Chapter 7 – Implementing Secure Licensing
154
Sentinel Hardware Keys Developer’s Guide
You can use encryption to protect your application in many ways.
Encrypt the Query/Response Table
You should encrypt the query/response table, making it extremely difficult
to find and use the table by looking at the code. If you only decrypt chal-
lenges as you use them, then the attacker never sees the table in a fully
decrypted form.
Encrypt Critical Data Used by the Application
All applications at some point require data to operate. Encrypt important
data files or constants used by your program so it will only operate properly
with the Sentinel Key attached.
Verify Data Integrity Using ECC Signing and Verification
ECC is a public key algorithm (uses public and private key pairs) based on
discrete logarithms that are much more difficult to challenge at equivalent
key lengths. You can use the ECC algorithm to implement security checks in
the application as follows:
1. Generate a random message.
2. Call the SFNTSign API function to sign this message using the private
key is stored secretly in the Sentinel Key.
3. Call the SFNTVerify API function to verifies the signature using the
known public key of the token. If the function returns success, the
correct Sentinel Key is assumed to be present.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...