![sentinel hl key sentinel hl key](https://5.imimg.com/data5/BL/QP/MY-12916427/sentinel-hl-max-micro-500x500.jpg)
NOTE Sentinel LDK continues to support the older HASP HL keys. For more information, see Virtual Connection of HL Keys. NOTEA Sentinel HL key can be accessed using a virtual connection.
Sentinel hl key software#
Software may therefore be installed on multiple computers but will only run if the key is connected and authenticated by the software. This means that the key can be moved from one computer to another. Sentinel HL keys also have the advantage of portability. Furthermore, Sentinel LDK uses LicenseOnChip technology to protect Sentinel HL keys against license tampering.
![sentinel hl key sentinel hl key](https://i3.wp.com/vipdongle.com/mp/wp-content/uploads/2017/08/texdesinger.jpg)
In order for a user to access your software, and for it to function correctly, the key must be accessible by the application. Sentinel HL keys offer the highest level of security.
Sentinel hl key code#
The code fragments are only decrypted and executed inside the HL key. With AppOnChip, code fragments of selected functions in the protected application are protected from an attacker's eyes by storing them as encrypted data.
Sentinel hl key drivers#
(HID drivers are an integral part of the Windows operating system.) In many cases, it is possible to use these keys without installing any additional support software.
![sentinel hl key sentinel hl key](https://img.alicdn.com/uploaded/i3/253522989/T2g4u.XtlXXXXXXXXX_!!253522989.jpg)
>The Sentinel HL key is a physical USB or ExpressCard key that connects to a computer, or a chip that is embedded in the computer.
![sentinel hl key sentinel hl key](https://img.alicdn.com/uploaded/i2/253522989/T2UCNOXplaXXXXXXXX_!!253522989.jpg)
Two types of Sentinel protection keys are available: