Sentinel Hardware Keys
The Most Secure Hardware Token in The World
                                     Protect Against Piracy
                                     Over 40 million licenses worldwide are
                                     protected by SafeNet hardware keys. Sentinel
                                     has been setting the standard for software
                                     protection since 1984 and secures more
                                     clients worldwide than any other key.
                    Benefits
                                     Secure Communications
   Unmatched Protection              Sentinel Hardware Keys are the most secure
  The highest level of protection    hardware token available in the world. Both
                                     public key cryptography and 128-bit AES en-
         against piracy available,
                                     cryption are used to secure communications        overwriting information in memory cells.
includes public key cryptography
                                     between the key and the protected applica-        With Sentinel Hardware Keys, you can also
     and 128-bit AES encryption
                                     tion. Middle layer attacks, such as record and    program multiple keys at once and custom-
                                     playback, and driver emulation are effectively    ize license models at the production stage.
               Secure Time-          stopped. A unique encryption key is used for      License configuration can be altered without
             Based Licensing         every communication session between the           requiring further development changes. Sen-
         Sentinel V-ClockTM also     application and the hardware token, making        tinel technology allows software vendors to
       prevents time tampering       brute force attacks virtually impossible. In      send updates to keys in the field in a secure,
           without added costs       addition, the keys include internal authentica-   controlled manner. Updates are sent using
                                     tion, which effectively prevents cloning of the   the same high level of security as communi-
         Rapid Deployment            keys.                                             cations between the hardware token and the
                                                                                       software application.
   Business Layer API™ frame-        Speed Implementation—
  work reduces implementation                                                          Quickly Add Protection—
                                     Business Layer APIs TM
   time by up to 60% or more,
                                                                                       Sentinel Shell
         providing most secure       The best implementation of any protection
       implementation possible       scheme should include complete integration        The Sentinel Shell offers a way to quickly add
                                     into your application through APIs. By using      protection and obfuscation to your applica-
       Trusted Distribution          Sentinel Business Layer APIs, you can obtain      tion without requiring any alteration to the
                                     the highest level of security and control over    source code. When used in conjunction with
   Securely control and regulate     sophisticated license designs without spend-      API level integrations, the Shell enhances
      your distribution channels     ing time on lower level programming. Busi-        overall security by adding multiple layers to
           with Distributor Keys     ness Layer APIs are pre-configured, higher        thwart hacking attempts. Additionally, the
                                     level APIs for popular license models such        Shell prevents memory dumping and includes
Quickly Added Protection             as subscription, evaluation and pay-per-use.      protection against debuggers, making reverse
  Sentinel Shell enhances overall    These tools typically reduce the program-         engineering even more difficult. With the
     security by adding multiple     ming time required to secure a new appli-         Sentinel Shell, you can embed licensing and
                                     cation by up to 60% or more compared to           protect your application in minutes, even if
        layers to thwart hacking
                                     other hardware key solutions. Reducing and        you don’t have access to source code.
attempts.The Shell also includes
                                     simplifying the required programming steps
   protection against debuggers,
                                     also improves implementation quality and          Implement Time-Based
    making reverse engineering       security.
              even more difficult.                                                     Licensing—Sentinel V-Clock TM
                                     Simplify Updates and Activation                   The Sentinel Hardware Key V-Clock allows
                                                                                       you to reliably and securely offer time-
                                     Sentinel APIs also include Logical Addressing     based license models such as trial, demo or
                                     which allows developers to add or change          subscription. The V-Clock checks and stores
                                     implementations without being concerned           the system time in the Hardware Key, then
                                     about specific memory address usage. This         checks repeatedly to verify consistency. If the
                                     not only drastically speeds development           system time ever differs significantly from
                                     time, but also reduces the risk of error from     the last known date and time, the application
can be disabled or run in a restricted mode.                   This facilitates automation and provides more
Sentinel V-Clock comes standard with Senti-                    flexibility with your internal manufacturing
nel Keys and requires no on-board battery,                     and delivery systems, greatly reducing the
effectively preventing time-tampering without                  time required to fulfill Sentinel Keys.
added costs.
