02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7 – Implementing Secure Licensing<br />

Contents Glossary Index Troubleshooting<br />

Note: Creating your own customized protection scheme requires you to understand<br />

the API functions described in the <strong>Sentinel</strong> <strong>Keys</strong> Toolkit Help.<br />

Vulnerability Assessment - Basic Types of Attacks<br />

168 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong><br />

<br />

Before you can plan a good protection strategy, you need to understand the<br />

type of attacks targeted at breaking licensing. The diagram below shows the<br />

vulnerable points typically targeted for attacks:<br />

Basic Types of Attacks

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!