May 23, 2019 posted by

Specialized dongle with a built in high-capacity battery and real-time clock. In general, dongle-based protection works as follows: Scenarios include leasing, renting, trial versions, credit sell, timed cloud access and much more. Time dongles have all the advantages of Sign with the addition of time licensing. Hardware platform bit Cortex-M3 microcontroller.

Uploader: Dugis
Date Added: 14 July 2014
File Size: 34.88 Mb
Operating Systems: Windows NT/2000/XP/2003/2003/7/8/10 MacOS 10/X
Downloads: 58205
Price: Free* [*Free Regsitration Required]

Guardant Net II is a dongle with the basic guardant stealth net ii for guardant stealth net ii protection of network software on Windows.

The efficiency of stealhh is ensured by the use of the GSII64 hardware encryption algorithm. Tools for protection of Java applications.

All Products / Products / Guardant Europe

Using a special adapter for the motherboard, you can install Guardant Sign inside the CPU, making protection as transparent as possible for the supply of ready software and hardware solutions. New generation cross-platform USB dongle with real time clock, asymmetric cryptography, AES hardware implementation, and the ability to work without drivers.

Tools for protection of Java applications. Who is Guardant Stealth II for? Supports all features of Guardant Sign Net, and in addition, contains a real-time clock and an independent power supply.

Hardware platform bit Cortex-M3 microcontroller. Guardant Stealth II is a widely used dongle for software protection against piracy and unauthorized use. Basic dongle with unique ID and of user memory. The solution is easy to deploy and easy to operate for end users.


Cryptographic algorithms Electronic signature based on elliptic curves ECC There is also a network edition dongle called Guardant Net II. A miniature form-factor of a Stealth II dongle. Working in HID mode without additional drivers. Has a LED light with diagnostic purposes. It is perfect for protection and distribution of software, and requires no drivers or additional software to work when combined with steapth HID mode of Guardant Sign dongle.

May provide dual licensing: A dongle is intened for software licensing, protection, and distribution for Windows and Linux platforms.

Cryptographic algorithms Electronic signature based on elliptic curves ECC This subline of Guardant guardant stealth net ii fuardant designed for efficient protection and licensing of network software, including usage time based licensing.

Network dongles allow you to create floating licenses, in which case a user does not guardant stealth net ii to carry a local dongle to run the protected application: There is bytes of non-volatile stealrh to store cryptographic keys, to which protected applications are bond. It is possible to upgrade dongle memory remotely in a secure way to change the license capacity of a dongle or the time limit for usage guardant stealth net ii based license. All the memory has hardware stfalth stelth invasion srealth.


Secure remote memory update of the dongle is supported. Micro dongles are ideal for use in laptops and tablets.

Guardant API / Software Protection / Solutions / Guardant Europe

Its operating speed is several times higher than that of previous generation dongles. The device is aimed at users of laptops, netbooks, and tablets. It has a number of cryptographic algorithms including tailor-made GSII64 or bit key for symmetric encryption. Stea,th protection of Win32 and. Net II provides a cost-effective approach allowing developers to distribute more than one license a dongle.

Guardant API

Provides protection at the level of guardant stealth net ii dongles by using end-to-end traffic encryption and secure license server. The flagship of the network dongles line. A dongle for software licensing, protection, and distribution with Windows and Linux support.