Guardant Code

Guardant Code is a high-performance dongle with built-in cryptographic algorithms up to 384KB of memory to store loadable code. It is a trusted hardware platform that allows the user to execute arbitrary custom code within the dongle. Designed for the protection, licensing, and distribution of cross-platform software for Windows, Linux, and OS X. Supports Android and Windows RT mobile platforms. The dongle is built on a high-performance (120 MIPS) 32-bit ARM7 microcontroller. It allows you to work without any additional drivers.

  • Models
  • Description
  • Features
  • Advantages

Guardant Code

New generation cross-platform USB dongle with real time clock, asymmetric cryptography, AES hardware implementation, and the ability to work without drivers. Allows you to automatically bind application licenses to the astronomic time.

Guardant Code Micro

A full-featured Guardant Code dongle equipped with a RTC and a batery. The device is intended for licensing advanced software with time limits. Has all the features of both Code and Time dongles.

Guardant Code Time

A full-featured Guardant Code dongle equipped with a RTC and a batery. The device is intended for licensing advanced software with time limits. Has all the features of both Code and Time dongles.

Why you need Guardant Code

Guardant Code dongle is a trusted hardware platform that allows the execution of arbitrary custom code outside the CPU and RAM of the computer that is running a protected application. The dongle has up to 384KB of memory to store loadable code, 20KB RAM, and effectively presents itself as a minicomputer based on Cortex-M3, an ARM-based 32-bit microcontroller.

The protective mechanism of loadable code is based on the fact that the algorithm programmed into the dongle by the developer processes useful data obtained in the course of running the application. The processed data can be used directly in the application, without validity checks which, as a rule, are reduced to one or two assembler instructions. The natural flow of data is not constant but varied, so the algorithm of loadable code performs calculations using ever-changing data provided that the algorithm has been optimally chosen and correctly implemented.

How does Guardant Code work

Thanks to its high-speed hardware platform, Guardant Code dongles can execute arbitrary custom code in their memory (in the memory of the microcontroller), thus reliably protecting intellectual property from reverse engineering, and the application from illegal copying.

  1. Custom code is selected and prepared to be moved to the dongle.
  2. The algorithm is ported to C programming language and converted for use in the dongle. At this stage it is possible to use any features of the Guardant Code dongle: LED control, calls of hardware algorithms, implementing usage time based licensing for Time dongles, etc.
  3. Using GCC compiler and Guardant SDK utilities, the compiled algorithm is placed in a special secure cell in the dongle.
  4. The loaded code can be used from the protected application by simply calling Guardant API functions. The program code and the dongle become essentially one piece.
Hardware platform
32-bit Cortex-M3 microcontroller.
4096 bytes of protected EEPROM.
Li battery (3 to 5 years of use).
Cryptographic algorithms
Electronic signature based on elliptic curves ECC160.
Symmetric encryption AES-128.
Hashing based on SHA-256.
Loading and execution of up to 50 000 lines of code in C.
Tunnel encryption of the communication protocol traffic.
Working in HID mode without additional drivers.
Support for Windows, Windows CE, Linux, OS X, Android, and Windows RT.
Automatic protection of Win32 and .NET applications.
Tools for protection of Java applications.
Pseudo-code and obfuscation of protection components.
Flash memory 8 GB, 16 GB, or 32 GB (in Flash model).
General characteristics
Interface: USB 1.1 and up.
Dimensions: 58 mm x 16 mm x 8 mm.
Weight: 6.3 g.
The highest degree of protection
Moving executable useful custom code into a dongle makes the device and the application a single entity, the hacking of which involves complexity and costs several hundred thousand dollars. Meanwhile, the fast hardware platform guarantees high-speed data transmission over a secure channel that implements tunnel encryption of traffic between the loadable code and the user application.
Convenient development tools
Guardant SDK is constantly being improved, including improvements made in response to incoming requests from clients. Its latest version is available for download in the Download Center. Guardant SDK includes all the necessary tools and instructions to compile the code and load it into the dongle, together with examples of loadable code and samples of incorporation into a protected application.
Easy to operate
Guardant Code dongles fully support HID mode and may have a form factor of micro-dongle. In this form factor they do not require additional drivers and are inconspicuous when used in any computer.
Photo Gallery

Guardant Dongles Gallery

  • Guardant Sign
  • Guardant Time
  • Guardant Code
  • Guardant Sign Net
  • Guardant Stealth II
  • Guardant Sign
  • Guardant Time
  • Guardant Code micro
  • Guardant Stealth II micro
  • Guardant Time Net
  • Guardant Sign micro
  • Guardant Time
  • Guardant Code
  • Guardant Net II
  • Guardant Stealth II
  • Guardant Net Family