SlideShare a Scribd company logo
A Shelter to Protect your Documents Ruediger Kuegler | VP Sales
ruediger.kuegler@wibu.com
Stefan Bamberg | Senior Key Account Manager
stefan.bamberg@wibu.com
Document Protection
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 1
Applications vs
Documents
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 2
Protected Application
PE Header
Software Encryption with AxProtector
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 3
Application
Data Section
Resource Section
Code Section
AxEngine
(Security Engine)
AxProtector
PE Header
Data Section
Resource Section
Code Section Encrypted
Code Section
Encrypted
Data Section
Encrypted
Resource Section
Protected Document
Document Header
Document Encryption with AxProtector
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 4
Document
WIBU Header
AxProtector
Document Header
Data
Data
Encrypted Document Header
Encrypted
Data
Protected Document
Protected Application vs Protected Document
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 5
WIBU Header
Encrypted Document Header
Encrypted
Data
Protected Application
PE Header
AxEngine
(Security Engine)
Encrypted
Code Section
Encrypted
Data Section
Encrypted
Resource Section
An application
self-decrypts
A document needs
to be decrypted
DocumentApplication
Summary: Applications vs Documents
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 6
 AxProtector encrypts all sections
 AxProtector inserts decrypting code
(AxEngine)
 AxProtector modifies the OEP in the
PE Header
 The application is still executable and
decrypts itself at start
 AxProtector encrypts the complete
document, incl. possibly existing
Headers
 AxProtector sets its own Header
(WIBU Header) at the beginning of
the document
 An application is required to
recognize this document and decrypt
it when loaded
PDF Files
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 7
Protected PDF FilePDF File
Encrypting a PDF File
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 8
Adobe Acrobat
+
SmartShelter|PDF Author
+
Firm Security Box
Firm Code = 10
Product Code = 1000
SmartShelter|PDF
Encrypting a PDF File
 SmartShelter|PDF relies on the native encryption mechanism from Adobe
Acrobat (AES, 256 bit)
 SmartShelter|PDF creates a password for this encryption mechanism
 Invisible to the user and thus impossible to copy
 Derived from Firm Code and Product Code
 With high entropy and therefore secure against brute force attacks
 SmartShelter|PDF detects unwanted programs
 SmartShelter|PDF supports all CodeMeter Product Item Options
 SmartShelter|PDF supports all the security features of Adobe Acrobat
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 9
PDF File in MemoryProtected PDF File
Decrypting a PDF File
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 10
Adobe Acrobat Reader
+
SmartShelter|PDF Reader
+
License (CmDongle /
CmActLicense)
Firm Code = 10
Product Code = 1000
SmartShelter|PDF
Decrypting a PDF File
 SmartShelter|PDF verifies if a valid license (Firm Code / Product Code) is
available
 SmartShelter|PDF generates the decryption password
 The user is not aware of the used password
 The document is decrypted in the memory
 SmartShelter|PDF is on the alert for unwanted programs and ready to
close the PDF file immediately if any unwanted program is detected
 SmartShelter|PDF provides an interface for customized error dialogs
 SmartShelter|PDF supports all CodeMeter Product Item Options
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 11
Protecting PDF Documents (1)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 12
Protecting PDF Documents (2)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 13
Protecting PDF Documents (3)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 14
Protecting PDF Documents (4)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 15
Open a Protected PDF-Document (No License Available)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 16
Open a Protected PDF-Document (License Available)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 17
Standard Documents
in a Viewer
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 18
Protected DocumentDocument
Encrypting a Standard Document
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 19
AxProtector
+
Firm Security Box
Firm Code = 10
Product Code = 1000
AxProtector
Protected Document
Document Header
Encrypting a Standard Document with AxProtector
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 20
Document
WIBU HeaderDocument Header
Data
Data
Encrypted Document Header
Encrypted
Data
AxProtector
+
Firm Security Box
Firm Code = 10
Product Code = 1000
AxProtector
Encrypting a Standard Document with AxProtector
 AxProtector fully encrypts the file
 Including a possibly existing Document Header
 Algorithm: AES, 128 bit
 The key is derived from Firm Code and Product Code
 AxProtector inserts a specific WIBU Header at the beginning of the
protected document
 The decryption can be restricted to specific viewers
 Professional Services can help with customizations
 AxProtector supports all CodeMeter Product Item Options
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 21
Document in MemoryProtected Document
Decrypting a Standard Document
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 22
Document Viewer
+
SmartShelter|SDL
+
License (CmDongle /
CmActLicense)
Firm Code = 10
Product Code = 1000
Viewer
Decrypting a Standard Document
 SmartShelter|SDL is located between the viewer and the operating system
 Viewer is encrypted with AxProtector
 An encrypted .dll gets injected into the process of the viewer (by an SDL-start
application)
 SmartShelter|SDL verifies if a valid license (Firm Code / Product Code) is
available
 SmartShelter|SDL decrypts the document
 The user is not aware of the used password
 The document is decrypted in the memory
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 23
Decrypting a Standard Document
 SmartShelter|SDL is on the alert for unwanted programs closes the
application immediately if any unwanted program is detected
 SmartShelter|SDL controls all writing operation of the viewer
 Unencrypted
 Always encrypted
 Writing forbidden
 SmartShelter|SDL provides an interface for customized error dialogs
 SmartShelter|SDL supports all CodeMeter Product Item Options
