The final application protection scheme depends on the specific task. However, the basic principle can be represented as follows:
Thus, copying a protected program makes no sense, since without a key it becomes inoperable.
The mechanism for protecting and licensing applications in the network is as follows:
Data protection in the network protocol is carried out at the hardware level, that is, it is encrypted on session keys generated between the protected application and the electronic key without any intermediaries.