ContentsSentinel Hardware Keys Developer’s Guide ixFrequently Asked Questions.........................................................................................83Chapter 5 – Protecting Applications Using API............................. 91Steps to Protect Applications Using API.......................................................................91Adding API Features ....................................................................................................95What’s Next? ............................................................................................................. 114Frequently Asked Questions...................................................................................... 116Chapter 6 – Secure Remote Updates............................................ 119Secure Remote Update .............................................................................................. 119Secure Remote Feature/License Update .................................................................... 120Secure Remote New License Addition....................................................................... 127Remote Update Codes ................................................................................................ 131Remote Update Methods............................................................................................ 132About Remote Update Actions .................................................................................. 136Generating Update Codes .......................................................................................... 140Frequently Asked Questions...................................................................................... 142Chapter 7 – Implementing Secure Licensing............................... 145Vulnerability Assessment - Basic Types of Attacks ................................................... 146Tips and Tricks .......................................................................................................... 149Frequently Asked Questions...................................................................................... 159Part 3: Grouping Licenses andProgramming Hardware Keys ......................... 161Chapter 8 – License Grouping ...................................................... 163Why Create Groups?.................................................................................................. 163Creating New Groups ................................................................................................ 165Loading Groups ......................................................................................................... 166Duplicating Groups ................................................................................................... 166Removing Groups...................................................................................................... 167Sending Group Files to Distributors........................................................................... 167