RELATED Documents
 

Sentinel SuperPro Data Sheet

Sentinel LM Data Sheet

Sentinel SuperPro Net Data Sheet

Sentinel Hardware Keys Product Brief

Basic Considerations for Preventing Software Piracy

Best In Class Software Protection


SENTINEL SERIES FAQ'S
 

Why Sentinel?


User Login
 
User Name
Password
 
Forgot Password | Register

Sentinel Hardware Keys Product FAQ

What are Sentinel Keys?

Sentinel Hardware Keys are physical hardware tokens that protect software applications from piracy and unauthorized use, and are integrated into applications using a software toolkit. The key is then distributed along with the software application to the end user. The protected application checks for the presence of the key during runtime to ensure that the software usage is authorized and the parameters of the license agreement are enforced.

Why Use Sentinel Keys?

Asset Protection - Sentinel Keys protect against revenue loss so you receive fair compensation for your software development. Sentinel Hardware Keys use public key cryptography and 128-bit AES encryption to create the most secure token in the industry.

Fast, Flexible Licensing - Sentinel Hardware Keys allow software vendors to market more effectively by offering their customers flexible, user-friendly licensing. Implementation is quick and easy for your development team while providing powerful and highly flexible licensing.

How does Sentinel differ from other Software Protection Tokens?

Superior Protection
Sentinel Hardware Keys are the most secure hardware token available in the world. Both public key cryptography and 128-bit AES encryption are used to secure communications between the key and the protected application. In addition, the keys include internal authentication, which effectively prevents cloning of the keys.

Easier Implementation
Only Sentinel Keys feature Business Layer APIs. These are pre-configured, higher-level APIs for popular license models such as subscription, evaluation and pay-per-use. These tools typically reduce the programming time required to secure a new application by up to 60% or more compared to other hardware key solutions. Our unique V-Cell technology optimizes memory availability. With Sentinel Hardware Keys 8k of memory is used for the developer. This memory is used to store licenses and related information, and approximately 1k is directly accessible by the developer for data storage/usage. These tools typically reduce the programming time required to secure a new application by up to 60% or more compared to other hardware key solutions.

Additional Protection Layers
The Sentinel Shell offers a way to quickly protect your application without requiring any alteration to the source code. When used in conjunction with API level integrations, the Shell enhances overall security by adding multiple layers to thwart hacking attempts.

Most Flexible Licensing Models
In addition to pre-configured license models, you can generate licenses based on numerous criteria such as time, a fixed number of executions or a set expiration date. Multiple license configurations can be created during development and customized at fulfillment. This flexibility allows you to offer a variety of licenses from only one development effort.

More Reliable Time-Based Licensing
The Sentinel Hardware Key V-Clock allows you to reliably and securely offer time-based license models such as trial, demo or subscription without the need for an on-board battery.

Better Distributor Control
Sentinel Hardware Keys allow you to carefully control and regulate your distribution channels through the use of Distributor Keys.

More Secure License Updates
Sentinel technology enables software vendors to send updates to keys in the field in a secure, controlled manner.

What types of Licenses Models are supported?

License models supported include evaluation, feature-based, pay-per-use, standalone, network and more. Licenses can be based on time, a fixed number of executions or a set expiration date.

The Sentinel Hardware Key V-Clock allows you to reliably and securely offer time-based license models such as trial, demo or subscription. The V-Clock checks and stores the system time in the Hardware Key, then checks repeatedly to verify consistency. If the system time ever differs significantly from the last known date and time, the application can be disabled or run in a restricted mode. When the evaluation license expires you can remotely update the Sentinel Key with an additional trial license or upgrade to a fully functioning application.

Where is the return on an investment in Sentinel Keys?

Nearly $33 billion in software was pirated worldwide in 2004 (Business Software Association). Sentinel Hardware Keys ensure that software vendors are able to protect their markets and intellectual property from loss due to piracy. For further information on piracy and curtailing the impact of piracy, please read our whitepaper.

In addition to preventing piracy, the flexible licensing provided by Sentinel allows you to reach new markets, leading to increased revenue. Sentinel Keys also help decrease development costs with features such as Business Layer APIs™ that speed implementation time compared to other protection solutions.

To calculate your return on investment, please use our ROI Calculator.

How do I implement Sentinel Keys?

The best implementation of any protection scheme should include complete integration into your application through APIs. Sentinel Business Layer APIs™ are pre-configured, higher level APIs for popular license models such as subscription, evaluation and pay-per-use. By using Sentinel Business Layer APIs, you can obtain the highest level of security and control over sophisticated license designs without spending time on lower level programming. These tools typically reduce the programming time required to secure a new application by up to 60% or more compared to other hardware key solutions.

In addition to APIs, the Sentinel Shell offers a way to quickly add protection to your application without requiring any alteration to the source code. When used in conjunction with API level integrations, the Shell greatly enhances overall security.

Will implementation of Sentinel Keys delay my product launch?

The time it takes to implement Sentinel Keys varies depending on the type of license models that you plan to implement and the number of applications you need to protect.

By using Sentinel Business Layer APIs™, you can obtain the highest level of security and control over sophisticated license designs without spending time on lower level programming. Business Layer APIs are pre-configured, higher level APIs for popular license models such as subscription, evaluation and pay-per-use. These tools typically reduce the programming time required to secure a new application by up to 60% or more compared to other hardware key solutions.

The Sentinel Shell enhances overall security when used in conjunction with API level integrations and requires only minutes to implement.

Can I update keys that have been deployed?

Sentinel technology enables ISVs to send updates or additional licenses to keys in the field in a secure, controlled manner. Updates are sent using the same high level of security as communications between the hardware token and the software application.

How do I enable my distributors to fulfill licenses?

Sentinel Hardware Keys allow you to securely control your distribution channels through the use of Distributor Keys. You can assign and securely imbed encryption keys during the manufacturing process in order to control the creation of licenses through your channels. Distributor Keys can enforce limits such as a maximum number of licenses or the creation of trial versions only.

Are end-users able to control license usage?

Network administrators can cancel licenses in order to redistribute among users or revoke idle licenses. This provides administrators with the ability to control optimal license use across the enterprise.

How do I get started with Sentinel Keys?

We offer an Evaluation Kit that you can use to test the creation and implementation of software protection with a Sentinel Hardware Key. Our starter pack includes the software and 10 keys. Click here to request a Kit.

Are the Sentinel Keys RoHS compliant?

Yes. Effective the 2nd quarter of 2005, all new SafeNet products will be built fully RoHS compliant. Legacy products are also being transitioned into RoHS compliance.

Why SafeNet?

Only SafeNet offers a complete suite of services and products for your entire software lifecycle. With SafeNet, you can protect and enable revenue, automate fulfillment and ongoing management, and monitor and mitigate piracy threats. SafeNet also offers superior worldwide technical support via telephone, email and Internet. Our SafeNet Service Guarantee ensures that you consistently receive the highest level of service.

SafeNet is one of the big three providers of information security technology with more NSA certified products than any company in the world. Customers of SafeNet include Fortune 500 companies and US Government agencies for which information security can accept no failures.