0% found this document useful (0 votes)
103 views

Sentinel Hardware Keys

Uploaded by

sally D.allah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
103 views

Sentinel Hardware Keys

Uploaded by

sally D.allah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Sentinel Hardware Keys

The Most Secure Hardware Token in The World

Protect Against Piracy


Over 40 million licenses worldwide are
protected by SafeNet hardware keys. Sentinel
has been setting the standard for software
protection since 1984 and secures more
clients worldwide than any other key.
Benefits
Secure Communications
Unmatched Protection Sentinel Hardware Keys are the most secure
The highest level of protection hardware token available in the world. Both
public key cryptography and 128-bit AES en-
against piracy available,
cryption are used to secure communications overwriting information in memory cells.
includes public key cryptography
between the key and the protected applica- With Sentinel Hardware Keys, you can also
and 128-bit AES encryption
tion. Middle layer attacks, such as record and program multiple keys at once and custom-
playback, and driver emulation are effectively ize license models at the production stage.
Secure Time- stopped. A unique encryption key is used for License configuration can be altered without
Based Licensing every communication session between the requiring further development changes. Sen-
Sentinel V-ClockTM also application and the hardware token, making tinel technology allows software vendors to
prevents time tampering brute force attacks virtually impossible. In send updates to keys in the field in a secure,
without added costs addition, the keys include internal authentica- controlled manner. Updates are sent using
tion, which effectively prevents cloning of the the same high level of security as communi-
Rapid Deployment keys. cations between the hardware token and the
software application.
Business Layer API™ frame- Speed Implementation—
work reduces implementation Quickly Add Protection—
Business Layer APIs TM
time by up to 60% or more,
Sentinel Shell
providing most secure The best implementation of any protection
implementation possible scheme should include complete integration The Sentinel Shell offers a way to quickly add
into your application through APIs. By using protection and obfuscation to your applica-
Trusted Distribution Sentinel Business Layer APIs, you can obtain tion without requiring any alteration to the
the highest level of security and control over source code. When used in conjunction with
Securely control and regulate sophisticated license designs without spend- API level integrations, the Shell enhances
your distribution channels ing time on lower level programming. Busi- overall security by adding multiple layers to
with Distributor Keys ness Layer APIs are pre-configured, higher thwart hacking attempts. Additionally, the
level APIs for popular license models such Shell prevents memory dumping and includes
Quickly Added Protection as subscription, evaluation and pay-per-use. protection against debuggers, making reverse
Sentinel Shell enhances overall These tools typically reduce the program- engineering even more difficult. With the
security by adding multiple ming time required to secure a new appli- Sentinel Shell, you can embed licensing and
cation by up to 60% or more compared to protect your application in minutes, even if
layers to thwart hacking
other hardware key solutions. Reducing and you don’t have access to source code.
attempts.The Shell also includes
simplifying the required programming steps
protection against debuggers,
also improves implementation quality and Implement Time-Based
making reverse engineering security.
even more difficult. Licensing—Sentinel V-Clock TM
Simplify Updates and Activation The Sentinel Hardware Key V-Clock allows
you to reliably and securely offer time-
Sentinel APIs also include Logical Addressing based license models such as trial, demo or
which allows developers to add or change subscription. The V-Clock checks and stores
implementations without being concerned the system time in the Hardware Key, then
about specific memory address usage. This checks repeatedly to verify consistency. If the
not only drastically speeds development system time ever differs significantly from
time, but also reduces the risk of error from the last known date and time, the application
can be disabled or run in a restricted mode. This facilitates automation and provides more
Sentinel V-Clock comes standard with Senti- flexibility with your internal manufacturing
