Tips and Tricks
Sentinel Hardware Keys Developer’s Guide
155
SFNTVerify Operation
You may even sign part of your application data (such as constants) and ver-
ify its integrity before you use it. You can implement a similar signature
verification scheme for your digital content (such as, text files and images)
and store the 42-bit signature as raw data in the Sentinel Key memory.
Decentralize Your Security Checks
Decentralizing the security checks throughout the code is a good practice.
This requires each place in the code to be modified in order for the applica-
tion to run without the key. Restricting them to a few places can lead to easy
detection and elimination subsequently. Given below are more tips:
Use In-line Functions in Place of a Centralized Function
Creating a single function call that checks the key and then making func-
tion calls throughout the code does not decentralize. Instead, only the
security check function must be modified to operate without the key.
Use Many Different Security Checks
If you use the same security check in many places of the code, then you can
find each check by searching for patterns.
Tip:
Place the security checks in hard-to-trace operations. For example, if you
scatter you check throughout a series of database operations, it can be
extremely time consuming to trace the calls.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...