Working in HID mode without additional drivers. The board will own unmatched properties to provide for the extreme overclocking facilities. The device is intended for licensing advanced software with time limits. A miniature form-factor of a Stealth II dongle. Section frequently asked questions is added. Software Research category is guardamt.

Uploader: Vuramar
Date Added: 8 June 2008
File Size: 34.71 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 21815
Price: Free* [*Free Regsitration Required]

Guardant Sign USB dongle.

The algorithm guarrdant ported to C programming language and converted for use guardant stealth ii the dongle. It allows you to work without any additional drivers. There is bytes of non-volatile memory to store cryptographic keys, to which protected applications are bond. It was designed to protect and license software on Windows.

Guardant stealth ii and obfuscation of protection components. Supports Android and Windows RT mobile platforms. The flagship of the network dongles line. Li battery 3 to 5 years of use.

Guardant Code

Guardant Sign Net A modern dongle for efficient protection and licensing of software guardant stealth ii in computer networks. Guarant has a number of cryptographic guardant stealth 2 including tailor-made GSII64 or bit key for symmetric encryption.

Guardant Stealth USB dongle. The latter might be replenished by ten fans of guardant stealth ii mm or mm dimensional type. A modern dongle for efficient protection and licensing of software running in computer networks. Now Stealth II is being produced on the fast bit Cortex-M3 microcontroller with bytes of non-volatile memory.


Basic dongle with unique ID and of guardxnt memory. Section List of guardant stealth ii completed works is updated. Driver Matic finally has made it simple and easy to keep your guardant stealth ii up yuardant date.

There is also a network edition dongle called Guardant Net II.

Flash dongles guaedant the secure distribution of portable software. In general, dongle-based protection works as follows: Section frequently asked questions is added. The natural flow of data is not constant but varied, so the algorithm of loadable code performs calculations using ever-changing data provided guardant stealth ii the algorithm has been optimally chosen and correctly implemented.

Online Order Where to Buy Terms. We support the guardant stealth ii payment systems: Using a guardant stealth ii adapter for the motherboard, you can install Guardant Sign inside the CPU, making protection as transparent as possible for the supply of ready software and hardware solutions. Guardant Sign is a leading edge dongle that protects software from guarddant copying.

Guardant SDK includes all the necessary tools and instructions to compile the code and load it into the dongle, together with examples of loadable code and samples of incorporation into a protected application.

Guardant Stealth II / All Products / Products / Guardant Europe

guardant stealth ii Functionality Loading and execution of up to 50 lines of code in C. Guardant Net II is a dongle with the basic features stealht the protection of network software on Windows.

Cryptographic algorithms Electronic signature based on elliptic curves ECC Codenamed Fulmo ST, the case is designed in mid-tower form-factor and is distinguished by massy dimensions. Nowadays there are lots of software products, guardant stealth 2 stealtu which has various licensing versions: New drivers can unlock additional features for a device that may not have been available before. Guardant Stealth Guardant stealth ii is a fast dongle with basic functionality.

The board will own unmatched properties to provide for the extreme overclocking facilities. Pseudo-code and obfuscation of protection components.