02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Chapter 1 – Introduction<br />

Contents Glossary Index Troubleshooting<br />

Frequently Asked Questions<br />

Question 1 - What is the Secure Communication Tunnel?<br />

The Secure Communication Tunnel is an end-to-end secured session<br />

between the client and the <strong>Sentinel</strong> Key for providing secure private communication.<br />

The communication packets are encrypted using the AES<br />

algorithm, for which the session key is generated using ECC-based key<br />

exchange (ECKAS-DH1).<br />

It provides maximum protection against the following types of attacks that<br />

can foil the security of your protected applications:<br />

Record/playback attacks<br />

Driver emulation attacks<br />

Middle layer key communication attacks<br />

Brute force attacks<br />

14 <strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong><br />

<br />

The tunnel is created at the time of obtaining a license and is maintained<br />

throughout the session. The tunnel can exist over a local workstation for<br />

stand-alone applications and on a subnet for network application.<br />

The following diagrams depict how the protected application and <strong>Sentinel</strong><br />

Key communicates over the secure communication tunnel, in network and<br />

stand-alone modes.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!