02.04.2013 Views

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

Sentinel Hardware Keys Developer's Guide - Customer Connection ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

About Features, Templates, and Groups<br />

Contents Glossary Index Troubleshooting<br />

The more locks you add to your application, the more difficult it will be for<br />

hackers to break your application’s protection.<br />

When to Use API Features?<br />

Compared to CodeCover, this method of protection is most commonly used<br />

when:<br />

You have access to the source code of the application.<br />

You want to have control over the protection techniques used to<br />

secure your application. For example, you can control the amount,<br />

frequency, and location of the software locks4 within your application;<br />

and the action taken if an unexpected response is received is left up to<br />

you. Generally, the more locks you add to your application, the more<br />

difficult it will be for hackers to break your application’s protection.<br />

You have a little more time available to implement and test your<br />

application protection. Typically, the API protection takes longer than<br />

the CodeCover. Because, to implement the API protection, you must<br />

understand the various functions and manually add them to your<br />

code.<br />

You want to take advantage of the state-of-the-art protection<br />

techniques possible with <strong>Sentinel</strong> <strong>Keys</strong>—like AES-based encryption/<br />

decryption, ECC-based signing/verification—in addition to the usual<br />

data reading and writing methods. Using the API protection, you can<br />

implement protection, both basic and advanced, that work best for<br />

your application.<br />

4. Refers to a decision point in your protected application. The purpose of a software<br />

lock is to verify the presence of the correct <strong>Sentinel</strong> Key. For example, an application<br />

might verify the validity of the signed data or send query data to the <strong>Sentinel</strong> Key<br />

and require a specific response in order to continue execution. Other software locks<br />

may simply read the data and compare it to the value known.<br />

<strong>Sentinel</strong> <strong>Hardware</strong> <strong>Keys</strong> Developer’s <strong>Guide</strong> 59

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!