Contact Us

Sentinel HASP - How Does it Work?

At your site, engineers use Sentinel HASP to protect your software and release a single protected application binary. Your product managers then create a variety of software packages for which they apply licenses, define Sentinel HASP Protection Keys and then distribute – either boxed, or via the internet. Once the end-user receives and installs the software, it can be used only after the Sentinel HASP Protection Key is applied. This depends on the type of key the product manager chose and was distributed with the software:

  • Sentinel HASP HL - in this case, the end-user connects the HASP HL key to the USB port of their PC.
  • Sentinel HASP SL - in this case the end-user transmits it electronically via the internet, to the HASP Business Studio Server. A Sentinel HASP SL key is sent back and installed on the end.

Sentinel HASP meets the needs of most ISVs currently seeking an easily managed protection, licensing and management system. Its unique Cross-Locking technology separates engineering and marketing processes, providing flexibility for vendors who are trying to stay competitive. Its intuitive, role-based tools make it easy for your staff to get up and running quickly. And because it comes from Gemalto, you can count on Sentinel HASP to offer the highest level of both copy and intellectual property protection available.

Sentinel HASP Provides Intellectual Property Protection


LEAP Newsletter

LEAP is your essential quarterly guide to software licensing, entitlement, and protection.

Read the Newsletter

Sentinel LDK Protection Types

Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.