Meanwhile, the fast hardware platform guarantees high-speed data transmission over a secure channel that implements tunnel encryption of traffic between the loadable code and the user application. Guardant Stealth II is a dongle with basic features. Online Order Where to Buy Terms. Cryptographic algorithms Electronic signature based on elliptic curves ECC Replugged, restart server and client – no result. May be i can help to analyze?

Uploader: JoJomuro
Date Added: 10 October 2018
File Size: 8.30 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 67545
Price: Free* [*Free Regsitration Required]

The dongle contains bytes of protected memory, which is enough for license data storage and for the creation of several algorithms with different encryption dongles.

You need activate support of JavaScript and Cookies in your browser. It sets a new level of security through a hardware implementation of digital signature and tunneling encryption of the communication protocol between the dongle and the protected application.

Pseudo-code and obfuscation of protection components. In general, dongle-based protection works as follows: Tools for protection of Java applications. There was an error downloading, HTTP response code said error A high-speed, cross-platform dongle with built-in real-time clock and self-contained power supply.

A dongle is intened for software licensing, protection, and distribution for Windows and Linux platforms. Tunnel encryption of the communication protocol traffic. How can i act guaddant dongle to get any responses and sent it to you? It is used for software protection based on its symmetric encryption functionality. Hashing based on GSII New generation cross-platform USB dongle with real time clock, asymmetric cryptography, AES hardware implementation, and the ability to work without drivers.


Seller of software can issue new license through the internet — as easy as copy-pasting an email. The device is intended for licensing advanced software with time limits. Used for protection and time-based licensing of standalone software applications. Custom code is selected and prepared to be moved to the dongle. The loaded code can be used from the protected application by simply calling Guardant API functions. gurdant

The processed data can be used directly in the application, without validity checks which, as a rule, are reduced to one or two assembler instructions. Now Stealth II is being produced on the fast bit Cortex-M3 microcontroller with bytes of non-volatile memory. Secure remote memory update of the dongle is supported.

Therefore it cannot be enumerated by virtualhere, im not sure what else can be done, it looks like that dongle wont work Guardant Time dongles are easily updated remotely. LED control, calls of hardware algorithms, implementing usage time based licensing for Time dongles, etc.


Guardant Stealth II

Tools for protection of Java applications. Flash dongles enable the guagdant distribution of portable software.

The dongle is built on a high-speed bit RISC processor. Replugged, restart server and client – no result.

Guardant Anti-piracy Protection System

Tools for protection of Java applications. Guardant Sign is a leading edge dongle that protects software from illegal copying. A modern dongle for efficient protection and licensing of software running in computer networks. Li battery 3 to 5 years of use.

Working in HID mode without additional drivers. Automatic protection of Win32 and. Basic dongle with unique ID and of user memory. Functionality Support for RTC restrictions.