Sentinel Hardware Keys Developer’s Guide
91
Chapter 5
Protecting Applications
Using API
In this chapter, we will describe how to add API features in the Toolkit. To
learn about the API-based method of protecting applications, see “About
API Protection” on page 47.
Steps to Protect Applications Using API
The steps for protecting applications using the Business Layer API functions
are as follows:
Prepare a Conceptual Plan
In the initial stage you need to decide which software locks to use for pro-
tecting your application. The purpose of a software lock is to verify the
presence of the correct Sentinel Key. You will begin by contacting the Senti-
nel Key for a license (SFNTGetLicense API call). Subsequently, you can craft
variety of software locks to check the presence of the Sentinel Key, such as
encrypting the data using the AES algorithm present in the key. Please refer
to the Business Layer API Help to understand the various API functions.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...