User's Manual

13
Protection of executable programs
: the Global Security System (GSS) technology makes it possible to protect
programs in executable format even without provision of source codes.
Interfacing with software: SmartKey can be used with leading development environments and operating
systems, including DOS, Windows 3.1, Windows98, Windows ME, Windows NT, Windows 2000, Windows
XP, Windows 2003, Windows Vista, Linux, Mac OS X, Novell, and AutoCAD.
Power supply:
it neither uses internal batteries nor does it need an external power supply.
Compact
: The outer dimensions are highly compact and also suitable for programs such as notebook and
laptop.
Stackability
(for SmartKey Parallels only): Several SmartKey Parallel dongles can be stacked on the same
parallel port, by means of a daisy chain connection. This characteristic was not implemented on the SmartKey
USB, because the USB protocol itself makes it possible to daisy-chain connect several devices by means of the
USB HUB.
Transparency (for SmartKey Parallel only): SmartKey Parallel does not does not prevent use of the parallel
port for other purposes, because it permits bypassing. The dongle can be connected - in daisy-chain manner -
to the printer or to most of the numerous peripheral devices using the parallel port (network adapter, SCSI
adapter, portable hard-disk, other protection dongles, etc). The only constraint is that SmartKey Parallel and
the devices connected to it must be installed before switching on the computer.
3.3 How does SmartKey work?
This is the use principle of SmartKey: fitting the dongle in the PC's parallel of USB port, and control of the dongle's
presence by the protected software. Each dongle is characterized by the unique 'digital credentials', personalized for
every user, which are recognized by the software and enable correct operation.
Immediately after the program starts, or in other strategic points, the software verifies if SmartKey is present on the
PC's port. If the verification proves negative, the program stops its execution. If, instead, the dongle is present, the
program continues its execution correctly, and, if necessary, runs further controls on the dongle's parameters.
An internal non-volatile memory enables implementation of selective protection criteria or individual personalization of
the installed dongles, for example, so that the serial number of the program to be protected matches the contents of the
dongle. SmartKey can be used for special marketing strategies such as granting of demo packages, hire of software for
specified periods, measurement of software usage, control of subsequent versions, etc.
SmartKey is a sure, flexible software protection dongle, designed for transparent fitting on the computer's parallel or
USB port. Every SmartKey dongle has unique, customizable codes, so that every software house is able to implement
its own original, secure protection systems.
3.4 How much time is needed to protect a program?
SmartKey's flexibility makes it possible to define various levels of protection. They use the dongle's resources in a
different way and require longer or shorter implementation time.
A few minutes
: thanks to the supplied Global Security System (GSS) program, you can directly protect your
executable file in a short time, without any action on the source codes. In fact, the entire protection process
(i.e. prepare the personalized codes, program them on the dongle, select the program and protect it) can be run
in only a few minutes.
A few hours
: this is the most common case. You don't have much time, but don't worry: a few hours are
enough to implement the dongle's main security functions to create a personalized protection scheme, using the
supplied software drivers and obtaining a program with an extremely high level of protection.
A few days
: in just a few days, you can write an almost inviolable software by fully exploiting SmartKey's
characteristics and adapting them to your own security requirements.
3.5 What is SmartKey's degree of security?
SmartKey is state-of-the-art in terms of software security. The use of microprocessors and sophisticated encrypting
algorithms makes dongle cloning virtually impossible.
Whether you decide to protect the programs with the supplied functions or by using the GSS automatic utility,
SmartKey provides a high degree of security.