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 24
Standard Documents
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 25
Writing Standard Documents?
 SmartShelter|SDL can verify if the application is writing files
 New file: Unencrypted | Writing forbidden | Encrypted
 Existing file: Condition maintained | Writing forbidden | Encrypted
 SmartShelter|SDL can monitor “Copy & Paste”
 Mode: Always allowed | Always forbidden
 SmartShelter|SDL does not know the context of the application
 “Copy & Paste” and “Save As” can only be monitored for all documents
unconditionally
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 26
Writing Standard Documents?
 Protecting standard documents is also technically possible, if the
application can write these documents
 A strong protection is only possible if the options “Copy & Paste” and
“Save As” are completely disabled
 Usually not compatible with the requirements in use
 Knowledge of the internal processes of the application is required (for example,
generation of temporary files)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 27
Proprietary Documents
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 28
Use Cases
 Music recording software
 My software should always run and record music
 Recorded music should only be accessible with a valid license
 Demo version
 My demo version can do anything but:
a) Saved files cannot be opened
b) No files may be saved
 Individual configuration files
 My customers are not allowed to exchange configuration files
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 29
Use Cases
 Protection of user’s data
 My users should be able to protect files themselves because these files contain
sensitive and trustworthy data
 Data from an authorized partner
 My software should only be able to process data that was created with my software
or the software of an authorized partner
 Data for authorized partners
 The data created with my software may only be processed with my software or that
of an authorized partner
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 30
The Solution
 CodeMeter provides top-of-the-breed cryptography
 CodeMeter provides secure key storage
 Solution approaches:
 A common symmetric key for all
 An individual symmetric key for everyone
 Encryption with an asymmetric keypair
 Signature with an asymmetric keypair
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 31
Sender
Symmetric Encryption
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 32
Data
Encrypted Data
Encrypted Data
Recipient
Data
Decrypt Shared KeyEncrypt Shared Key
A Common Symmetric Key for All
 The key is generated automatically via a license entry (Firm Code and
Product Code)
 All users who are allowed to decrypt the protected data will receive the
same license entry
 Groups of users and even individual users can be assigned different
licenses
 Use cases
 Sales of protected content, and not just software
 Protection of configuration files
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 33
An Individual Symmetric Key for Everyone
 Individual key for every user
 A separate license entry for every user
 A common license entry with randomly selected Secret Data or Hidden Data entries
 User-specific key, alternatively in separate Firm Code or the Firm Code of the
vendor
 Use cases
 Individually protected configuration files
 Protection of user’s data
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 34
Sender
Asymmetric Encryption
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 35
Data
Encrypted Data
Encrypted Data
Recipient
Data
Decrypt Private KeyEncrypt Public Key
Generation of an Asymmetric Keypair
 A keypair is generated and the private key is stored securely in the
CmContainer
 The manufacturer generates the keypair
 The user generates the keypair
 The public key is known to the system
 As a mini-certificate with root key (public key) in the application
 Hard-coded in the application
 The mini-certificate is signed with an individual root key (private key)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 36
Encryption with an Asymmetric Keypair
 Encryption with the public key is always possible
 Decryption is possible only if a valid license with the matching private key
is available
 Use cases
 Data encryption with a demo version
 Music recording software
 Data may only be processed by the software of an authorized partner who holds the
correct license
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 37
Sender
Signature
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 38
Data
Recipient
Validate Public Key
Sign Private Key
Data
Signature
Data
Signature
Hash
Hash
NoYes
Generation of an Asymmetric Keypair
 A keypair is generated and the private key is stored securely in the
CmContainer
 The manufacturer generates the keypair
 The user generates the keypair
 The public key is known to the system
 As a mini-certificate with root key (public key) in the application
 Hard-coded in the application
 The mini-certificate is signed with an individual root key (private key)
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 39
Signature with an Asymmetric Keypair
 The signature can only be created if a valid license with the matching
private key is available
 The verification of the signature with the public key is always possible
 The authentication of the public key can be ensured with a mini-certificate
 Use cases
 Protection of application data against tampering
 Secure (engine) journal
 Only data from an authorized partner is processed
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 40
Summary
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 43
Summary
 PDF Files
 Higher protection standards with SmartShelter|PDF
 Standard Documents
 Easy integration into a viewer and high protection with SmartShelter|SDL
 Integration into an Office application only under certain conditions
 Proprietary Documents
 Use of CodeMeter Core API
 Versatile applications
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 44
Deutschland: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Germany: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Thank you very much for your attention!
5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 45

