Summary of Clone Protection Schemes
The lists below summarizes the various clone protection schemes
Summary of Schemes for Physical Machines
>Platform Default: Instructs Sentinel LDK to automatically apply the most appropriate clone protection scheme for each end user based on various parameters. For details, see Using the "Platform Default" Scheme.
>PMType1: Uses two components to verify fingerprints: hard drive serial number and motherboard ID. For details, see PMType1 Scheme.
>PMType2: Uses various components such as CPU, ethernet card, optical drive, and PCI card slot peripherals, along with the hard drive serial number and motherboard ID to verify fingerprints.
>PMType3: For Android applications. Uses three components to verify fingerprints: CPU model, CPU serial number, and internal storage serial number. For details, see PMType3 Scheme.
>PMType4: For Android applications. Uses up to five components to verify fingerprints. Additionally, this scheme allows the end user to uninstall and reinstall the protected application in many instances without vendor assistance. For details, see PMType4 Scheme.
>FQDN: Uses only the machine’s FQDN (Fully Qualified Domain Name) to verify fingerprints. For details, see FQDN Scheme.
NOTE On MAC machines, FQDN licenses are bound to LocalHostName, and the value of LocalHostName should not be empty.
>Custom: You can define your own clone protection scheme that includes criteria that you select from a list. You also specify the minimum number of the selected criteria that must match when validating the license. For details, see Custom Scheme.
Summary of Schemes for Virtual Machines
>Platform Default: Instructs Sentinel LDK to automatically apply the most appropriate clone protection scheme for each end user based on various parameters. For details, see Using the "Platform Default" Scheme.
>VMType1: Uses three components to verify fingerprints: Virtual MAC address, CPU characteristics, and UUID. For details, see VMType1 Scheme.
>VMType2: Uses four components to verify fingerprints: Virtual MAC address, CPU characteristics, UUID, and Snapshot Rollback Detection.
>VMType3: Provides strong and reliable clone protection for cloud computing services such as Amazon EC2 and the Microsoft Azure virtualization platform. For details, see VMType3 Scheme.
>VMType4: Provides strong and reliable clone protection for Docker containers. For details, see VMType4 Scheme.
>FQDN: Uses the machine’s FQDN (Fully Qualified Domain Name) to verify fingerprints.
>Custom: You can define your own clone protection scheme that includes criteria that you select from a list. You also specify the minimum number of the selected criteria that must match when validating the license. For details, see Custom Scheme.
NOTE
If you are concerned that your customers may be willing to accept collisions in order to attempt to bypass clone protection, consider one of the other Sentinel LDK solutions that provides a different tradeoff of security and convenience and is not affected by such deployment.