Network Dongles

This subline of Guardant dongles was designed for efficient protection and licensing of network software, including usage time based licensing. Sign Net and Time Net models support all features of modern local Guardant dongles, including encryption of traffic and the ability to work in HID mode. Functioning of devices on a network is ensured through use of a high-performance fault-tolerant dongle server.

  • Models
  • Description
  • Features
  • Advantages

Guardant Sign Net

A modern dongle for efficient protection and licensing of software running in computer networks. Provides protection at the level of local dongles by using end-to-end traffic encryption and secure license server.

Guardant Time Net

The flagship of the network dongles line. Supports all features of Guardant Sign Net, and in addition, contains a real-time clock and an independent power supply. May provide dual licensing: in the network and based on usage time.

Guardant Net II

Guardant Net II is a dongle with the basic features for the protection of network software on Windows. The dongle is based on a secure ARM microprocessor and has 256 bytes of EEPROM memory.

The mechanism of network protection

Network protection is based on principles common for all dongles, that is, on using all the Auto Protection and Guardant API features to protect a network application. The mechanism of software protection and licensing in the network works as follows:

  • A special broker application, Guardant network license manager, is installed on a dedicated server or workstation;
  • A dongle is installed on the same server or network station;
  • The application is protected using either Auto Protection or Guardant API;
  • License Manager and the dongle will strictly control the number of connections according to the licenses set up by the developer.

Data protection in the network protocol is hardware-based, i.e. encrypted in the session keys developed between the protected application and the dongle without any intermediaries. Using network dongles helps to reduce the cost of protection, as a single Guardant dongle is sufficient for protection of all the software in the network. Protection systems built upon use of local dongles are easily altered to work with network dongles.

Specifics of use

The high efficiency of modern network dongles allows you to create efficient protection and control a large number of licenses.

  • You can implement licensing based on the number of running instances of the application, or on the number of workstations.
  • In today's network dongles the traffic between the application and the dongle is encrypted, so that the server does not introduce additional vulnerabilities – it is just a transport broker.
  • Protecting an application by binding to the network dongle is as simple as in the case of using a local dongle, and all the same features are supported.
  • Guardant Sign Net
  • Guardant Time Net
  • Guardant Net II
Hardware platform
32-bit Cortex-M3 microcontroller.
4096 bytes of protected EEPROM.
Cryptographic algorithms
Electronic signature based on elliptic curves ECC160.
Symmetric AES-128 and GSII64 encryption.
Hashing based on SHA-256 or GSII64.
Functionality
Network-based licensing.
Tunnel encryption of the communication protocol traffic.
Working in HID mode without additional drivers.
Support for Windows, Windows CE, and Linux.
Automatic protection of Win32 and .NET applications.
Tools for protection of Java applications.
Pseudo-code and obfuscation of protection components.
Flash memory 8GB, 16GB, or 32GB (in Flash model).
General characteristics
Interface: USB 1.1 and up.
Dimensions: 58 mm x 16 mm x 8 mm.
Weight 6,3g.
Hardware platform
32-bit Cortex-M3 microcontroller.
4096 bytes of protected EEPROM.
Cryptographic algorithms
Electronic signature based on elliptic curves ECC160.
Symmetric AES-128 and GSII64 encryption.
Hashing based on SHA-256 or GSII64.
Functionality
Network-based licensing.
Tunnel encryption of the communication protocol traffic.
Working in HID mode without additional drivers.
Support for Windows, Windows CE, and Linux.
Automatic protection of Win32 and .NET applications.
Tools for protection of Java applications.
Pseudo-code and obfuscation of protection components.
Real time clock.
General characteristics
Interface: USB 1.1 and up.
Dimensions: 58 mm x 16 mm x 8 mm.
Weight 6,3g.
Hardware platform
ARM microcontroller.
4096 bytes of protected EEPROM.
Cryptographic algorithms
Symmetric GSII64 encryption.
Hashing based on GSII64.
Functionality
Network-based licensing.
Windows support.
Automatic protection of Win32 and .NET applications.
Tools for protection of Java applications.
Pseudo-code and obfuscation of protection components.
General characteristics
Interface: USB 1.1 and up.
Dimensions: 58 mm x 16 mm x 8 mm.
Weight 6,3g.

When selling licenses to organizations, a vendor often needs to control the number of licenses in use. When protecting software exclusively by local dongles no such problem arises — the number of running instances of the software will not exceed the number of sold dongles; when selling large packages of licenses, though, it becomes more cost-efficient to use network dongles.

Guardant Network Dongles provides:

  • Advantages of network dongles.
  • Network dongles allow you to create floating licenses, in which case a user does not have to carry a local dongle to run the protected application: it is enough to connect to the local network, including connection via VPN.
  • It is possible to upgrade dongle memory remotely in a secure way to change the license capacity of a dongle or the time limit for usage time based license.
  • The solution is easy to deploy and easy to operate for end users.
  • Licensing by the number of workstations and by the number of running instances of the software. You can impose a restriction on the usage time of the application or its specific modules.
  • The developer can determine the number of licenses in the dongle within its maximum capacity.
Photo Gallery

Guardant Dongles Gallery

  • Guardant Sign
  • Guardant Time
  • Guardant Code
  • Guardant Code Pro
  • Guardant Sign Net
  • Guardant Stealth II
  • Guardant Sign
  • Guardant Time
  • Guardant Code micro
  • Guardant Stealth II micro
  • Guardant Time Net
  • Guardant Code Pro
  • Guardant Sign micro
  • Guardant Time
  • Guardant Code
  • Guardant Code Pro
  • Guardant Net II
  • Guardant Stealth II
  • Guardant Net Family

Sitemap