More Related Content

Similar to A Shelter to Protect your Documents

AIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdfAIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdf
Sushanta Mondal
 
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Veritas Technologies LLC
 
WiseDox: Intelligent Document Filing
WiseDox: Intelligent Document FilingWiseDox: Intelligent Document Filing
WiseDox: Intelligent Document Filing
Hans Infomatic
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
PaaSword EU Project
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)
Dania Rashid
 
BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...
BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...
BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...
Fujitsu Central Europe
 
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
Joseph Lopez, M.ISM
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution Brief
Hybrid Cloud
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
FIDO Alliance
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
Cisco Canada
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
WildhaniIhyaraRahman1
 
Privacy is at the heart of data protection
Privacy is at the heart of data protectionPrivacy is at the heart of data protection
Privacy is at the heart of data protection
Jisc
 
intergator as a comprehensive and holistic information management platform
intergator as a comprehensive and holistic information management platformintergator as a comprehensive and holistic information management platform
intergator as a comprehensive and holistic information management platform
Eduard Daoud
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
team-WIBU
 
Harnessing the power of cloud for real security
Harnessing the power of cloud for real securityHarnessing the power of cloud for real security
Harnessing the power of cloud for real security
Erkang Zheng
 
ITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docx
ITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docxITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docx
ITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docx
christiandean12115
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
 
What’s New in OpenText™ eDOCS 16.1?
What’s New in OpenText™ eDOCS 16.1?What’s New in OpenText™ eDOCS 16.1?
What’s New in OpenText™ eDOCS 16.1?
OpenText
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
Cisco Canada
 
Tallium Knowledge Sharing use cases Feb 2017
Tallium Knowledge Sharing use cases Feb 2017Tallium Knowledge Sharing use cases Feb 2017
Tallium Knowledge Sharing use cases Feb 2017
AquaSPE AG
 

Similar to A Shelter to Protect your Documents (20)

AIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdfAIP Webinar Series - Part 1 - AIP Introduction.pdf
AIP Webinar Series - Part 1 - AIP Introduction.pdf
 
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
Fine Tune Your Archive: Best Practices for Optimizing Enterprise Vault
 
WiseDox: Intelligent Document Filing
WiseDox: Intelligent Document FilingWiseDox: Intelligent Document Filing
WiseDox: Intelligent Document Filing
 
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
Towards Efficient and Secure Data Storage in Multi-Tenant Cloud-Based CRM Sol...
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)
 
BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...
BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...
BOS - Industrie 4.0 – die Evolution der Fertigung am Beispiel des Fujitsu Wer...
 
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
ThingWorx Connectors - How to Make Different Systems "Speak the Same Language"
 
The Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution BriefThe Enterprise File Fabric for Service Providers | Solution Brief
The Enterprise File Fabric for Service Providers | Solution Brief
 
The Future of Authentication for IoT
The Future of Authentication for IoTThe Future of Authentication for IoT
The Future of Authentication for IoT
 
Cisco connect winnipeg 2018 we make it simple
Cisco connect winnipeg 2018   we make it simpleCisco connect winnipeg 2018   we make it simple
Cisco connect winnipeg 2018 we make it simple
 
Cisco SecureX.pdf
Cisco SecureX.pdfCisco SecureX.pdf
Cisco SecureX.pdf
 
Privacy is at the heart of data protection
Privacy is at the heart of data protectionPrivacy is at the heart of data protection
Privacy is at the heart of data protection
 
intergator as a comprehensive and holistic information management platform
intergator as a comprehensive and holistic information management platformintergator as a comprehensive and holistic information management platform
intergator as a comprehensive and holistic information management platform
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Harnessing the power of cloud for real security
Harnessing the power of cloud for real securityHarnessing the power of cloud for real security
Harnessing the power of cloud for real security
 
ITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docx
ITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docxITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docx
ITC568 Cloud Privacy and SecurityThe Cloud Security Ecosyste.docx
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
What’s New in OpenText™ eDOCS 16.1?
What’s New in OpenText™ eDOCS 16.1?What’s New in OpenText™ eDOCS 16.1?
What’s New in OpenText™ eDOCS 16.1?
 
Cisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre securityCisco Connect Ottawa 2018 data centre security
Cisco Connect Ottawa 2018 data centre security
 
Tallium Knowledge Sharing use cases Feb 2017
Tallium Knowledge Sharing use cases Feb 2017Tallium Knowledge Sharing use cases Feb 2017
Tallium Knowledge Sharing use cases Feb 2017
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
team-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
team-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
team-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
team-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
team-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
team-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
team-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
team-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
team-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
team-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
team-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
team-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
team-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
team-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
team-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
team-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
team-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
team-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
team-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 

Recently uploaded

Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Jay Das
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
Globus
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
Cyanic lab
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
Philip Schwarz
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
WSO2
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
Fermin Galan
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 

Recently uploaded (20)

Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfEnhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdf
 
GlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote sessionGlobusWorld 2024 Opening Keynote session
GlobusWorld 2024 Opening Keynote session
 
Cyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdfCyaniclab : Software Development Agency Portfolio.pdf
Cyaniclab : Software Development Agency Portfolio.pdf
 
A Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of PassageA Sighting of filterA in Typelevel Rite of Passage
A Sighting of filterA in Typelevel Rite of Passage
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Accelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with PlatformlessAccelerate Enterprise Software Engineering with Platformless
Accelerate Enterprise Software Engineering with Platformless
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604Orion Context Broker introduction 20240604
Orion Context Broker introduction 20240604
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
First Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User EndpointsFirst Steps with Globus Compute Multi-User Endpoints
First Steps with Globus Compute Multi-User Endpoints
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Vitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume MontevideoVitthal Shirke Microservices Resume Montevideo
Vitthal Shirke Microservices Resume Montevideo
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 

