02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 7 – Implementing Secure Licensing<br />

Contents Glossary Index Troubleshooting<br />

Call the SFNTDecrypt API function obtain the decrypted data. If the<br />

decrypted data matches the plain data, the correct <strong>Sentinel</strong> Key is<br />

assumed to be present.<br />

It becomes impossible to replicate these results by skipping the <strong>Sentinel</strong> Key<br />

because all the operations are performed in the hardware.<br />

SFNTEncrypt and SFNTDecrypt Operations<br />

You can use encryption to protect your application in many ways.<br />

Encrypt the Query/Response Table<br />

You should encrypt the query/response table, making it extremely difficult<br />

to find and use the table by looking at the code. If you only decrypt challenges<br />

as you use them, then the attacker never sees the table in a fully<br />

decrypted form.<br />

176 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!