Contact Us

Software Copy Protection

To ensure you get paid for every software copy being used, Sentinel HASP employs the 128-bit algorithm. This creates a robust link between the software application and Sentinel HASP Protection Key – preventing software piracy and ensuring authorized use of the software.

During runtime the protected software sends encrypted strings to the protection key (HASP HL or HASP SL) which decrypts the strings and produces a response that cannot be imitated. If the response from the protection key is correct, the application will run. If the protection key is not present or the response from the key is incorrect, the application will not run.

Software Copy Protection img

You can use more than 64,000 encryption keys when protecting your software. This enables unique security for every application, module, and feature and ensures that the HASP SL software-based protection doesn't compromise the security of HASP HL hardware-keys.

White Paper - How to Get Software Licensing Right the First Time

This white paper explains why building a cohesive licensing team and aligning it with your business processes should take priority over integrating licensing technology with your software products.

Download the White Paper

Back to Top

Contact Us

Thank you for your interest in our products. Please fill out and submit the form to receive more information about Gemalto or to be contacted by a Gemalto specialist.

Your Information

* Email Address:  
* First Name:  
* Last Name:  
* Company Name:  
* Phone:  
* Country:  
* State (US Only):  
* Province (Canada/Australia Only):  

By submitting this form I agree to receive information from Gemalto and its affiliates as described in our Privacy statement.