Sentinel Keys Offer Sophisticated Protection
Sentinel Hardware Keys Developer’s Guide
7
Sentinel Keys Offer Sophisticated Protection
This section provides a summary of the main features of Sentinel Keys SDK,
which make it the most reliable and chosen solution to protect your intellec-
tual property and copyrights.
Hardware Key with Cutting-edge Security Technology
Sentinel Keys use the cutting-edge technology for superior security. Here are
the major highlights of the hardware key:
■
Contains the ECC algorithm for digital signing and verification,
providing
data authentication, confidentiality, integrity, and non-
repudiation
.
■
Contains the 128-bit AES algorithm for block encryption/decryption
and query-response protection.
■
Provides secure communication using the Secure Communication
Tunnel. The tunnel is an
end-to-end
secured session between the client
and the Sentinel Key. The communication packets are encrypted
using the AES algorithm, for which the session key is generated using
ECC-based key exchange (ECKAS-DH1).
■
Allows random generation of ECC and AES keys. Unlimited number of
keys can be generated.
■
Uses chip-on-board (COB) technology for better performance, high
reliability, and greater protection against reverse engineering.
■
Uses mirroring and self-correction for higher reliability against
memory corruption.
■
Has the in-built capability to write-once in the field. It means that
ignoring the access rights, the data can be modified at run-time only
once. Hence, it prevents unauthorized revisions of the data contained
in the Sentinel Key.
■
Supports universal binaries for compatibility with PowerPC and Intel-
based Macintosh systems.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...