Default banner

Sentinel LDK Cross-Locking

Strong Enforcement through Cross-Locking Technology

Sentinel LDK Cross-Locking

Sentinel LDK Cross-LockingSentinel LDK’s Cross-Locking™ technology enables ISV’s to select the locking method once protection has been put into place.

  • Sentinel LDK Protection Types
  • Sentinel LDK Features
  • Features & Benefits

Benefits of the Sentinel HL hardware-based protection keys

  • Utmost security – all Sentinel HL hardware-based protection keys employ a highly secure SmartCard chip providing the utmost security against malicious hardware attacks such Differential Power Analysis (DPA) and electron microscopy.
  • Highly Customizable – provides more real estate for the purpose of a personalized logo or text.
  • Future proof – add future functionality and enhancements to in-the-field deployed keys using our unique UpdateOnChip™ mechanism. 
  • Enables portability – the protected software can be used on any PC to which the Sentinel HL key is connected without requiring an active Internet connection in order to use or activate the software.

Benefits of the Sentinel SL software-based protection keys

  • Strong software-based copy protection in cases where protection with a hardware-key is prohibited.
  • Full ESD (Electronic Software Distribution) supports allowing you to sell, distribute, and activate your protected application over the Internet.
  • Instantaneous Activation - end-users can download the software and immediately start using it with its fully-licensed functionality.
  • The optional user registration process allows you to gather end-user specific information that can be later user for various marketing and up-sell activities.

View a full list of Sentinel HL hardware-based Protection keys
More information on Sentinel SL software-based Protection keys

  • Resources