|Base Product||An original Sentinel LDK Product that has been created from scratch from which other Products may be created. All Modification Products, Unlocked Products and Cancellation Products are created from Base Products.|
A code consisting of five characters that represent your company's unique Vendor Code. When you order Sentinel protection keys from Thales, you specify your Batch Code, which is both written to the keys before dispatch and printed on the outside of each Sentinel HL key.
The Batch Code for Sentinel protection keys with a demo Vendor Code is DEMOMA.
|Billing address||Billing address is the address where you receive the statements for your credit card. For your order to be approved when shopping online, the billing address provided by you has to match this address.|
|C2V (Customer-to-Vendor) file||A file containing information on the actual status of one or more deployed Sentinel protection keys. C2V files are generated by end users using RUS, and can include data such as protected update counters, licenses, and memory images.|
A Product that cancels the licensing details of another Product.
A Cancellation Product can be used, for example,
> to revoke a deployed license
>to cancel the license for a Product that has been returned before its license terms have expired
|Catalog||Refers to the Features, and Products available in an EMS deployment.|
|Channel Partner||Refers to an company that is allowed to re-sell the publisher's Products. End users can buy directly from the publisher or from the channel partners.|
|Customer||Refers to the individual or company who places an order for your Products.|
|Demo Vendor Code - DEMOMA||Batch Code used for evaluation purposes with any Sentinel LDK application. Its corresponding Vendor Code is available in the VendorCodes folder of your Sentinel LDK installation.|
|Deployed||A Product (and the associated Features) for which Entitlements are created. A deployed Feature or Product cannot be deleted.|
|Detachable License||A Sentinel SL license that can temporarily be removed from a pool of network licenses and attached to a remote recipient machine for a defined period.|
(for an Entitlement)
|The date after which no operations, like login by Product Key and Activation are allowed on an Entitlement.|
A request for items to be shipped to a Customer, specifying one of the following:
> One or more Products to be applied to Sentinel protection keys. The license terms of each Feature in the ordered Products can be specified when the Product is defined, or when the Entitlement is processed.
> A Protection Key Update, specifying changes to be made to the license terms and/or data stored in one or more deployed Sentinel protection keys.
The current status of an Entitlement:
>Draft—The Entitlement is not yet ready to produce. It can be modified or deleted.
>Queued—The Entitlement is ready to produce.
>Product Keys generated—In an Entitlement for one or more Sentinel Product Keys, the Product Keys have been generated.
>Produced—In an Entitlement that includes multiple Product Keys, at least one Product Key has been used to activate the protected software. The Entitlement contains additional Product Keys that have not yet been used.
>Completed—In an Entitlement for updates or for Sentinel HL keys, the entire Entitlement has been produced. In an Entitlement for Product Keys, all the Keys in the Entitlement have been used to activate the protected software.
>Acknowledged—Verification has been received that the Entitlement has been applied at the end user site.
NOTE Entitlements with status other than Draft cannot be modified or deleted. However, Entitlements with certain status can be reset to Draft. See Reopen.
LDK License specifies how the Entitlement's items (Products and Features) can be used:
>Product Key—Associates the Entitlement's items with one or more Product Keys.
>Hardware Key—Writes the Entitlement's items to one or more Sentinel HL keys.
>Protection Key Update—Enables changes to be applied to the license data stored in deployed keys.
An identifiable functionality of a software application that can be independently controlled by a license. In Sentinel, a Feature may be an entire application, a module or a specific functionality such as Print, Save or Draw.
Features are combined to form Products. License terms are defined for each Feature in a Product.
|Feature ID||Unique identifier for a Feature in database.|
|Fulfillment||The complete process through which the Customer gets the Product and license.|
A period of time during which a user may run software without activation. This allows end users to activate a Product when most convenient for them. During the grace period, and even after activation, end users can pass copies of their purchased software to as many friends as they wish. When a friend installs the software, it automatically reverts to a limited trial version for the entire grace period. After the grace period expires, the software can no longer run until it is activated with a Sentinel protection key.
You can define a grace period for software protected with any Sentinel protection key. For example, software protected with Sentinel HL keys can be purchased and delivered over the Internet while the Sentinel HL keys are shipped, and end users can start using the software while waiting for the arrival of their hardware key.
To enable a grace period to be specified for a Product, the Product must be defined as Unlocked.
|HASP HL keys||Legacy hardware protection keys, now replaced by Sentinel HL keys.|
|HASP SL keys||Previous name for the software-based Sentinel SL Legacy keys.|
|LDKaaS||LDK-as-a-Service refers to Sentinel LDK EMS hosted and managed by Thales. (Can be used instead of a local, on-premises Sentinel LDK EMS installation.)|
|License||Digital permit stored in a Sentinel protection key.|
A task performed by business decision-makers, such as Product or Marketing Managers in an organization. The output of the license planning process is a repository of licensed Products that can be included in customer orders.
