Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Guardant makes it possible to create protection systems of any level of complexity. Guardant software provides effective tools for ensuring protection of any software product.

The tamperproofness and reliability of protection directly depend on the level of elaboration and correctness of protection system implementation. Here we describe the main actions that you need to perform in order to properly apply a protection system.

Dongle-based protection systems can perform a range of checks of various degree of complexity. The most elementary are verifications of the dongle’s presence with a range of preset attributes. These can be performed fast and rather frequently.

More complex checks use the encryption of the information with the use of dongles. Since a dongle is an intelligent device, it can perform the encryption of information using special algorithms.

Developers of a protection system can create algorithm descriptors and record those into dongle memory by themselves using the programming utilities (except for Guardant Fidus dongles). This is what makes every protection system using algorithms unique.

Guardant software supports two methods of protection:

  • Automatic protection of executables
  • Protection using Guardant API