New Sentinel Real Time Clock (RTC)
Sentinel Hardware Keys are a software rights management solution that protects software vendors from unauthorized use or distribution of their products. Sentinel Keys are hardware tokens which, when attached to a computer or network, monitor and enforce the licensing of protected applications. Sentinel Keys help ISVs combat the continually evolving threat of software piracy, which is more widespread and more sophisticated than ever before.
Over 35 million applications worldwide are protected by SafeNet Sentinel™ hardware keys. Sentinel has been setting the standard for software protection since 1984 and secures more clients worldwide than any other key.
Sentinel Hardware Keys are the most secure hardware token available in the world. Both public key cryptography and 128-bit AES encryption are used to secure communications between the key and the protected application. Middle layer attacks such as record and playback, and driver emulation are effectively stopped. A unique encryption key is used for every communication session between the application and the hardware token, making brute force attacks virtually impossible. In addition, the keys include internal authentication, which effectively prevents cloning of the keys.
Speed Implementation - Business Layer APIs™
The best implementation of any protection scheme should include complete integration into your application through APIs. By using Sentinel Business Layer APIs, you can obtain the highest level of security and control over sophisticated license designs without spending time on lower level programming. Business Layer APIs are pre-configured, higher level APIs for popular license models such as subscription, evaluation and pay-per-use. These tools typically reduce the programming time required to secure a new application by up to 60% or more compared to other hardware key solutions.
Simplify Updates and Activation
Sentinel APIs also include Logical Addressing which allows developers to add or change implementations without being concerned about specific memory address usage. This greatly speeds development time as well as reducing risk of error from overwriting information in memory cells.
With Sentinel Hardware Keys, you can also program multiple keys at once and customize license models at the production stage. License configuration can be altered without requiring further development changes. Sentinel technology allows ISVs to send updates or additional licenses to keys in the field in a secure, controlled manner. Updates are sent using the same high level of security as communications between the hardware token and the software application.
Quickly Add Protection - Sentinel Shell
The Sentinel Shell offers a way to quickly add protection to your application without requiring any alteration to the source code. When used in conjunction with API level integrations, the Shell enhances overall security by adding multiple layers to thwart hacking attempts. The Sentinel Shell compresses the code in order to reduce total application size to make reverse engineering even more difficult. Additionally, the Shell prevents memory dumping and includes protection against debuggers. With the Sentinel Shell, you can imbed licensing and protect your application in minutes, even if don't have access to source code.
Implement Time-Based Licensing - Sentinel V-Clock™
The Sentinel Hardware Key V-Clock allows you to reliably and securely offer time-based license models such as trial, demo or subscription. Sentinel V-Clock resists time tampering and requires no on-board battery, enabling secure time-based licensing without added costs.
Secure Your Distribution Channels - Sentinel Distributor Keys™
Sentinel Hardware Keys allow you to carefully control and regulate your distribution channels through the use of Distributor Keys. You can assign and securely imbed encryption keys during the manufacturing process in order to control the creation of licenses through your channels.
Protect Multiple Applications
Sentinel Hardware Keys allow you to protect multiple applications with a single token. You can also add protection for additional applications at a later date without altering the existing security structure.
Advanced Memory Management
Sentinel Hardware Keys V-Cell technology optimizes memory availability, so that developers can easily and flexibly access all available memory on the token to store data and secure applications.
Multiple Development Environments and Platforms
Sentinel provides you with the ability to protect applications created in numerous development environments. Sample code for the most popular environments is also provided, such as Microsoft Visual C++, Microsoft Visual Basic and Microsoft .NET to get you started on custom applications. With Sentinel you can support your application on multiple operating platforms with a single development effort, further reducing development time and cost.
License Across Networks
The network version of Sentinel Hardware Keys protects client-server applications and provides server monitoring to track and manage license usage on the network.
Obtain Superior Technical Support
The SafeNet Technical Services organization provides worldwide telephone, email and Internet-based support to our customers. Our SafeNet Service Guarantee ensures that you consistently receive the highest level of service. The Sentinel Integration Center provides online resources to assist your development staff through the implementation process.
Sentinel Hardware Keys are also available with a Real Time Clock (RTC)
The on-board clock allows you to reliably and securely offer time-based license models such as trial, demo or subscription. A clock is stored inside the hardware key, offering a non-repudiated time source and the highest level of protection against time tampering.
With Sentinel Keys RTC, you can meet your customers' needs for flexible time-based licensing while protecting your revenue streams. RTC Keys also allow end users to place timestamps (hours, minutes, seconds) and date (day, month, year) on the output of an application for definitive time recording purposes. To ensure reliability, the battery which powers the internal clock, has a life expectancy of four to six years.