02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1 – Introduction<br />

Contents Glossary Index Troubleshooting<br />

8 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong><br />

<br />

once. Hence, it prevents unauthorized revisions of the data contained<br />

in the <strong>Sentinel</strong> Key.<br />

Supports universal binaries for compatibility with PowerPC and Intelbased<br />

Macintosh systems.<br />

USB 2.0 compliant, full-speed for bulk transfer.<br />

16-bit RISC MCU for high performance.<br />

WHQL certified <strong>Sentinel</strong> System Driver for Windows 2000, XP (32-bit<br />

and x64), Server 2003 (32-bit and x64), Vista (32-bit and x64),<br />

Server 2008 (32-bit and x64), Server 2008 R2 (x64), and Windows 7<br />

(32-bit and x64) compatibility.<br />

Role-enforcement Using <strong>Hardware</strong> <strong>Keys</strong><br />

The Toolkit application is used to prepare important and confidential license<br />

policies. Hence, it is important to restrict the unauthorized access to the<br />

Toolkit. To control this, you are provided with a developer key, a hardware<br />

key to authenticate developers. Other users, who do not have the developer<br />

key, might be able to access the Toolkit, but will not be able to do any productive<br />

tasks (such as, prototyping the protection strategies, etc.). You can<br />

further prevent unauthorized use of your developer key by setting a password<br />

for it. This will ensure that any malicious user having access to your<br />

developer key cannot use it to tamper the protection strategy or program the<br />

<strong>Sentinel</strong> <strong>Keys</strong>, Also, once you have programmed <strong>Sentinel</strong> <strong>Keys</strong> for your customers,<br />

other developers cannot program or update them using their<br />

developer keys.<br />

Similarly, your sales distributors require a distributor key (the hardware key<br />

you specifically program for each distributor) to program <strong>Sentinel</strong> <strong>Keys</strong> for<br />

your customers<br />

Innovative Licensing Models for Market Penetration<br />

<strong>Sentinel</strong> <strong>Keys</strong> not only secure unauthorized usage of your software, but also<br />

provide options to package your software differently to suit different price or<br />

feature categories. Using <strong>Sentinel</strong> <strong>Keys</strong>, you can:

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!