Sentinel Keys Offer Sophisticated Protection
Sentinel Hardware Keys Developer’s Guide
9
Similarly, your sales distributors require a
distributor key
(the hardware key
you specifically program for each distributor) to program Sentinel Keys for
your customers
Innovative Licensing Models for Market Penetration
Sentinel Keys not only secure unauthorized usage of your software, but also
provide options to package your software differently to suit different price or
feature categories. Using Sentinel Keys, you can:
■
Easily create demos, time-limited, and executions-limited software
packages.
■
Distribute stand-alone licenses, typically used by home users and
individuals.
■
Distribute floating licenses, typically used in enterprises.
■
Lease your software for certain time periods.
■
Allow license sharing for each
seat
3
user.
■
Allow terminal clients.
Robust Protection Options
The Sentinel Keys SDK provides robust methods to protect applications. It
has options to quickly protect your applications (using the Shell and
Quick
Shell
) and ways to implement intensive and controlled protection strategies
(using API protection). Here are the quick highlights of these methods:
■
The Shell
4
provides automatic and faster protection for Windows
executables and DLLs. It is capable of protecting against debugging,
disassembling, reverse-engineering, and memory dumping attacks.
The Quick Shell is a variant of the Shell and offers basic protection. It
3.A seat represents a user name and MAC address combination.
4.An automatic method of protecting Windows executables and DLLs. It does not require
source code of your application.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...