Cryptographic algorithms Electronic signature based on elliptic curves ECC Why you need Guardant Code Guardant Code dongle is a trusted hardware platform that allows the execution of arbitrary custom code outside the CPU and RAM of the computer that is running a protected application. It sets a new level of security through a hardware implementation of digital signature and tunneling encryption of the communication protocol between the dongle and the protected application. Online Order Where to Buy Terms. Requirements of customers towards computer hardware differ relying on their needs.
|Date Added:||24 February 2016|
|File Size:||59.41 Mb|
|Operating Systems:||Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X|
|Price:||Free* [*Free Regsitration Required]|
Hashing based on SHA Download free driver for Guardant Stealth II USB dongle XP W2k3 XP64 W2k3x64 If You cannot find the appropriate driver for your operating system you can ask your question to the users of the service in our section of questions and answers or contact our support team at http: Guardant Stealth USB dongle. Cryptographic algorithms Electronic signature based on elliptic curves ECC Thus, the copying of protected software is meaningless because without a dongle it becomes unusable.
Provides protection at the level of local dongles by uusb end-to-end traffic encryption and secure license server.
The protective mechanism of loadable code is based on the fact that the algorithm programmed into the dongle by the developer processes useful data obtained in the course of running the application.
Hardware platform bit Cortex-M3 microcontroller.
Built-in 4KB of protected memory expand the possibilities for building flexible protection schemes. It was designed to protect and license software on Windows.
Two Thunderbolt 3 interfaces and the latest Intel Optane memory are expected to be supported. The dongle contains hardware-implemented digital signature algorithms based on elliptic curve cryptosystems and AES encryption.
Download Guardant Stealth II USB dongle Computer Driver Update
Thanks to its high-speed hardware platform, Guardant Code dongles guardqnt execute arbitrary custom code in their memory in the memory of the microcontrollerthus reliably protecting intellectual property from reverse engineering, and the application from gaurdant copying. Working in HID mode without additional drivers.
Hashing based on GSII Automatic protection of Win32 and. Secure remote memory update of the dongle is supported. Tools for protection of Java applications. Net II provides a cost-effective approach allowing developers to distribute more than one license a dongle. Tunnel encryption of the communication protocol traffic. Search for drivers by ID or device name Known devices: Requires no change in protected software and works seamlessly.
Guardant Stealth II is a fast dongle with basic functionality. The technologies implemented in Guardant Sign dongles and software enable you to create a highly complex protection system, the hacking of which will be either impossible or economically unfeasible.
Guardant Stealth/Net II USB dongle driver free download for windows – ASUSTeK – M50Vm
Various modifications of Guardant Sign dongle considerably broaden the scope of its application. There is bytes of non-volatile memory to store cryptographic keys, to which protected applications are bond.
The micro dongle features a LED for indication of operating modes and protrudes from a computer by only 5mm when connected. Meanwhile, the fast hardware platform guarantees high-speed data transmission over a secure channel that implements tunnel encryption of traffic between the loadable code and the user application.
How does Guardant Code work Thanks to its high-speed hardware platform, Guardant Code dongles can execute arbitrary custom code in their memory in the memory of the microcontrollerthus reliably protecting intellectual property from reverse engineering, and the application from illegal copying.
Has a LED light with diagnostic purposes. The highest degree of protection Moving executable useful custom code into a dongle makes the device and the application a single entity, the hacking of which involves complexity and dpngle several hundred thousand dollars.
LED control, calls of hardware algorithms, implementing usage time based licensing for Time dongles, etc. A miniature form-factor of a Stealth II dongle. Guardant SDK includes all the necessary tools and instructions stealt compile the code and load it into the dongle, together with examples of loadable code and samples of incorporation into a protected application.