02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5<br />

Protecting Applications<br />

Using API<br />

In this chapter, we will describe how to add API features in the Toolkit. To<br />

learn about the API-based method of protecting applications, see “About<br />

API Protection” on page 58.<br />

Steps to Protect Applications Using API<br />

The steps for protecting applications using the Business Layer API functions<br />

are as follows:<br />

Prepare a Conceptual Plan<br />

In the initial stage you need to decide which software locks to use for protecting<br />

your application. The purpose of a software lock is to verify the<br />

presence of the correct <strong>Sentinel</strong> Key. You will begin by contacting the <strong>Sentinel</strong><br />

Key for a license (SFNTGetLicense API call). Subsequently, you can craft<br />

variety of software locks to check the presence of the <strong>Sentinel</strong> Key, such as<br />

encrypting the data using the AES algorithm present in the key. Please refer<br />

to the Business Layer API Help to understand the various API functions.<br />

<strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong> 109

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!