Software Copy Protection
To ensure you get paid for every software copy being used, Sentinel HASP employs the 128-bit algorithm. This creates a robust link between the software application and Sentinel HASP Protection Key – preventing software piracy and ensuring authorized use of the software.
During runtime the protected software sends encrypted strings to the protection key (HASP HL or HASP SL) which decrypts the strings and produces a response that cannot be imitated. If the response from the protection key is correct, the application will run. If the protection key is not present or the response from the key is incorrect, the application will not run.
You can use more than 64,000 encryption keys when protecting your software. This enables unique security for every application, module, and feature and ensures that the HASP SL software-based protection doesn't compromise the security of HASP HL hardware-keys.
White Paper - How to Get Software Licensing Right the First Time
This white paper explains why building a cohesive licensing team and aligning it with your business processes should take priority over integrating licensing technology with your software products.
Download the White Paper