The Sentinel Envelope is an automatic file wrapper that provides robust intellectual property protection against software reverse engineering through file encryption, code obfuscation and system-level anti-debugging. This ensures that algorithms, trade secrets, and professional know-how embedded in the software are secured against hackers.
Software solutions not only consist of executables and DLLs, they also contain data files which may be of even greater value than the software applications themselves. In many cases, these data files contain highly sensitive information and Intellectual Property which must be secured against prying eyes and theft. The Sentinel Envelope creates multiple random layers of protection for each file, making it extremely complex and time consuming for hackers to remove while ensuring that software code is safe from exposure while en-route to its end-user destination. Increase your operational efficiency, improve your customer satisfaction, gain business insights and capture more revenue opportunities today with our products.
To protect data files, the Sentinel Envelope tool wraps the application, encrypting and controlling access to the software data files so that only authorized users and the hosting software can decrypt and upload them. In seconds, you get top-notch security and access-control for your entire product suite
The ToolBox is a GUI-based utility that helps familiarize you with the Sentinel Run-time API and generates code for inclusion in your software source code.
The Sentinel Run-time API lets you protect applications with direct calls to the Sentinel LDK protection key throughout the software's source code.
The Sentinel Envelope is responsible for checking whether the Sentinel HL key is connected to the host during software runtime. Both the encryption and decryptionmechanisms employ AES 128bit encryption ensuring a fully secured two-way communicationchannel confirming the presence of the key.
The weakest point in an application protected with any wrapping mechanism is the seambetween the application and the externally added code. This is the point which, once annulled,will disconnect the link to the hardware key, leaving the application unprotected. Consequently,this is the point at which most attackers will attempt to strike. Once they understand the codeand recognize its location, they can then operate in one of the following manners:
One of the strongest features of the Sentinel Envelope is its ability to protect the seam point by presenting numerous obstacles that prevent the protection link from being broken.This is achieved by supplying multi-layered protection code, added onto the application file dynamically during the protection process. Like train cars, these pieces of code are specifically designed to fit one-after-the-other.