02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1 – Introduction<br />

Contents Glossary Index Troubleshooting<br />

Note: The Secure Communication Tunnel (term used in the diagram above) is<br />

explained on page 14.<br />

License Models to Increase Your Revenue<br />

6 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong><br />

<br />

<strong>Sentinel</strong> <strong>Keys</strong> provide the most advanced hardware-based protection<br />

against software piracy. For software vendors and developers, it opens a new<br />

world of opportunities by preventing illegal copying and distribution of their<br />

proprietary applications. It also provides better market penetration by<br />

increasing the product usage/trial rate among the potential customers. A<br />

few examples are described below. Using <strong>Sentinel</strong> <strong>Keys</strong>, you can:<br />

Lease the protected application for a certain period. Later, your<br />

customers may want to extend the lease or convert it to a perpetual<br />

license.<br />

To lease your applications, you can choose from RTC-based <strong>Sentinel</strong><br />

<strong>Keys</strong> or non-RTC tokens with <strong>Sentinel</strong> V-ClockTM .<br />

RTC-based <strong>Sentinel</strong> <strong>Keys</strong> contain an internal real-time clock to track<br />

the exact date and time of the leased applications. The real clock keeps<br />

track of time independent of the system clock—providing the best<br />

solution against time tampering attacks.<br />

The non-RTC tokens with <strong>Sentinel</strong> V-Clock also allow reliable and<br />

secure distribution of time-limited applications. These do not require<br />

an on-board battery to detect time tampering.<br />

Sell demo versions of the protected application. These can be<br />

upgraded to full-versions whenever desired.<br />

Provide stand-alone and network 3 licenses for individual customers<br />

and enterprise-level set-ups.<br />

Protect multiple applications with a single <strong>Sentinel</strong> Key.<br />

3. Also known as concurrent or floating licenses.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!