nel Keys and requires no on-board battery, and delivery systems, greatly reducing the
effectively preventing time-tampering without time required to fulfill Sentinel Keys.
added costs.
Exceptional Reliability
Secure Your Distribution Technical Specifications
Advanced mirroring technology ensures an
Channels —Sentinel Distributor exceptionally high level of reliability by self-
Keys TM correcting any errors in communication to Minimum System Requirements
the key. • Pentium II or above (450 MHz or
Sentinel Hardware Keys allow you to care- above)
fully control and regulate your distribution • VGA Monitor with
channels through the use of Distributor Keys. Multiple Development 1024 x 768 resolution
You can assign and securely embed encryp- Environments and Platforms (1152 x 868 recommended)
tion keys during the manufacturing process • 280 MB free hard disk space
in order to control the creation of licenses Sentinel provides you with the ability to pro- • 128MB RAM
tect applications created in numerous devel- (256 MB recommended)
through your channels. Distributor Keys can
opment environments. Sample code for the • Java 2 Runtime Environment
enforce limits such as a maximum number of version 1.6
licenses or the creation of trial versions only. most popular environments is also provided,
• Internet Explorer 5.0 or higher
Sentinel Hardware Keys allow you to secure such as Microsoft Visual C++, Microsoft • Adobe Reader 4.0 or higher
each link in your distribution chain. Visual Basic and Microsoft .NET to get you
started on custom applications. With Sentinel Supported Compilers
you can support your application on multiple • Microsoft Visual C++
Protect Multiple Applications operating platforms with a single develop- • Microsoft Visual Basic
ment effort, further reducing development • Microsoft Visual C#.NET
Sentinel Hardware Keys allow you to protect
time and cost. • Microsoft Visual Basic .NET
multiple applications with a single token. • Borland C
With Sentinel multi-tasking technology, • Borland C++ Builder
unique independent sessions are employed License Across Networks • Borland Delphi (5.0, 6.0, 7.0)
simultaneously for each application all while • Java (1.5, 1.6)
maintaining the same high level of security The network version of Sentinel Hardware • AutoCAD (14, 2000, 2004, 2005,
and without any degradation in performance. Keys protects client-server applications and 2007)
You can even add protection for additional provides server monitoring to track license
Supported Networks
applications at a later date without altering usage on the network. Sentinel Keys em-
• TCP/IP
the existing security structure. power network administrators to cancel
• IPX
licenses in order to redistribute among users • NetBEUI
or revoke idle licenses. This provides admin- • HTTP (only for License Monitoring tool)
Integrate License Fulfillment istrators with the ability to control optimal
license use across the enterprise. Certifications
Sentinel Keys include back office APIs
that enable you to integrate fulfillment of • Windows Hardware Quality Labs
certified for Windows 2003 and
software licenses into your organization’s Obtain Superior Windows XP (32-bit)
process. With back office APIs, you can create Technical Support
custom applications to program Sentinel Keys Operating Systems
using your own internal applications without The SafeNet Technical Services organization Linux
interruption to your existing business model. provides worldwide telephone, email and In- • Red Hat Enterprise Linux ES/AS
ternet-based support to our customers. Our version 3.0 and 4.0
SafeNet Service Pledge ensures that you con- • Red Hat Enterprise Linux WS/
sistently receive the highest level of service. Desktop version 3.0 and 4.0
• Fedora Core 4 and 5
The Sentinel Integration Center provides
• SuSe 9.3 and 10.0
online resources to assist your development Macintosh
staff through the implementation process. • Macintosh 10.3.9 and 10.4.x for
PowerPC
• Macintosh 10.4.x for Intel
Windows
• 98 (client only)
Corporate Headquarters: • ME (client only)
4690 Millennium Drive, Belcamp, Maryland 21017 USA • NT (network clients only)
Tel.: +1 410 931 7500 or 800 533 3958, Fax: +1 410 931 7524,
Email: [email protected] • 2000
• 2003
EMEA Headquarters: • XP (32-bit & 64-bit)
® Tel.: + 44 (0) 1276 608 000, Email: [email protected]
• Vista (32-bit & 64-bit)
APAC Headquarters:
Tel: +852 3157 7111, Email: [email protected]
www.safenet-inc.com For all office locations and contact information, please visit
www.safenet-inc.com/company/contact.asp

©2008 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners.

You might also like