Two types of Sentinel protection keys are available:
>The Sentinel HL key is a physical USB or ExpressCard key that connects to a computer, or a chip that is embedded in the computer.
>The Sentinel SL key is a software-based key that locks your software to a specific machine. Your software and the user license are locked to the Sentinel protection key that you select.
All Sentinel HL keys—with the exception of Sentinel HL Basic keys—contain internal read/write memory. You can use the memory to do any of the following:
>Control access to specific software modules and/or packages
>Assign a unique code to each software user
>Store licenses from your own licensing schemes
>Save passwords, program code, program variables, and other data
Sentinel HL keys are distributed with your software to end users. The keys connect to the end users’ computers. A variety of Sentinel HL keys are available to suit your requirements. Sentinel HL keys are available in either of two configurations:
NOTE Sentinel HL (HASP configuration) keys can be upgraded in the field to Sentinel HL (Driverless configuration) keys. For more information, see Upgrading Sentinel HL Keys.
•(On a Windows machine) Employ HID drivers instead of HASP key drivers. (HID drivers are an integral part of the Windows operating system.) In many cases, it is possible to use these keys without installing any additional support software.
•(On a Windows machine) Support the use of "AppOnChip" functionality. With AppOnChip, code fragments of selected functions in the protected application are protected from an attacker's eyes by storing them as encrypted data. The code fragments are only decrypted and executed inside the HL key. This provides significantly enhanced security for the application.
•(On a Linux machine) In many cases, it is possible to use these keys without installing any additional support software.
•Support a higher number of Features.
•Provide larger on-key memory space.
•All Driverless keys (except for Basic keys) support a virtual clock for time-based licenses.
•All Driverless keys (except for Basic keys) support concurrency (network-based licenses).
Sentinel HL keys offer the highest level of security. In order for a user to access your software, and for it to function correctly, the key must be accessible by the application. Furthermore, Sentinel LDK uses LicenseOnChip technology to protect Sentinel HL keys against license tampering.
Sentinel HL keys also have the advantage of portability. This means that the key can be moved from one computer to another. Software may therefore be installed on multiple computers but will only run if the key is connected and authenticated by the software.
NOTE A Sentinel HL key can be accessed using a virtual connection. For more information, see Virtual Connection of HL Keys.
NOTE Sentinel LDK continues to support the older HASP HL keys. All references to Sentinel HL keys in this document and other Sentinel LDK documents can be understood to include HASP HL keys unless the context of the reference clearly states otherwise.
Benefits of Sentinel HL Key Protection
Sentinel HL key protection provides the strongest level of protection against piracy. The correct functionality of the software depends on the internal logic of the Sentinel HL key, which is virtually tamper-proof.
In addition, Sentinel HL key protection:
>Offers the strongest enforcement for license terms, which are stored and protected inside the Sentinel HL key.
>Enables portability—the software can be used on any computer to which the Sentinel HL key is connected.
>Does not require transaction with the software vendor to enable activation of the Product.
Sentinel SL keys are virtual, software-based keys that reside in the secure storage of a specific computer. Sentinel SL keys provide the same functionality as Sentinel HL keys, without requiring physical distribution.
Sentinel SL keys are patterned on the functionality of Sentinel HL keys. However, the data is located in the secure storage of the computer on which the Sentinel SL key resides.
After your software is installed on a computer, the end user typically enters a Product Key that is sent, via the Internet or by file transfer, to Sentinel LDK-EMS, together with the fingerprint of the machine. Sentinel LDK-EMS confirms that the Product Key has not been used to activate the software on more than the permitted number of machines—as determined by you—then sends back the Sentinel SL key, which is installed on the end user’s machine. This process is also used for updating license terms.
The following types of Sentinel SL keys exist:
Benefits of Sentinel SL Key Protection
With Sentinel SL key protection:
•Product activation is instantaneous. End users can immediately start using the software with its fully-licensed functionality.
•The activation process for end users is convenient and transparent.
•The online connection with end users can enable user registration data to be collected and used for marketing purposes.
>When using a network license that is locked to a Sentinel SL key, you can specify that a license can be detached from the pool of network seats and attached to a remote recipient machine.
An unlocked license is one that is not locked to a specific machine. An application with an unlocked license (referred to as an Unlocked Product) is protected against disassembly. However, the protected application can be duplicated, installed, and used on any machine for as long as the unlocked license allows. Unlocked licenses are used in the following situations:
The ability to create and distribute trialware products without exposing the protected software to piracy provides a significant marketing advantage when selling software applications. Potential customers can work with the actual application and experience what the application has to offer and how it can benefit the individual or the organization. In addition, anybody that has access to trialware can copy it and distribute it to other people; this multiplies the exposure of the application within the marketplace. Each person who installs and works with the application must, at the end of the grace period (typically 30 to 90 days
Unlocked products are used when vendors want to protect their applications against reverse engineering but either:
• Have no need to license the application (for example, software that is part of a larger hardware package). The vendor may not need to protect against duplication of the software. However, they want to protect the software against theft of intellectual property.
• Are using a separate product or system to handle licensing of the software.
An unlocked product typically has no time restriction or has a long-term license.