Intellectual Property Protection with Sentinel Envelope
The Sentinel Envelope is an automatic file wrapper that provides robust intellectual property protection against software reverse engineering through file encryption, code obfuscation and system-level anti-debugging. This ensures that algorithms, trade secrets, and professional know-how embedded in the software are secured against hackers.
Software solutions not only consist of executables and DLLs, they also contain data files which may be of even greater value than the software applications themselves. In many cases, these data files contain highly sensitive information and Intellectual Property which must be secured against prying eyes and theft. The Sentinel Envelope creates multiple random layers of protection for each file, making it extremely complex and time consuming for hackers to remove while ensuring that software code is safe from exposure while en-route to its end-user destination.
How the Sentinel Envelope Works
To protect data files, the Sentinel Envelope tool wraps the application, encrypting and controlling access to the software data files so that only authorized users and the hosting software can decrypt and upload them. In seconds, you get top-notch security and access-control for your entire product suite
The ToolBox is a GUI-based utility that helps familiarize you with the Sentinel Run-time API and generates code for inclusion in your software source code.
The Sentinel Run-time API lets you protect applications with direct calls to the Sentinel LDK protection key throughout the software's source code.
View Specifications
Resource Library
Multiple, Non-obtrusive Calls to the Sentinel Hardware-based Protection Key
The Sentinel Envelope is responsible for checking whether the Sentinel HL key is connected to the host during software runtime. Both the encryption and decryption mechanisms employ AES 128bit encryption ensuring a fully secured two-way communication channel confirming the presence of the key.
Multi-layered Shield—Security for the Weakest Point
The weakest point in an application protected with any wrapping mechanism is the seam between the application and the externally added code. This is the point which, once annulled, will disconnect the link to the hardware key, leaving the application unprotected. Consequently, this is the point at which most attackers will attempt to strike. Once they understand the code and recognize its location, they can then operate in one of the following manners:
- Break the protection link for the specific application file – Specific hack.
- Break the protection link for all other files protected by the same mechanism if the exact same method appears in all of them repeatedly – Generic hack
One of the strongest features of the Sentinel Envelope is its ability to protect the seam point by presenting numerous obstacles that prevent the protection link from being broken. This is achieved by supplying multi-layered protection code, added onto the application file dynamically during the protection process. Like train cars, these pieces of code are specifically designed to fit one-after-the-other.
View Features & Benefits
Resource Library
- Automatic File Wrapper - Provide robust protection against software reverse engineering through file encryption and native code obfuscation.
- Re-connection of the Application to the Hardware - The application is now tightly coupled with the Hardware by means of a protection key.
- Secure communication channel - Sentinel LDK eliminates man-in-the-middle attacks by providing a secure channel for communication between the protected application and the protection key. The Java Envelope uses this ability to prevent a hacker from intercepting communications to access data sent back from the protection key.
- Run-time decryption - Because Sentinel LDK decrypts files as they are requested at run-time rather than loading all the .class files into the virtual machine at once, it prevents hackers from rebuilding the entire application.
View How to Buy
Resource Library