Tips and Tricks
Sentinel Hardware Keys Developer’s Guide
153
standardization process). It is trusted by many organizations and has a
proven track record.
It provides an impenetrable security check because the AES algorithm and
the 128-bit randomly generated secret key it uses are embedded in the Senti-
nel Key—not accessible to any debugging or memory dumping program.
You need to:
■
Call the SFNTEncrypt API function to send the plain data and have it
encrypted.
■
Call the SFNTDecrypt API function obtain the decrypted data. If the
decrypted data matches the plain data, the correct Sentinel Key is
assumed to be present.
It becomes impossible to replicate these results by skipping the Sentinel Key
because all the operations are performed in the hardware.
SFNTEncrypt and SFNTDecrypt Operations
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...