About Features, Templates, and Groups
Sentinel Hardware Keys Developer’s Guide
47
■
Anti-disassembling Protection
A Shell-protected application is difficult to disassemble due to the use
of expert techniques, like Maze technology and dummy macros.
■
Enhanced security for .NET applications
.NET Enhancements feature provides enhanced security to pure .NET
applications (executables and DLLs).
■
Support for Terminal Client
Using the support for Terminal Client you can protect your
applications in a terminal service environment.
When to Use Shell?
The Shell is a popular method of protecting Windows executables and DLLs
because:
■
It is extremely easy to implement. People with no-programming
experience can use it without any hassles.
■
It does not require source code of your application.
■
It uses the 128-bit AES algorithm for protection.
■
It allows implementing the most-popular licensing models in just a
few clicks.
About API Protection
When you use API features to protect your applications, you need to add the
Business Layer API into your application code.
The Business Layer API are the Sentinel Keys API functions—used for com-
municating between your application and the Sentinel Key. These API
functions can be used for verifying the Sentinel Key's presence by obtaining
a license, reading/writing data on its memory, encrypting/decrypting data,
signing/verifying data, sending queries and evaluating responses and so on.
These API functions provide a high-level interaction with the Sentinel Key
and drastically reduce the efforts involved in implementing several popular
license models, like demo and leases.
Содержание Sentinel
Страница 1: ...1 2 0...
Страница 6: ...vi Sentinel Hardware Keys Developer s Guide...
Страница 12: ...Contents xii Sentinel Hardware Keys Developer s Guide...
Страница 20: ......
Страница 58: ...Chapter 2 Sentinel Keys SDK Components 40 Sentinel Hardware Keys Developer s Guide...
Страница 80: ...Chapter 3 Planning Application Protection and Licensing Strategy 62 Sentinel Hardware Keys Developer s Guide...
Страница 82: ......
Страница 108: ...Chapter 4 Protecting Applications Using Shell 90 Sentinel Hardware Keys Developer s Guide...
Страница 180: ......
Страница 196: ...Chapter 8 License Grouping 178 Sentinel Hardware Keys Developer s Guide...
Страница 212: ...Chapter 9 Programming Sentinel Hardware Keys 194 Sentinel Hardware Keys Developer s Guide...
Страница 214: ......
Страница 236: ...Chapter 10 Redistributables for Customers and Distributors 218 Sentinel Hardware Keys Developer s Guide...
Страница 252: ...Appendix A Troubleshooting 234 Sentinel Hardware Keys Developer s Guide...
Страница 282: ...Index 264 Sentinel Hardware Keys Developer s Guide...