Sentinel Hardware Keys Developer's Guide - Customer Connection ...
Sentinel Hardware Keys Developer's Guide - Customer Connection ...
Sentinel Hardware Keys Developer's Guide - Customer Connection ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Chapter 7 – Implementing Secure Licensing<br />
Contents Glossary Index Troubleshooting<br />
independent of the system clock—providing the best solution against time<br />
tampering attacks.<br />
Non-RTC tokens with <strong>Sentinel</strong> V-Clock also allow reliable and secure distribution<br />
of time-limited applications. These do not require an on-board<br />
battery to detect time tampering and allow you to tolerate the number of<br />
time tampering attempts specified in the cheat counter.<br />
Cheat Counter Behavior<br />
170 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong><br />
<br />
Cheat counter is a count-down value that allows tolerating the time tampering<br />
attacks ranging between 1 second to 30 days (excluding the daylight<br />
savings) till it reaches zero. Its behavior is described as follows:<br />
Cheat Counter Behavior<br />
Scenario Outcome Corrective Measures<br />
When the system clock is<br />
tampered for a duration<br />
between 1 second to 30<br />
days (excluding the<br />
daylight savings)<br />
When the system clock is<br />
tampered more than once<br />
(between 1 second to 30<br />
days) during<br />
one power-up session of<br />
the <strong>Sentinel</strong> Key a<br />
The system clock is<br />
tampered for more than 30<br />
days<br />
Cheat counter<br />
decrements by one.<br />
The AES/ECC algorithms<br />
are disabled—regardless<br />
of the cheat counter<br />
value.<br />
This prevents against<br />
multiple time tampering<br />
attempts during one<br />
power-up session.<br />
The AES/ECC algorithms<br />
are disabled—regardless<br />
of the cheat counter<br />
value.<br />
The application will run successfully till<br />
cheat counter has reached zero. After<br />
which, the AES/ECC algorithms are<br />
disabled and the associated API<br />
functions return error. You can decide<br />
the behavior of the application under<br />
such circumstances.<br />
If the <strong>Sentinel</strong> Key is re-plugged,<br />
normal functionality can be<br />
resumed.<br />
If the system clock is corrected, normal<br />
functionality can be resumed.<br />
If the system clock is corrected, normal<br />
functionality can be resumed.<br />
a. Refers to the duration between the plug-in and plug-out of the <strong>Sentinel</strong> Key.