized period has expired.

4.Download the encryption resource package. Click here to obtain the download link. Add it to the Unity project (now only U3D is supported).

2.2 Requirements of typical application scenarios of application encryption.

2.2.1 Encrypting applications & games.

1) Place the encryption resource package into the Unity project.

2) Call the UPvr_checkDevice function in the unity script, enter the package name of the project to be packaged.

3) Design the corresponding interface and prompt text based on the feedback value. Please see Descriptions on Application & Game Encryption Feedback Values for the details.

4) When encapsulating or packaging an application & game, ensure that the package name is consistent with the package name used when generating the key in the encrypt tool.

2.2.2 Generating encryption key files for encrypted applications & games.

Because the encryption demands for VR applications and games are mainly concentrated at the binding to the VR equipment and the authorization period, so we also placed the application & game key generating function to the Pico encrypt tool. The package name is used for the generation of the key file bound to the authorized equipment for the application. Similarly, you need to click the “+” button and add the package name of the encrypted application to the list.

Then select the package name of this application & game and generate the key for the application & game. Please see the figure below for the specific operation procedures.

_images/2.PNG

1) Click to show the Generating Key interface.

2) Select the corresponding authorized equipment data base.

3) Select the required authorization period.

4) Select the password protocol at “Generating Key for Encrypted Application” and click the generating authorization key button (multiple).

5) Check the operation record to ensure that the key has been successfully generated.

6) Manually copy the key to the co_AppData directory (which needs to be manually created) in the root directory of the VR integrated player. Then it can be used as normal. (UDP directory: /storage/emulated/0/Pico_AppData)