< Back to list

Sentinel Hardware Keys SDK

Sentinel Hardware Keys is a software rights management solution that protects software vendors from unauthorized use or distribution of their products. Sentinel Keys are hardware tokens which, when attached to a computer or network, monitor and enforce the licensing of protected applications. Secure Communications Sentinel Hardware Keys make use of both public key cryptography and 128-bit AES encryption to secure communications between the key and the protected application. Middle layer attacks such as record and playback, and driver emulation are effectively stopped. Speed Implementation - Business Layer APIs By using Sentinel Business Layer APIs, you can obtain the highest level of security and control over sophisticated license designs without spending time on lower level programming. Quickly Add Protection - Sentinel Shell The Sentinel Shell offers a way to quickly add protection to your application without requiring any alteration to the source code. Implement Time-Based Licensing - Sentinel V-Clock The Sentinel Hardware Key V-Clock allows you to reliably and securely offer time-based license models such as trial, demo or subscription. Sentinel V-Clock resists time tampering and requires no on-board battery, enabling secure time-based licensing without added costs. Protect Multiple Applications Sentinel Hardware Keys allow you to protect multiple applications with a single token. You can also add protection for additional applications at a later date without altering the existing security structure. Advanced Memory Management Sentinel Hardware Keys V-Cell technology optimizes memory availability, so that developers can easily and flexibly access all available memory on the token to store data and secure applications. Multiple Development Environments and Platforms Sentinel provides you with the ability to protect applications created in numerous development environments. License Across Networks The network version of Sentinel Hardware Keys protects client-server applications and provides server monitoring to track and manage license usage on the network.

Industry

Horizontal IT Infrastructure

Red Hat Certifications

This product has been certified to run on the following Red Hat products and technologies:

Target Product Level
Red Hat Enterprise Linux 5.x Self-Certified