Sie sind auf Seite 1von 2

Sentinel Hardware Keys THE MOST SECURE HARDWARE TOKEN IN THE WORLD

Benefits
Sentinel
Unmatched Protection
The highest level of protection
against piracy available, includes
public key cryptography and 128-
bit AES encryption
Hardware Keys
The Most Secure Hardware Token in The World

Protect Against Piracy


Secure Time-Based Licensing
Sentinel V-ClockTM also prevents Over 35 million applications worldwide are
time tampering without protected by SafeNet hardware keys.
added costs Sentinel has been setting the standard for
software protection since 1984 and secures
Rapid Deployment more clients worldwide than any other key.
Business Layer API™ framework Secure Communications
reduces implementation time by up
to 60% or more, providing most Sentinel Hardware Keys are the most Simplify Updates and Activation
secure implementation possible
secure hardware token available in the Sentinel APIs also include Logical Addressing
world. Both public key cryptography which allows developers to add or change
Trusted Distribution and 128-bit AES encryption are used implementations without being concerned
Securely control and regulate your to secure communications between about specific memory address usage. This
distribution channels with the key and the protected application. greatly speeds development time as well as
Distributor Keys Middle layer attacks such as record reducing risk of error from overwriting
and playback, and driver emulation are information in memory cells.
Quickly Added Protection effectively stopped. A unique encryption With Sentinel Hardware Keys, you can
Sentinel Shell enhances overall key is used for every communication also program multiple keys at once and
security by adding multiple layers session between the application and customize license models at the production
to thwart hacking attempts. The the hardware token, making brute force stage. License configuration can be altered
Shell also includes protection
attacks virtually impossible. In addition, the without requiring further development
against debuggers, making reverse
engineering even more difficult. keys include internal authentication, which changes. Sentinel technology allows ISVs
effectively prevents cloning of the keys. to send updates to keys in the field in a
secure, controlled manner. Updates are
Speed Implementation — Business sent using the same high level of security
Layer APIsTM as communications between the hardware
The best implementation of any protection token and the software application.
scheme should include complete integration
into your application through APIs. By using Quickly Add Protection —
Sentinel Business Layer APIs, you can obtain Sentinel Shell
the highest level of security and control over The Sentinel Shell offers a way to quickly
sophisticated license designs without add protection and obfuscation to your
spending time on lower level programming. application without requiring any
Business Layer APIs are pre-configured, alteration to the source code. When used in
higher level APIs for popular license models conjunction with API level integrations, the
such as subscription, evaluation and pay- Shell enhances overall security by adding
per-use. These tools typically reduce the multiple layers to thwart hacking
programming time required to secure a new attempts. Additionally, the Shell prevents
application by up to 60% or more compared memory dumping and includes protection
to other hardware key solutions. Reducing against debuggers, making reverse
and simplifying the required programming engineering even more difficult. With the
steps also improves implementation quality Sentinel Shell, you can embed licensing
and security. and protect your application in minutes,
even if you don't have access to
source code.
Implement Time-Based Licensing — Exceptional Reliability Technical Specifications
Sentinel V-ClockTM Advanced mirroring technology ensures an
Minimum System Requirements
The Sentinel Hardware Key V-Clock allows exceptionally high level of reliability by self-
you to reliably and securely offer time-based correcting any errors in communication to • Pentium II or above (450 MHz or above)
license models such as trial, demo or the key. • VGA Monitor with
1024 x 768 resolution
subscription. The V-Clock checks and stores
(1152 x 868 recommended)
the system time in the Hardware Key, then Multiple Development
Environments and Platforms • 280 MB free hard disk space
checks repeatedly to verify consistency. If
the system time ever differs significantly • 128MB RAM
Sentinel provides you with the ability to (256 MB recommended)
from the last known date and time, the protect applications created in numerous
• Java 2 Runtime Environment version 1.6
application can be disabled or run in a development environments. Sample code
restricted mode. Sentinel V-Clock comes • Internet Explorer 5.0 or higher
for the most popular environments is also
standard with Sentinel Keys and requires provided, such as Microsoft Visual C++, • Adobe Reader 4.0 or higher
no on-board battery, effectively preventing Microsoft Visual Basic and Microsoft .NET Supported Compilers
time tampering without added costs. to get you started on custom applications. • Microsoft Visual C++
Secure Your Distribution Channels With Sentinel you can support your • Microsoft Visual Basic
— Sentinel Distributor KeysTM application on multiple operating platforms
• Microsoft Visual C#.NET
with a single development effort, further
Sentinel Hardware Keys allow you to carefully • Microsoft Visual Basic .NET
reducing development time and cost.
control and regulate your distribution • Borland C
channels through the use of Distributor License Across Networks • Borland C++ Builder
Keys. You can assign and securely embed The network version of Sentinel Hardware • Borland Delphi (5.0, 6.0, 7.0)
encryption keys during the manufacturing Keys protects client-server applications and • Java (1.5, 1.6)
process in order to control the creation of provides server monitoring to track license • AutoCAD (14, 2000, 2004, 2005, 2007)
licenses through your channels. Distributor usage on the network. Sentinel Keys empower
Keys can enforce limits such as a maximum Supported Networks
network administrators to cancel licenses in
number of licenses or the creation of trial • TCP/IP
order to redistribute among users or revoke
versions only. Sentinel Hardware Keys idle licenses. This provides administrators • IPX
allow you to secure each link in your with the ability to control optimal license use • NetBEUI
distribution chain. across the enterprise. • HTTP (only for License Monitoring tool)

Protect Multiple Applications Certifications


Obtain Superior Technical Support
• Windows Hardware Quality Labs certified
Sentinel Hardware Keys allow you to protect The SafeNet Technical Services organization for Windows 2003 and Windows XP (32-bit)
multiple applications with a single token. provides worldwide telephone, email and
With Sentinel multi-tasking technology, Internet-based support to our customers. Operating Systems
unique independent sessions are employed Our SafeNet Service Pledge ensures that you Linux
simultaneously for each application all while ■ • Red Hat Enterprise Linux ES/AS version 3.0
consistently receive the highest level of service.
maintaining the same high level of security and 4.0
The Sentinel Integration Center provides online ■ • Red Hat Enterprise Linux WS/Desktop
and without any degradation in performance. resources to assist your development staff version 3.0 and 4.0
You can even add protection for additional through the implementation process. ■ • Fedora Core 4 and 5
applications at a later date without altering ■ • SuSe 9.3 and 10.0
the existing security structure.
Macintosh
■ • Macintosh 10.3.9 and 10.4.x for PowerPC
■ • Macintosh 10.4.x for Intel

Windows
• 98 (client only)
• ME (client only)
• NT (network clients only)
• 2000
• 2003
• XP (32-bit & 64-bit)
• Vista (32-bit & 64-bit)
Corporate Headquarters: 4690 Millennium Drive, Belcamp, Maryland 21017 USA
Tel.: +1 410 931 7500 or 800 533 3958, Fax: +1 410 931 7524, Email: info@safenet-inc.com
EMEA Headquarters: Tel.: + 44 (0) 1276 608 000, Email: info.emea@safenet-inc.com
APAC Headquarters: Tel: + 852 3157 7111, Email: info.apac@safenet-inc.com

For all office locations and contact information, please visit www.safenet-inc.com/company/contact.asp

www.safenet-inc.com

©2007 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
All other product names are trademarks of their respective owners.

Das könnte Ihnen auch gefallen