Private Key
In public-key cryptography, this is the secret key. Sentinel Keys contain the
ECC private keys, primarily used for key exchange and digital signatures.
Public Key
In public-key cryptography this key is made public to all. It is primarily used
for verifying digital signatures and solving the key exchange problem.
Public Key Cryptography
Cryptography based on methods involving a public key and a private key.
Q
Query Data
The data scrambled using the AES algorithm in the Sentinel Key. You pro-
gram your application to send queries to the Sentinel Key. The Sentinel Key
scrambles the string using the AES algorithm and returns a response to the
application.
Query-Response Protection
Please see the topic "Implement Query-Response Protection" on page 149.
R
Request Code
Refers to the code generated (as a .req file) by the customers/distributors as a
request to update their hardware keys. It contains the hardware key details
(such as, the serial number) and the license information.
Your customers can generate it using the option you allow—Secure Update
utility, Secure Update Wizard (for Windows only), or some custom utility
that calls the Secure Update API functions. Your distributors can generate it
Sentinel Hardware Keys Developer's Guide
R
247
Need help?
Do you have a question about the Sentinel and is the answer not in the manual?