Sentinel Hardware Keys (SHK)
Software Rights Management Solution
Sentinel Hardware Keys are a software rights management solution that protects software vendors from unauthorized use or distribution of their products.
In 2007, nearly $48 billion in software was pirated worldwide (Business Software Association). Sentinel tokens are hardware keys which, when attached to a computer or network, monitor and enforce the licensing of protected applications. Sentinel Hardware Keys help software developers combat the continually evolving threat of software piracy.
Over 40 million licenses worldwide are protected by Gemalto Sentinel hardware keys. Sentinel has been setting the standard for software protection since 1984 and secures more clients worldwide than any other hardware key.
Strongest Piracy Protection
- Public key cryptography and 128-bit AES encryption secure communications between the key and the protected application
- A unique encryption key is used for every communication session between the application and the hardware token
Quickly Added Protection and Obfuscation
- Sentinel Shell enhances overall security by adding multiple layers in addition to preventing memory dumping and protecting against debuggers
Rapid Deployment
- Sentinel Keys include Business Layer APIsTM, pre-configured, higher level APIs for popular license models
- Reduce implementation time by up to 60% or more
Secure Time-Based Licensing
- Sentinel V-ClockTM prevents time tampering without added costs

Product Brief - Sentinel HL
Sentinel HL is the hardware-based protection and licensing component used in Sentinel LDK and is offered in a variety of form factors including USB, ExpressCard, Board and Chip. Learn more in the Sentinel HL Product Brief.
Download the Product Brief
LEAP Newsletter
LEAP is your essential quarterly guide to software licensing, entitlement, and protection.
Read the Newsletter
Minimum System Requirements
- Pentium II or above (450 MHz or above)
- VGA Monitor with 024 x 768 resolution (1152 x 868 recommended)
- 280 MB free hard disk space
- 128MB RAM (256 MB recommended)
- Java 2 Runtime Environment version 1.6
- Internet Explorer 5.0 or higher
- Adobe Reader 4.0 or higher
Supported Compilers
- Microsoft Visual C++
- Microsoft Visual Basic
- Microsoft Visual C#.NET
- Microsoft Visual Basic .NET
- Borland C
- Borland C++ Builder
- Borland Delphi (5.0, 6.0, 7.0)
- Java (1.5, 1.6)
- AutoCAD (14, 2000, 2004, 2005, 2007)
Supported Networks
- TCP/IP
- IPX
- NetBEUI
- HTTP (only for License Monitoring tool)
Certifications
- Windows Hardware Quality Labs certified for Windows 2003 and Windows XP (32-bit & 64 bit))
Operating Systems
Linux
- Red Hat Enterprise Linux ES/AS version 3.0 and 4.0
- Red Hat Enterprise Linux WS/ Desktop version 3.0 and 4.0
- Fedora Core 4 and 5
- SuSe 9.3 and 10.0
Macintosh
- Macintosh 10.3.9 and 10.4.x for PowerPC
- Macintosh 10.4.x for Intel
Windows
- 98 (client only)
- ME (client only)
- NT (network clients only)
- 2000, 2003, 2008
- Win 7
- XP (32-bit & 64-bit)
- Vista (32-bit & 64-bit)

Product Brief - Sentinel HL
Sentinel HL is the hardware-based protection and licensing component used in Sentinel LDK and is offered in a variety of form factors including USB, ExpressCard, Board and Chip. Learn more in the Sentinel HL Product Brief.
Download the Product Brief
LEAP Newsletter
LEAP is your essential quarterly guide to software licensing, entitlement, and protection.
Read the Newsletter
Secure Communications – World’s Most Secure Hardware Key
-
Public key cryptography and 128-bit AES encryption secure communications between the key and the protected application
-
Middle layer attacks such as record and playback, and driver emulation are effectively stopped
-
A unique encryption key is used for every communication session between the application and the hardware key
Speed Implementation - Business Layer APIs™
-
Pre-configured, higher level APIs for popular license models
-
Obtain the highest level of security and control over sophisticated license designs without spending time on lower level programming
-
Reduce implementation time by up to 60% or more compared to other hardware key solutions
Quickly Add Protection and Obfuscation - Sentinel Shell
-
Enhances overall security by adding multiple layers in addition to preventing memory dumping and protecting against debuggers
-
No alteration to the source code required
-
Sentinel Hardware Keys are the first to enable wrapping protection for Microsoft .NET framework version 2.0, in addition to the most commonly used platforms.
Simplify Updates and Activation
-
Send updates or additional licenses to keys in the field in a secure, controlled manner
-
Updates are sent using the same high level of security as communications between the hardware token and the software application
Secure Time-Based Licensing
-
Sentinel V-ClockTM prevents time tampering without added costs
-
Sentinel Hardware Keys are also available with a Real Time Clock (RTC) for added security
Secure Distribution Channels - Sentinel Distributor Hardware Keys
-
Carefully control and regulate the creation of licenses through distribution channels
Multiple Development Environments and Platforms
-
Sample code for the most popular environments is provided
-
Support applications on multiple operating platforms with a single development effort
- Protect multiple applications with a single hardware key
- License across networks
Obtain Superior Technical Support
-
The Gemalto Technical Services organization provides worldwide telephone, email and Internet-based support to our customers. Our Gemalto Service Guarantee ensures the highest level of service. The Sentinel Integration Center provides online resources to assist developers through the implementation process.

Product Brief - Sentinel HL
Sentinel HL is the hardware-based protection and licensing component used in Sentinel LDK and is offered in a variety of form factors including USB, ExpressCard, Board and
Chip. Learn more in the Sentinel HL Product Brief.
Download the Product Brief
LEAP Newsletter
LEAP is your essential quarterly guide to software licensing, entitlement, and protection.
Read the Newsletter