Guardant Code
A family of cross-platform keys for licensing, protection and management of hardware and software products sales. Satisfies the maximum security requirements due to code execution directly inside the protected device.
List of solutions, that include the product
Desktop and server software
Protection of software from reverse engineering
Advantages
Codeinside allows executing part of the code directly inside the dongle to protect mechanisms and provide secure licensing
Cross-platformness ensures the operation of the key in any operating system and on any device equipped with a USB interface
Protected memory prevents unauthorized reading of the license, calling the downloaded code and analyzing the logic of the key operation at the hardware level
Remote update mechanism allows to remotely update the license and downloadable code in the key without the possibility of substituting their data
Secure exchange protocol uses encryption based on unique session keys when transferring data between the application and the hardware key
Models
Guardant Code
The basic model in the classic form factor
Guardant Code Micro
A model in a miniature form factor for use on laptops and tablets
Guardant Code Type-C
A miniature model for use on mobile devices with a USB type-C connector
Guardant Code Net
A model for protecting network software
Guardant Code SD
A model with a removable microSD flash card for software distribution
Guardant Code Time
A model with a battery to limit the software operating time
Guardant Code Time Net
A model with a battery to protect network software and limit its operation time
Guardant Code Embedded
Cross-platform hardware key in the SOM form factor
Key operation scheme
Using the downloadable code
Preparing and loading the code requires the developer to perform several steps:
1. The developer selects arbitrary code in accordance with the task being solved and taking into account the recommendations of Guardant.
2. The loaded code is ported to the C language and converted for use in the hardware key. At this stage, it is possible to embed the use of built-in key functions into the code: call cryptographic algorithms, perform time licensing (for Time keys), write/read data in memory cells, and others.
3. With the help of the GCC compiler and the Guardant SDK utilities, the loaded code is assembled and written to the key memory.
4. After that, the loaded code can be used from a secure application by simply calling the Guardant API functions. In fact, the program code and the key become one.
Application protection scheme
The final application protection scheme depends on the specific task. However, the basic principle can be represented as follows:
·The application is "binded" to the license using automatic protection tools, downloadable code and a special API;
·The license is securely stored in the key memory;
·During operation, the protected application constantly exchanges information with the key. If the key is missing or includes unsuitable or expired license, then the software does not work.
Thus, copying a protected program makes no sense, since without a key it becomes inoperable.
Characteristics
Licensing models
-Perpetual: √
-Number of launches/uses: √
-Limitation on functions/modules: √
-Number of network (competitive) licenses with counting copies of the program / workstations/ connections: for "Net" models
-Limitation of operation time: for "Time" models
-Custom, including a hardware DRM system: √
Security mechanisms
-Unique Key ID: in the key memory and on the case
-Symmetric AES-128 encryption: √
-Digital signature on ECC160 elliptic curves: √
-Tunnel encryption of exchange protocol traffic: √
-Storing and executing arbitrary code inside a key: up to 20,000 lines in C language
Operating mode
-Supported Drivers: HID, Guardant driver
-Supported OS: any
-Supported platforms: any
-USB interface: 1.1 and above
Memory
-Protected memory for licenses and data: 4 Kbytes
-Protected memory for downloadable code: 128 Kbytes
-Independent flash memory: up to 64 GB in "Code SD" models
-Data storage period (protected memory / flash): from 10 years
-Number of rewrite cycles (protected memory / flash): at least 1,000,000
Clock
-Real-time clock: for "Time" models
-Average battery life: 5 years
-Clock lag: up to 15 minutes per year
Guarantee
-Key: 3 years
-Battery: 1 year
-Independent flash memory: 1 year
Physical characteristics
-Case color (standard): Violet
-Key size:
·Full-size models 47x16x8 mm
·"Code micro" model 18x16x6 mm
·«Code Type-С» model 15x8x8 mm
-Key weight:
·Full-size models 6.3 gr.
·"Code micro" model 4 gr.
·"Code Type-C" model 4 gr.
-Air temperature during storage/transportation:
from -40 to + 70 °C, for "Time" models from +0 to +45 °C
-Air temperature during key operation: from +0 to +45 °C
-Relative humidity of the air: from 0 to 100% non-condensing
© Copyright 2000-2023 COGITO SOFTWARE CO.,LTD. All rights reserved