                                                               Exceptional Reliability
Secure Your Distribution                                                                                                                         Technical Specifications
                                                               Advanced mirroring technology ensures an
Channels —Sentinel Distributor                                 exceptionally high level of reliability by self-
Keys TM                                                        correcting any errors in communication to                                         Minimum System Requirements
                                                               the key.                                                                            • Pentium II or above (450 MHz or 	
Sentinel Hardware Keys allow you to care-                                                                                                            above)
fully control and regulate your distribution                                                                                                       • VGA Monitor with
channels through the use of Distributor Keys.                  Multiple Development                                                                  1024 x 768 resolution
You can assign and securely embed encryp-                      Environments and Platforms                                                            (1152 x 868 recommended)
tion keys during the manufacturing process                                                                                                         • 280 MB free hard disk space
in order to control the creation of licenses                   Sentinel provides you with the ability to pro-                                      • 128MB RAM
                                                               tect applications created in numerous devel-                                          (256 MB recommended)
through your channels. Distributor Keys can
                                                               opment environments. Sample code for the                                            • Java 2 Runtime Environment
enforce limits such as a maximum number of                                                                                                           version 1.6
licenses or the creation of trial versions only.               most popular environments is also provided,
                                                                                                                                                   • Internet Explorer 5.0 or higher
Sentinel Hardware Keys allow you to secure                     such as Microsoft Visual C++, Microsoft                                             • Adobe Reader 4.0 or higher
each link in your distribution chain.                          Visual Basic and Microsoft .NET to get you
                                                               started on custom applications. With Sentinel                                     Supported Compilers
                                                               you can support your application on multiple                                        • Microsoft Visual C++
Protect Multiple Applications                                  operating platforms with a single develop-                                          • Microsoft Visual Basic
                                                               ment effort, further reducing development                                           • Microsoft Visual C#.NET
Sentinel Hardware Keys allow you to protect
                                                               time and cost.                                                                      • Microsoft Visual Basic .NET
multiple applications with a single token.                                                                                                         • Borland C
With Sentinel multi-tasking technology,                                                                                                            • Borland C++ Builder
unique independent sessions are employed                       License Across Networks                                                             • Borland Delphi (5.0, 6.0, 7.0)
simultaneously for each application all while                                                                                                      • Java (1.5, 1.6)
maintaining the same high level of security                    The network version of Sentinel Hardware                                            • AutoCAD (14, 2000, 2004, 2005,
and without any degradation in performance.                    Keys protects client-server applications and                                          2007)
You can even add protection for additional                     provides server monitoring to track license
                                                                                                                                                 Supported Networks
applications at a later date without altering                  usage on the network. Sentinel Keys em-
                                                                                                                                                   • TCP/IP
the existing security structure.                               power network administrators to cancel
                                                                                                                                                   • IPX
                                                               licenses in order to redistribute among users                                       • NetBEUI
                                                               or revoke idle licenses. This provides admin-                                       • HTTP (only for License Monitoring tool)
Integrate License Fulfillment                                  istrators with the ability to control optimal
                                                               license use across the enterprise.                                                Certifications
Sentinel Keys include back office APIs
that enable you to integrate fulfillment of                                                                                                        • Windows Hardware Quality Labs
                                                                                                                                                     certified for Windows 2003 and
software licenses into your organization’s                     Obtain Superior                                                                      Windows XP (32-bit)
process. With back office APIs, you can create                 Technical Support
custom applications to program Sentinel Keys                                                                                                     Operating Systems
using your own internal applications without                   The SafeNet Technical Services organization                                       Linux
interruption to your existing business model.                  provides worldwide telephone, email and In-                                         • Red Hat Enterprise Linux ES/AS
                                                               ternet-based support to our customers. Our                                            version 3.0 and 4.0
                                                               SafeNet Service Pledge ensures that you con-                                        • Red Hat Enterprise Linux WS/
                                                               sistently receive the highest level of service.                                       Desktop version 3.0 and 4.0
                                                                                                                                                   • Fedora Core 4 and 5
                                                               The Sentinel Integration Center provides
                                                                                                                                                   • SuSe 9.3 and 10.0
                                                               online resources to assist your development                                        Macintosh
                                                               staff through the implementation process.                                           • Macintosh 10.3.9 and 10.4.x for
                                                                                                                                                     PowerPC
                                                                                                                                                   • Macintosh 10.4.x for Intel
                                                                                                                                                 Windows
                                                                                                                                                   • 98 (client only)
                                       Corporate Headquarters:                                                                                     • ME (client only)
                                       4690 Millennium Drive, Belcamp, Maryland 21017 USA                                                          • NT (network clients only)
                                       Tel.: +1 410 931 7500 or 800 533 3958, Fax: +1 410 931 7524,
                                       Email: info@safenet-inc.com                                                                                 • 2000
                                                                                                                                                   • 2003
                                       EMEA Headquarters:                                                                                          • XP (32-bit & 64-bit)
                                 ®     Tel.: + 44 (0) 1276 608 000, Email: info.emea@safenet-inc.com
                                                                                                                                                   • Vista (32-bit & 64-bit)
                                       APAC Headquarters:
                                       Tel: +852 3157 7111, Email: info.apac@safenet-inc.com
   www.safenet-inc.com                 For all office locations and contact information, please visit
                                       www.safenet-inc.com/company/contact.asp
                                       ©2008 SafeNet, Inc. All rights reserved. SafeNet and SafeNet logo are registered trademarks of SafeNet.
                                       All other product names are trademarks of their respective owners.