In general terms the system’s principle of operation looks as follows:

  • The protected application accesses the dongle, which should be connected to the computer
  • The dongle returns some information to the application
  • The application identifies the dongle using this information. If the dongle contains valid parameters, the application continues to operate. If the dongle’s parameters are invalid (not the right dongle) or the dongle is missing, the protected software application halts

  • No labels