Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • The protected application accesses the dongle, which should be connected to the computer
  • The dongle returns some information to the application
  • The application identifies the dongle using this information. If the dongle contains valid parameters, the application continues to operate. If the dongle’s parameters are invalid (not the right dongle) or the dongle is missing, the protected software application halts

Image Added