02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

P<br />

Q<br />

<br />

Contents Glossary Index Troubleshooting<br />

As a developer, you can enable the One-Click license Update facility for a<br />

customer/distributor by creating certain registry entries via your installer.<br />

Personal Folder<br />

See “Conventions Used in This <strong>Guide</strong>” on page xiv.<br />

Private Key<br />

In public-key cryptography, this is the secret key. <strong>Sentinel</strong> <strong>Keys</strong> contain the<br />

ECC private keys, primarily used for key exchange and digital signatures.<br />

Public Key<br />

In public-key cryptography this key is made public to all. It is primarily used<br />

for verifying digital signatures and solving the key exchange problem.<br />

Public Key Cryptography<br />

Cryptography based on methods involving a public key and a private key.<br />

Query Data<br />

The data scrambled using the AES algorithm in the <strong>Sentinel</strong> Key. You program<br />

your application to send queries to the <strong>Sentinel</strong> Key. The <strong>Sentinel</strong> Key<br />

scrambles the string using the AES algorithm and returns a response to the<br />

application.<br />

Query-Response Protection<br />

Please see the topic “Implement Query-Response Protection” on page 172.<br />

<strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong> 269<br />

Q

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!