010-68421378
sales@cogitosoft.com
Categories
AddFlow  AmCharts JavaScript Stock Chart AmCharts 4: Charts Aspose.Total for Java Altova SchemaAgent Altova DatabaseSpy Altova MobileTogether Altova UModel  Altova MapForce Altova MapForce Server Altova Authentic Aspose.Total for .NET Altova RaptorXML Server ComponentOne Ultimate Chart FX for SharePoint Chart FX CodeCharge Studio ComponentOne Enterprise combit Report Server Combit List & Label 22 Controls for Visual C++ MFC Chart Pro for Visual C ++ MFC DbVisualizer version 12.1 DemoCharge DXperience Subscription .NET DevExpress Universal Subscription Essential Studio for ASP.NET MVC FusionCharts Suite XT FusionCharts for Flex  FusionExport V2.0 GrapeCity TX Text Control .NET for WPF GrapeCity Spread Studio Highcharts Gantt Highcharts 10.0 版 HelpNDoc Infragistics Ultimate  ImageKit9 ActiveX ImageKit.NET JetBrains--Fleet JetBrains-DataSpell JetBrains--DataGrip jQuery EasyUI jChart FX Plus OPC DA .NET Server Toolkit  OSS ASN.1/C Oxygen XML Author  OSS 4G NAS/C, C++ Encoder Decoder Library OSS ASN.1 Tools for C with 4G S1/X2 OSS ASN.1/C# OSS ASN.1/JAVA OSS ASN.1/C++ OPC HDA .NET Server Toolkit OPC DA .Net Client Development Component PowerBuilder redgate NET Developer Bundle Report Control for Visual C++ MFC  Sencha Test SPC Control Chart Tools for .Net Stimulsoft Reports.PHP Stimulsoft Reports.JS Stimulsoft Reports.Java Stimulsoft Reports. Ultimate Stimulsoft Reports.Wpf Stimulsoft Reports.Silverlight SlickEdit Source Insight Software Verify .Net Coverage Validator Toolkit Pro for VisualC++MFC TeeChart .NET Telerik DevCraft Complete Altova XMLSpy Zend Server

Guardant Code

Guardant Code

A family of cross-platform keys for licensing, protection and management of hardware and software products sales. Satisfies the maximum security requirements due to code execution directly inside the protected device.

List of solutions, that include the product

Desktop and server software

Protection of software from reverse engineering

Advantages

Codeinside allows executing part of the code directly inside the dongle to protect mechanisms and provide secure licensing

Cross-platformness ensures the operation of the key in any operating system and on any device equipped with a USB interface

Protected memory prevents unauthorized reading of the license, calling the downloaded code and analyzing the logic of the key operation at the hardware level

Remote update mechanism allows to remotely update the license and downloadable code in the key without the possibility of substituting their data

Secure exchange protocol uses encryption based on unique session keys when transferring data between the application and the hardware key

Models

Guardant Code

The basic model in the classic form factor

Guardant Code Micro

A model in a miniature form factor for use on laptops and tablets

Guardant Code Type-C

A miniature model for use on mobile devices with a USB type-C connector

Guardant Code Net

A model for protecting network software

Guardant Code SD

A model with a removable microSD flash card for software distribution

Guardant Code Time

A model with a battery to limit the software operating time

Guardant Code Time Net

A model with a battery to protect network software and limit its operation time

Guardant Code Embedded

Cross-platform hardware key in the SOM form factor

Key operation scheme

Using the downloadable code

Preparing and loading the code requires the developer to perform several steps:

1. The developer selects arbitrary code in accordance with the task being solved and taking into account the recommendations of Guardant.

2. The loaded code is ported to the C language and converted for use in the hardware key. At this stage, it is possible to embed the use of built-in key functions into the code: call cryptographic algorithms, perform time licensing (for Time keys), write/read data in memory cells, and others.

3. With the help of the GCC compiler and the Guardant SDK utilities, the loaded code is assembled and written to the key memory.

4. After that, the loaded code can be used from a secure application by simply calling the Guardant API functions. In fact, the program code and the key become one.

Application protection scheme

The final application protection scheme depends on the specific task. However, the basic principle can be represented as follows:

·The application is "binded" to the license using automatic protection tools, downloadable code and a special API;

·The license is securely stored in the key memory;

·During operation, the protected application constantly exchanges information with the key. If the key is missing or includes unsuitable or expired license, then the software does not work.

Thus, copying a protected program makes no sense, since without a key it becomes inoperable.

Characteristics

Licensing models

-Perpetual: √

-Number of launches/uses: √

-Limitation on functions/modules: √

-Number of network (competitive) licenses with counting copies of the program / workstations/ connections: for "Net" models

-Limitation of operation time: for "Time" models

-Custom, including a hardware DRM system: √

Security mechanisms

-Unique Key ID: in the key memory and on the case 

-Symmetric AES-128 encryption: √

-Digital signature on ECC160 elliptic curves: √

-Tunnel encryption of exchange protocol traffic: √

-Storing and executing arbitrary code inside a key: up to 20,000 lines in C language

Operating mode

-Supported Drivers: HID, Guardant driver

-Supported OS: any

-Supported platforms: any

-USB interface: 1.1 and above

Memory

-Protected memory for licenses and data: 4 Kbytes

-Protected memory for downloadable code: 128 Kbytes

-Independent flash memory: up to 64 GB in "Code SD" models

-Data storage period (protected memory / flash): from 10 years

-Number of rewrite cycles (protected memory / flash): at least 1,000,000

Clock

-Real-time clock: for "Time" models

-Average battery life: 5 years

-Clock lag: up to 15 minutes per year

Guarantee

-Key: 3 years

-Battery: 1 year

-Independent flash memory: 1 year

Physical characteristics

-Case color (standard): Violet

-Key size:

·Full-size models 47x16x8 mm

·"Code micro" model 18x16x6 mm

·«Code Type-С» model 15x8x8 mm

-Key weight:

·Full-size models 6.3 gr.

·"Code micro" model 4 gr.

·"Code Type-C" model 4 gr.

-Air temperature during storage/transportation:

from -40 to + 70 °C, for "Time" models from +0 to +45 °C

-Air temperature during key operation: from +0 to +45 °C

-Relative humidity of the air: from 0 to 100% non-condensing

 

Quick Navigation;

© Copyright 2000-2023  COGITO SOFTWARE CO.,LTD. All rights reserved