Chapter 7 – Implementing Secure Licensing
148
Sentinel Hardware Keys Developer’s Guide
independent of the system clock—providing the best solution against time
tampering attacks.
Non-RTC tokens with Sentinel V-Clock also allow reliable and secure distri-
bution of time-limited applications. These do not require an on-board
battery to detect time tampering and allow you to tolerate the number of
time tampering attempts specified in the cheat counter.
Cheat Counter Behavior
Cheat counter is a count-down value that allows tolerating the time tamper-
ing attacks ranging between 1 second to 30 days (excluding the daylight
savings) till it reaches zero. Its behavior is described as follows:
Cheat Counter Behavior
Scenario
Outcome
Corrective Measures
When the system clock is
tampered for a duration
between 1 second to 30
days (excluding the
daylight savings)
Cheat counter
decrements by one.
The application will run successfully till
cheat counter has reached zero. After
which, the AES/ECC algorithms are
disabled and the associated API
functions return error. You can decide
the behavior of the application under
such circumstances.
When the system clock is
tampered more than once
(between 1 second to 30
days) during
one power-up session of
the Sentinel Key
a
The AES/ECC algorithms
are disabled—regardless
of the cheat counter
value.
This prevents against
multiple time tampering
attempts during one
power-up session.
❑
If the Sentinel Key is re-plugged,
normal functionality can be
resumed.
❑
If the system clock is corrected, nor-
mal functionality can be resumed.
The system clock is
tampered for more than 30
days
The AES/ECC algorithms
are disabled—regardless
of the cheat counter
value.
If the system clock is corrected, normal
functionality can be resumed.
a. Refers to the duration between the plug-in and plug-out of the Sentinel Key.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...