Chapter 1 – Introduction
4
Sentinel Hardware Keys Developer’s Guide
Sentinel Keys Protect Against Software Piracy
Sentinel Keys provide hardware token-based licensing to your software
application(s). These also provide better market penetration through easy-
to-implement licensing models, such as demos, lease, and network licenses.
This section briefly explains the process of protecting your application and
describes how the protected application will behave when your customers
run it.
In order to protect your application, you first need to design the protection
strategy in the
Sentinel Keys Toolkit
(referred as Toolkit hereafter). The
Toolkit is the main application using, which you will do everything from
preparing a protection strategy to programming hardware keys.
Note:
You may also program your Sentinel Keys using the Key Programming APIs.
Please refer to the section “Programming Sentinel Keys using the Key Pro-
gramming APIs” .
The Toolkit provides two basic methods to protect your applications:
■
Shell Protection
: The method in which protective wrappers are put
around the application
1
quickly and easily. For more details, see
Chapter 4, “Protecting Applications Using Shell,” on page 65.
■
API Protection
: The method in which you insert the
Business Layer
API
functions into your application's source code. For more details,
see Chapter 5, “Protecting Applications Using API,” on page 91.
Whatever method you choose, the outcome will be a protected application,
different from the original application. The protected application is depen-
dent on the Sentinel Key for execution. It will check for the presence of the
Sentinel Key in order to run successfully. If the operation is successful, the
application is allowed to run. If it fails, such as when the correct Sentinel
Key is not attached or has been tampered with, access to the application is
denied. Since the application can be programmed to check for the Sentinel
1. Available only on Windows and can be used for protecting Windows 32-bit and 64-bit exe-
cutables and DLLs.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...