
Contents
viii Sentinel Hardware Keys Developer’s Guide
Key Programming APIs............................................................................................... 24
Developer Key.............................................................................................................. 25
Compiler Interfaces ..................................................................................................... 27
License Manager (Stand-alone)................................................................................... 28
Distributor Key ............................................................................................................ 29
Sentinel Keys ............................................................................................................... 29
Sentinel Keys Server.................................................................................................... 33
Sentinel Keys License Monitor..................................................................................... 35
Sentinel Protection Installer........................................................................................ 37
Configuration Files ...................................................................................................... 38
Remote Update Options............................................................................................... 38
Frequently Asked Questions........................................................................................ 38
Chapter 3 – Planning Application Protection and
Licensing Strategy......................................................................... 41
About Features, Templates, and Groups ..................................................................... 41
Planning Application Protection and Licensing Strategy ........................................... 50
Frequently Asked Questions........................................................................................ 58
Part 2: Designing and
Implementing Protection ................................. 63
Chapter 4 – Protecting Applications Using Shell .......................... 65
Add Shell Feature Dialog Box...................................................................................... 66
Adding Files................................................................................................................. 66
Providing Licensing Settings ....................................................................................... 67
Providing Networking Settings ................................................................................... 69
Providing Security Settings ......................................................................................... 71
Customizing Error Messages........................................................................................ 73
Customizing Shell Error Message Title ........................................................................ 73
Changing File Encryption Settings .............................................................................. 74
Applying Shell Protection............................................................................................ 76
Shell Protection Using the Command-Line Utility....................................................... 78
What’s Next? ............................................................................................................... 81