Sentinel EMS can be used without a licensing plan.
|License terms and license types||
License terms are defined for each Feature in a Product, and consist of:
> A license type
> A value for the license type
> A value for concurrent use, if relevant
> License accessibility settings
The following license types are available:
>Execution Count—Specifies the maximum number of times the Feature can be used.
>Expiration Date—Specifies the date on which the license expires.
>Perpetual—Specifies that the license is valid for an unlimited period of time.
>Time period—Specifies the number of days until the license expires, from the date of first use.
The license term values for each Feature in a Product can be specified when the Product is defined, or when an order for the Product is processed.
Network licenses that are locked to Sentinel SL keys may also be detachable.
|Locking Type||Determines the level of protection for a Product, according to the type of Sentinel protection key (HL or SL) supplied with the Product.|
Data, such as passwords, values used by the software, unique license terms, software version, site ID, and so on, that is specified in memory when a Product is defined or when an Entitlement is produced. This data is transferred to the Sentinel protection keys when:
> A Sentinel HL key Entitlement for the Product is produced
> A Protection Key Update for the Product is applied
> A Product is activated using a Sentinel SL key
A modified version of another Sentinel LDK Product containing changes such as:
> A software upgrade
> Extended license terms
> Added or removed Features
For example, a Modification Product can be sent as a Protection Key Update, to an end user who has the original Product and wishes to replace it.
|LDK Product||A Product in Sentinel EMS that can be used and licensed locally, either in a standalone (desktop) or a networked environment.|
A sellable item that contains one or more features and data defined in memory for secure storage. License terms are defined per feature in a product.
Logical partitions within a Batch Code to contain Features and Products.
NOTE Product Group was deprecated from Sentinel EMS 6.3.
A string generated by Sentinel EMS and supplied to an end user for use as proof of purchase, for the following purposes:
>Product Activation—The end user enters a Product Key that is sent to Sentinel EMS. A Sentinel SL key is sent back and installed on the users computer.
>Update Activation—The end user enters a Product Key that is sent to Sentinel EMS. License updates and extensions are sent back to the connected Sentinel HL key or to the installed Sentinel SL key.
NOTE The Product key must be used as supplied by Sentinel EMS without any modification.
The current status of a Product:
>Draft—The Product has been defined but has not yet been included in an Entitlement. It can be edited or deleted.
>Complete—The Product has been included in at least one Entitlement. It is not possible to edit or delete the Product.
>EOL (End of Life)—The Product is no longer available for Entitlements. The Product details are maintained for tracking purposes.
The implementation of an Entitlement. Depending on the type of Entitlement, the production process involves one of the following:
> Burning the ordered Products onto one or more Sentinel HL keys.
> Generating a file containing the Product Keys for the Entitlement.
> Generating a file containing the Protection Key Update for the Entitlement.
|Protect Once Deliver Many||
The concept of separating engineering and business processes, on which Sentinel is designed.
Engineering processes (software protection) are performed by software engineers using Sentinel protection tools (Sentinel Envelope, Sentinel ToolBox, and the Sentinel Licensing API).
Business processes (licensing and selecting the Sentinel protection key type) are performed by product managers using Sentinel EMS.
|Protection Key Update||Changes to the license terms and/or data stored in one or more deployed Sentinel protection keys. The new details are defined in an Entitlement for a Protection Key Update. A Protection Key Update can be applied remotely to Sentinel HL keys or Sentinel SL keys.|
|Real-time Clock (RTC)||Clock available in the Sentinel HL Time key and Sentinel HL NetTime key. See also V-Clock.|
|Recipient Machine||The computer to which a detachable license is temporarily attached to enable use of an application for a defined time period.|
|Reference IDs||Information that identifies an entity in a different system, for example, a Product code or order ID in your company's ERP system.|
|Reopen||Changes the status of a Queued Entitlement to Draft (allowing the Entitlement to be modified).|
|Rehosting||Allowing the end user to transfer a Sentinel SL protection key from one computer to another. The rehost process is performed entirely by the end user, with no interaction from the vendor.|
|Reports||Sentinel EMS reports provide access to selected current information from the Sentinel EMS database. Different predefined reports are available to meet various requirements. The reports provide information in tabular form and, where applicable, in a graphical chart.|
|Run-time Environment (RTE)||Sentinel component that is installed on an end user's computer and that enables communication between a protected program and a Sentinel protection key|
|RUS||Sentinel Remote Update System. A utility that enables secure, remote updating of deployed Sentinel protection keys.|
|Scheduled Report||A scheduled report is a report that is generated at a predetermined time.|
|Sentinel HL key||The hardware-based protection and licensing component of Sentinel. One of the Sentinel protection key types.|
|Sentinel HL Basic key||
Standard Sentinel HL local key that is used to protect software, and has a perpetual license. This key:
>does not have any memory functionality.
