SmartDongle2 is our newest product with updated firmware and enhanced security. The enhanced security is achieved through “security loops” which determines the number of times the mathematical calculation is performed internally. The higher the number of loops, the more secure it is. However, the tradeoff is that each additional loop adds processing time (approximately .14 seconds per loop). Currently, we have two products: SmartDongleLL and SmartDongle2. If you have not read about each, you might want to take a moment so you can decide which SmartDongle will work best for your project.
###Securing Executables We have 2 different ways of securing executables. One way is to encrypt the executable using AES128 encryption and storing the key on a SmartDongle. We then provide you with two files. One is a program that reads the SmartDongle, gets the key from the SmartDongle, decrypts the original executable and loads it into memory and executes it.
The other way is to get the serial number from a USB flash, perform some arithmetic on that number, and use the result as the encryption key. We then encrypt your executable and save it onto the same USB flash drive. On that drive we put the startup code. Your users would double click on the startup code which will get the serial number from the USB flash drive, do the same arithmetic and then decrypt your executable and load it into memory and transfer control to it.
##keylok
Hardware-based protection uses a physical device, commonly known as a dongle, USB hardware key or security key. To implement, the dongle's firmware is integrated with the software. Afterwards, the software only runs if the dongle is physically present on the computer or machine. Additionally, the dongle controls how the end-user actually uses the software, referred to as software licensing. Whether it's time or usage-based restrictions or limiting the modules and features available, the end-user's access is managed and enforced by the dongle.
Industry experts generally agree that hardware-based protection provides superior security since a physical piece of hardware has to be bypassed to misuse the software. Particularly vulnerable are those products sold in high-risk markets, high-value software, certain software classes/industries that are targeted by hackers and innovative, leading-edge software.
Click on the KEYLOK Triangle to explore four more reasons to consider hardware-based security.
SecureDongle was built based on advanced microprocessor smart chip which has been certified by EAL4+ and ITSEC. The smart chip based hardware architecture ensures complete security against risk of Dongle hardware being cloned or duplicated. In addition to hardware advantage, SecureDongle was also built with a very user friendly interfaces on its bundled firmware and utilities. Unlike many other competing products where their shortcomings are summarized as below:
Non-Smart Chip based Usually based on common low cost EEPROM where the main protection algorithms rely more on the firmware that is bundle together rather than on the hardware. This type of hardware architecture can easily be duplicated by many Dongle Duplication Experts.
Smart Chip based There are few smart chip based dongles available on the market and most of them is very complicated to integrate; a fresh dongle user might need to spend weeks to months in order to be able to come up with a good protection.
Maximum Security: SecureDongle offers a combination of advanced smart card level hardware security together with advanced software protection firmware with is also integrated with advanced anti-cracking algorithms and mechanisms.
Minimum Learning: SecureDongle SDK offers comprehensive but user friendly tools, utilities, tutorials and API samples where even a fresh developer can master it within days.
Minimum Investment: SecureDongle offer the most cost effective option in the industry, so why pay more!