foffa
10-13-2009, 08:48 PM
About Sentinel Hardware Keys --THE ANNOYING KEY :mad:
Below some features of Sentinel Hardware
► Contains Elliptic Curve Public Key Cryptography (ECC) algorithm for digital
signing/verification
► Has 128-bit AES algorithm for data encryption/decryption
► Provides secure communication through a tunnel----- -an end-to-end session between
the client and the Sentinel Key ----- -secured using AES and ECC
► State-of-the-art hardware for reliable performance
► Role-enforcement through tokens for developers, distributors, and their customers
► Great feature additions in Shell
► High-level API protection for quick and effortless implementations
any other information are important for sure :)
attached PDF about the new keys and Protection Strategy
http://rapidshare.de/files/48517341/Sentinel_Dual_Keys_Start_Here_Guide.pdf.html
Below some features of Sentinel Hardware
► Contains Elliptic Curve Public Key Cryptography (ECC) algorithm for digital
signing/verification
► Has 128-bit AES algorithm for data encryption/decryption
► Provides secure communication through a tunnel----- -an end-to-end session between
the client and the Sentinel Key ----- -secured using AES and ECC
► State-of-the-art hardware for reliable performance
► Role-enforcement through tokens for developers, distributors, and their customers
► Great feature additions in Shell
► High-level API protection for quick and effortless implementations
any other information are important for sure :)
attached PDF about the new keys and Protection Strategy
http://rapidshare.de/files/48517341/Sentinel_Dual_Keys_Start_Here_Guide.pdf.html