Validy Technology

About Validy Technology

Validy, a software publishing company, working in the field of security and control for IT technologies. 

Validy has invented, patented and developed a security solution, called Validy Technology
to protect software against piracy and IT systems against sabotage.

Validy Technology is based on an approach of security in total rupture with the current state of the art and
represents a major advancement in the field of software protection.

Founders of Validy Net Inc.: Gilles SGRO - Jean-Christophe CUENOD - Christophe VEDEL

Founders of Validy Net Inc.: Gilles SGRO – Jean-Christophe CUENOD – Christophe VEDEL

An innovative and patented technology

Validy has invented, patented and developed a security solution, called Validy Technology to protect software against piracy and IT systems against sabotage. Validy Technology is based on an approach of security in total rupture with the current state of the art and represents a major advancement in the field of software protection.

 

 

Validy Technology

[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_1-cyberdefense_sans_en.jpg]391"Traditional" cyberdefense in depth
Security obtained by 3 lines of defense: a Firewall, an Intrusion Detection System (IDS) and an Antivirus
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_0-cyberdefense_avec_en.jpg]370Cyberdefense in depth with VALIDY
Security obtained by adding the VALIDY Technology protection to each traditional defense line, but also to the Operating System, the Database engine and to the programs themselves.
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_intro_00_0.png]290Validy SoftNaos for Java implements the given protection scheme for applications running on the Java Virtual Machine (JVM).
You are faced with the piracy (illegal copy) of your software applications and/or the sabotage (attack against the integrity) of your IT systems. Validy SoftNaos combines a post-compiler with a secure co-processor which can put you back in control.<br /><br />After transformation by Validy SoftNaos, your application is made up of a fine mix of unchanged instructions which are executed on the user's PC and transformed instructions that can only be executed by the secure co-processor which is in the form of a USB token.<br />Users retain full control over their computer, but your protected application can only run on a hybrid system of which you control one part. This principle is radically different from the one that dongles usually rely on.<br /><br />Only the secret key, used to encrypt the transformed instructions, links the protected application to co-processors which hold this same key. This simplifies the management of applications updates and the distribution of the tokens to your clients.<br /><br />Based only on published principles and on a secret cryptographic key held in the secure token, Validy SoftNaos gives you robust protection.
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_0_0.png]230The Problem
[+] when users run a software application on their PC, they can observe, understand, and change both its code and its data<br /><br />[+] if the user is a cracker, this can lead to unlicensed use, altered behavior, or hijacking by malware
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_1_0.png]260Subtractive Protection
[+] an effective protection scheme must subtract a part of the application to execute it inside the token<br /><br />[+] the challenge is to pick a part that is essential, hard to guess, and whose execution in the token does not ruin performance
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_2_0.png]240Protection Time: Hiding Data
[+] chosen fields or variables are relocated to the secure token<br />[+] their value remain in the memory of the token at all time<br />[+] host data structures keep pointers to locations in the token
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_3_0.png]220
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_4_0.png]240
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_5_0.png]220
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_6.png]200
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_7.png]190
[img src=http://cybercops.in/wp-content/flagallery/validy-technology/thumbs/thumbs_softnaos_code_transform_8.png]200

Java applications protection

Validy has developed and is selling today Validy SoftNaos for Java, first commercial implementation of Validy Technology. This product comes in the form of a post-compiler and a USB key. Validy SoftNaos for Java protects Java applications running on computers equipped with USB ports and works with Windows XP, Windows Vista and Linux.

Developments

In order to constantly widen the field of application and the ease of use of the protection, Validy pursues several Research and Development directions.

  • Improvement of the protection
    Validy is working to improve Validy Technology, to make it as simple as possible to use and to still improve its robustness.

 

  • Support of other programming languages
    Because Validy Technology allows the protection of applications written in most modern programming languages, a high priority is given to the support of the most widespread of them, especially C/C++ and C#.

 

  • New tokens, new applications
    Validy is also working on the token, the hardware part of the protection, to improve its performances and to offer new form factors and new interfaces opening-up new applications. The microSD form factor will allow to protect mobile phone applications when the PciExpress form factor will be suitable for servers monitoring for instance infrastructures or banking applications. A surface mount device will be intended for embedded systems like home automation or cars.

 

Licensing Benefits:

In view of the importance of the economic stakes and diversity of fields of application, Validy has taken the decision to deploy its technologies in India by means of a network of licenses. The licensed partners are provided a unique, innovative and a revolutionary technological solution.
Using “Validy Technology”, software publishers have, apart from protection, great freedom to organize their sales policy. They are able to develop new business models made possible through the management of software licenses that Validy permits:

  • evaluation version,
  • on-line services access to which is controlled by the VSM,
  • pay as you go,
  • prepayment,
  • multiple licenses,
  • limited time licenses or unlimited use,
  • roaming licenses,
  • “territorial” licenses, etc.

The publisher, due to problems of qualification of the software, may freeze a version of the software for each VSM. This “quality assurance” solution is of particular interest to manufacturers who sub-contract and outsource their production (auto manufacturers, electronics, aeronautics, information management, agriculture and food, etc).

Thus, for the first time in the history of IT security,
software publishers have a radical method of protection against software piracy.

By their originality and because of the size of the markets concerned,
Validy solutions are going to make their mark on the history of the information society.


Leave a Reply

^