Stage 2 - Design New Protection StrategySentinel Hardware Keys Developer’s Guide 259❑ Attach the Sentinel Dual Hardware Key to a USB port/hub on yoursystem.❑ Click the Build button to prototype the duplicated design.3. Distribute the latest Sentinel System Driver with your protected appli-cation to support Sentinel Dual Hardware Keys. You may allow thedriver to be downloaded from your Website. A copy can be down-loaded from SafeNet Website (http:// www.safenet-inc.com/support/tech/sentinel.asp).Stage 2 - Design New Protection StrategyIn stage 2, you will be implementing a new protection strategy using theSentinel Keys Toolkit. This can ideally be done for the upcoming releases ofyour software. You need to:1. Order the Sentinel Hardware Keys development kit through your Sen-tinel sales representative.2. After installation, use the Sentinel Keys Toolkit to implement superiorShell and/or high-level Business Layer API protection-including AES-based encryption/decryption and ECC-based signing/verification.Note: You will NOT be able to import/re-use your legacy API or Shell SuperPro orUltraPro code base (prepared using Sentinel SuperPro or UltraPro kits) inthe Sentinel Keys Toolkit. Since the Sentinel Hardware Keys use the latestsecurity technologies, you will need to implement your new, highly secureprotection strategy from scratch.■ Existing (Stage 1) Customers Who Want to Upgrade - You canupgrade the existing customers to the latest version of your softwareremotely, without shipping new hardware keys.1 The Sentinel DualHardware Keys can function as Sentinel Hardware Keys to supportyour latest software release. You will need to ship them:1. The upgrade licenses can be generated using a higher version of Sentinel Keys Toolkit (tobe released later in this year).