010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Guardant: Guardant Sign

Guardant: Guardant Sign

A family of classic hardware keys for licensing and protection of software in Windows, Linux and macOS operating systems.

List of solutions, that include the product

  • Desktop and server software
  • 1C configurations
  • Protection of software from reverse engineering
  • Software sales management

Advantages

Protected memory prevents unauthorized reading/modification of license, debugging and analysis of the logic of the key at the hardware level.

Remote update mechanism allows to update a license key remotely without the possibility of substituting license parameters.

Secure exchange protocol uses encryption based on unique session keys when transferring data between the application and the hardware key.

Models

Guardant Sign

The basic model in the classic form factor.

Guardant Sign micro

A model in a miniature form factor for use on laptops and tablets.

Guardant Sign SD

A model with a removable microSD flash card for software distribution.

Guardant Sign Net

A model for protecting network software.

Guardant Time

A model with a battery to limit the software operating time.

Guardant Time Net

A model with a battery to protect network software and limit its operation time.

Key operation scheme

Application protection scheme

The final application protection scheme depends on the specific task. However, the basic principle can be represented as follows:

  • The application is "linked" to the license using automatic security tools or a special API;
  • The license is securely stored in the key memory;
  • During operation, the protected application constantly exchanges information with the key. If the key is missing or includes unsuitable or expired license, then the software does not work.

Thus, copying a protected program makes no sense, since without a key it becomes inoperable.

Principle of network protection

The mechanism for protecting and licensing applications in the network is as follows:

  • A special intermediary program, the Guardant network license manager, is installed on a dedicated server or workstation;
  • A network hardware key is installed on the same server or station;
  • The application is protected either with the help of automatic protection tools or with the help of the Guardant Licensing API;
  • The license manager and the key will strictly control the number of connections according to the licenses programmed by the developer.

Data protection in the network protocol is carried out at the hardware level, that is, it is encrypted on session keys generated between the protected application and the electronic key without any intermediaries.

Characteristics

Licensing models

-Perpetual: √

-Number of launches/uses: √

-Limitation on functions/modules: √

-Number of network (competitive) licenses with counting copies of the program / workstations/ connections : for "Net" models

-Limitation of operation time: for "Time" models

-Custom: √

Security mechanisms

-Unique Key ID: in the key memory and on the case √

-Symmetric AES-128 encryption: √

-Digital signature on ECC160 elliptic curves: √

-Tunnel encryption of exchange protocol traffic: √

Operating mode

-Supported Drivers: WinUSB, HID, Guardant driver

-Supported OS:

  • x86 and x64 versions of Windows XP and above
  • x86 and x86_64 versions of Linux
  • macOS

-USB interface: 1.1 and above

Memory

-Protected memory for licenses: 57 Kbytes

-Independent flash memory: up to 64 GB in "Sign SD" models

-Data storage period (protected memory / flash): 10 years

-Number of rewrite cycles (protected memory / flash): at least 1,000,000

Clock

-Real-time clock: for "Time" models

-Average battery life: 5 years

-Clock error: up to 15 minutes per year

Guarantee

-Key: 3 years

-Battery: 1 year

-Independent flash memory: 1 year

Physical characteristics

-Case color (standard)

·green for Sign models

  • black with green inclusion for Sign micro models
  • blue for Time models

-Key size

  • Full-size models 47x16x8 mm
  • "Sign micro" model 18x16x6 mm

-Key weight

  • Full-size models 6.3 gr.
  • "Sign micro" model 4 gr.

-Air temperature during storage/transportation

from -40 to + 70 °C, for "Time" models from +0 to +45 °C

-Air temperature during key operation

from +0 to +45 °C

-Relative humidity of the air

from 0 to 100% non-condensing

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved