Chapter 9 – Programming Sentinel Hardware Keys
186
Sentinel Hardware Keys Developer’s Guide
4. Configure your inputs for the selected file and click
Next
. Enter the
following information as per the selected file type:
b.
An individual/organization authorized by the developer to distribute the protected application
along with the Sentinel Keys
c.An individual/group who is unaware of the contents, and is more concerned about the number
of tokens being programmed using the programming utility/stand-alone executable provided to
him by a developer.
File Types and Required Inputs
File Type
Information
*.ISV
❑
Define Location and Enter the cheat counter value
: Browse and
select the destination folder for the exported file, and enter the cheat
counter value in the
Cheat Counter (only for non-RTC keys)
field.
The default is
0
.
Note
: You may also define/view additional comments by clicking the
Add
comments to the file
hyperlink.
*.DIS
❑
Specify the
File Encryption Key
a
as programmed on the Distributor
Key and then continue to select the destination folder for the file.
Tip:
You may also paste the File Encryption Key value from the clipboard.
❑
Define Location and Enter the cheat counter value
: Browse and
select the destination folder for the exported file, and enter the cheat
counter value in the
Cheat Counter (only for non-RTC keys)*
field.
The default is
0
.
Note
: You may also define/view additional comments by clicking the Add
comments to the file hyperlink.
*.OPR
❑
Define Location and Enter the cheat counter value
: Browse and
select the destination folder for the exported file, and enter the cheat
counter value in the
Cheat Counter (only for non-RTC keys)*
field.
The default is
0
.
Note
: You may also define/view additional comments by clicking the
Add
comments to the file
hyperlink.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...