>does not support concurrency.
>does not support V-Clock.
|Sentinel HL network key||
Any Sentinel HL key that supports concurrency. This includes the following keys:
>Sentinel HL Net key
>Sentinel HL NetTime key
>Any Sentinel HL (Driverless configuration) key except for Sentinel HL Basic keys
|Sentinel HL (Driverless configuration) key||
Type of Sentinel HL key that does not require the Run-time Environment in order to protect an application on a Windows machine. These keys provide several advantages over Sentinel HL (HASP configuration) keys:
>(On a Windows machine) Employ HID drivers instead of HASP key drivers. (HID drivers are an integral part of the Windows operating system.) In many cases, it is possible to use these keys without installing any additional support software.
>Support a higher number of Features.
>Provide larger on-key memory space.
>All Driverless keys (except for Basic keys) support a virtual clock for time-based licenses.
>All Driverless keys (except for Basic keys) support concurrency (network-based licenses).
|Sentinel HL (HASP configuration) key||Type of Sentinel HL key that is fully compatible with protected applications that require the older HASP HL keys.|
|Sentinel HL key protection||
The protection level assigned to a Product when the Sentinel HL locking type is selected. Sentinel HL key protection:
> Offers the strongest enforcement for license terms, which are stored and protected inside the Sentinel HL key.
> Enables portability—the software can be used on any computer to which the Sentinel HL key is connected.
> Does not require Internet connection for activation of the Product.
|Sentinel Master key||A vendor-specific Sentinel HL key containing the confidential codes assigned by Thales. The key must be connected to Sentinel EMS.|
|Sentinel protection key||A Sentinel HL key or a Sentinel SL key, or both.|
|Sentinel SL key||
The software-based protection and licensing component of Sentinel—a virtual Sentinel HL key.
One of the Sentinel protection key types.
|Sentinel SL Legacy||Sentinel SL keys that were generated with versions of Sentinel HASP prior to Sentinel LDK v.6.0.|
|Sentinel SL key protection||
The protection level assigned to a Product when the Sentinel SL locking type is selected. With Sentinel SL key protection:
> Product activation is instantaneous. End users can immediately start using the software with its fully-licensed functionality.
> The activation process for end users is convenient and transparent.
> The online connection with end users can enable user registration data to be collected and used for marketing purposes.
|Shipping address||The address where you want to receive your orders is called the Shipping Address. It could be your home or office.|
(for an Entitlement)
The calendar day on which you can perform operations using the entitlement, such as activating the product key.
Software or data files that can be distributed without a Sentinel protection key for end-user evaluation during a limited time period. See also Unlocked Trialware Product.
|Unlocked Product||An Sentinel LDK Product that is distributed with an Unlocked license.|
|Unlocked Trialware Product||An Unlocked Product that is distributed as trialware for a period of up to 90 days.|
|User||A Sentinel LDK user.|
|User ID||A unique identifier for a Sentinel LDK user.|
The process by which the end user provides certain information when logging on to EMS for the first time using a Product Key. Behavior of this page differs with the value provided for the User Registration field during Entitlement creation.
>Mandatory—The end user needs to provide some information before he can activate the Product Keys.
>Desired—The User Registration page opens, but the end user can choose to skip this page by clicking Register Later.
>Not Required—The User Registration page does not appear.
|V-Clock (Virtual Clock)||Virtual clock available in Sentinel SL keys and Sentinel HL (Driverless configuration) keys. See also Real-time Clock.|
|V2C (Vendor-to-Customer) file||
A file that contains Protection Key Update data for delivery to end users. This data can include detailed changes to the license terms and/or data to be stored in the end user’s Sentinel protection keys.
The V2C file is generated by Sentinel EMS and can be deployed using RUS or the Sentinel Licensing API. The file name includes an ID, and the date and time it was created.
A confidential, vendor-unique string that enables access to the vendor-specific Sentinel protection keys. The Vendor Code contains vendor-specific secrets and applies to both Sentinel HL keys and to Sentinel SL keys.