02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 1 – Introduction<br />

Contents Glossary Index Troubleshooting<br />

<strong>Sentinel</strong> <strong>Keys</strong> Protect Against Software Piracy<br />

4 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong><br />

<br />

<strong>Sentinel</strong> <strong>Keys</strong> provide hardware token-based licensing to your software<br />

application(s). These also provide better market penetration through easyto-implement<br />

licensing models, such as demos, lease, and network licenses.<br />

This section briefly explains the process of protecting your application and<br />

describes how the protected application will behave when your customers<br />

run it.<br />

In order to protect your application, you first need to design the protection<br />

strategy in the <strong>Sentinel</strong> <strong>Keys</strong> Toolkit 1 (referred as Toolkit hereafter). The<br />

Toolkit is the main application using which you will do everything from preparing<br />

a protection strategy to programming hardware keys.<br />

Note: You may also program your <strong>Sentinel</strong> <strong>Keys</strong> using the Key Programming APIs.<br />

Please refer to the section “Programming <strong>Sentinel</strong> <strong>Keys</strong> using the Key Programming<br />

APIs”.<br />

The Toolkit provides two basic methods to protect your applications:<br />

CodeCover Protection 2 : The method in which protective wrappers<br />

are put around the application quickly and easily. For more details,<br />

see Chapter 4, “Protecting Applications Using CodeCover,” on page<br />

75.<br />

API Protection: The method in which you insert the Business Layer<br />

API functions into your application's source code. For more details,<br />

see Chapter 5, “Protecting Applications Using API,” on page 109.<br />

Whatever method you choose, the outcome will be a protected application,<br />

different from the original application. The protected application is dependent<br />

on the <strong>Sentinel</strong> Key for execution. It will check for the presence of the<br />

<strong>Sentinel</strong> Key in order to run successfully. If the operation is successful, the<br />

application is allowed to run. If it fails, such as when the correct <strong>Sentinel</strong><br />

1.Available only on Windows.<br />

2. Available only on Windows and can be used for protecting Windows 32-bit and 64-bit executables,<br />

DLLs, and BPLs.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!