A Shelter to Protect your Documents

  • 1. A Shelter to Protect your Documents Ruediger Kuegler | VP Sales ruediger.kuegler@wibu.com Stefan Bamberg | Senior Key Account Manager stefan.bamberg@wibu.com Document Protection 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 1
  • 2. Applications vs Documents 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 2
  • 3. Protected Application PE Header Software Encryption with AxProtector 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 3 Application Data Section Resource Section Code Section AxEngine (Security Engine) AxProtector PE Header Data Section Resource Section Code Section Encrypted Code Section Encrypted Data Section Encrypted Resource Section
  • 4. Protected Document Document Header Document Encryption with AxProtector 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 4 Document WIBU Header AxProtector Document Header Data Data Encrypted Document Header Encrypted Data
  • 5. Protected Document Protected Application vs Protected Document 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 5 WIBU Header Encrypted Document Header Encrypted Data Protected Application PE Header AxEngine (Security Engine) Encrypted Code Section Encrypted Data Section Encrypted Resource Section An application self-decrypts A document needs to be decrypted
  • 6. DocumentApplication Summary: Applications vs Documents 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 6  AxProtector encrypts all sections  AxProtector inserts decrypting code (AxEngine)  AxProtector modifies the OEP in the PE Header  The application is still executable and decrypts itself at start  AxProtector encrypts the complete document, incl. possibly existing Headers  AxProtector sets its own Header (WIBU Header) at the beginning of the document  An application is required to recognize this document and decrypt it when loaded
  • 7. PDF Files 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 7
  • 8. Protected PDF FilePDF File Encrypting a PDF File 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 8 Adobe Acrobat + SmartShelter|PDF Author + Firm Security Box Firm Code = 10 Product Code = 1000 SmartShelter|PDF
  • 9. Encrypting a PDF File  SmartShelter|PDF relies on the native encryption mechanism from Adobe Acrobat (AES, 256 bit)  SmartShelter|PDF creates a password for this encryption mechanism  Invisible to the user and thus impossible to copy  Derived from Firm Code and Product Code  With high entropy and therefore secure against brute force attacks  SmartShelter|PDF detects unwanted programs  SmartShelter|PDF supports all CodeMeter Product Item Options  SmartShelter|PDF supports all the security features of Adobe Acrobat 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 9
  • 10. PDF File in MemoryProtected PDF File Decrypting a PDF File 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 10 Adobe Acrobat Reader + SmartShelter|PDF Reader + License (CmDongle / CmActLicense) Firm Code = 10 Product Code = 1000 SmartShelter|PDF
  • 11. Decrypting a PDF File  SmartShelter|PDF verifies if a valid license (Firm Code / Product Code) is available  SmartShelter|PDF generates the decryption password  The user is not aware of the used password  The document is decrypted in the memory  SmartShelter|PDF is on the alert for unwanted programs and ready to close the PDF file immediately if any unwanted program is detected  SmartShelter|PDF provides an interface for customized error dialogs  SmartShelter|PDF supports all CodeMeter Product Item Options 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 11
  • 12. Protecting PDF Documents (1) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 12
  • 13. Protecting PDF Documents (2) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 13
  • 14. Protecting PDF Documents (3) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 14
  • 15. Protecting PDF Documents (4) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 15
  • 16. Open a Protected PDF-Document (No License Available) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 16
  • 17. Open a Protected PDF-Document (License Available) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 17
  • 18. Standard Documents in a Viewer 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 18
  • 19. Protected DocumentDocument Encrypting a Standard Document 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 19 AxProtector + Firm Security Box Firm Code = 10 Product Code = 1000 AxProtector
  • 20. Protected Document Document Header Encrypting a Standard Document with AxProtector 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 20 Document WIBU HeaderDocument Header Data Data Encrypted Document Header Encrypted Data AxProtector + Firm Security Box Firm Code = 10 Product Code = 1000 AxProtector
  • 21. Encrypting a Standard Document with AxProtector  AxProtector fully encrypts the file  Including a possibly existing Document Header  Algorithm: AES, 128 bit  The key is derived from Firm Code and Product Code  AxProtector inserts a specific WIBU Header at the beginning of the protected document  The decryption can be restricted to specific viewers  Professional Services can help with customizations  AxProtector supports all CodeMeter Product Item Options 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 21
  • 22. Document in MemoryProtected Document Decrypting a Standard Document 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 22 Document Viewer + SmartShelter|SDL + License (CmDongle / CmActLicense) Firm Code = 10 Product Code = 1000 Viewer
  • 23. Decrypting a Standard Document  SmartShelter|SDL is located between the viewer and the operating system  Viewer is encrypted with AxProtector  An encrypted .dll gets injected into the process of the viewer (by an SDL-start application)  SmartShelter|SDL verifies if a valid license (Firm Code / Product Code) is available  SmartShelter|SDL decrypts the document  The user is not aware of the used password  The document is decrypted in the memory 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 23
  • 24. Decrypting a Standard Document  SmartShelter|SDL is on the alert for unwanted programs closes the application immediately if any unwanted program is detected  SmartShelter|SDL controls all writing operation of the viewer  Unencrypted  Always encrypted  Writing forbidden  SmartShelter|SDL provides an interface for customized error dialogs  SmartShelter|SDL supports all CodeMeter Product Item Options 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 24
  • 25. Standard Documents 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 25
  • 26. Writing Standard Documents?  SmartShelter|SDL can verify if the application is writing files  New file: Unencrypted | Writing forbidden | Encrypted  Existing file: Condition maintained | Writing forbidden | Encrypted  SmartShelter|SDL can monitor “Copy & Paste”  Mode: Always allowed | Always forbidden  SmartShelter|SDL does not know the context of the application  “Copy & Paste” and “Save As” can only be monitored for all documents unconditionally 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 26
  • 27. Writing Standard Documents?  Protecting standard documents is also technically possible, if the application can write these documents  A strong protection is only possible if the options “Copy & Paste” and “Save As” are completely disabled  Usually not compatible with the requirements in use  Knowledge of the internal processes of the application is required (for example, generation of temporary files) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 27
  • 28. Proprietary Documents 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 28
  • 29. Use Cases  Music recording software  My software should always run and record music  Recorded music should only be accessible with a valid license  Demo version  My demo version can do anything but: a) Saved files cannot be opened b) No files may be saved  Individual configuration files  My customers are not allowed to exchange configuration files 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 29
  • 30. Use Cases  Protection of user’s data  My users should be able to protect files themselves because these files contain sensitive and trustworthy data  Data from an authorized partner  My software should only be able to process data that was created with my software or the software of an authorized partner  Data for authorized partners  The data created with my software may only be processed with my software or that of an authorized partner 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 30
  • 31. The Solution  CodeMeter provides top-of-the-breed cryptography  CodeMeter provides secure key storage  Solution approaches:  A common symmetric key for all  An individual symmetric key for everyone  Encryption with an asymmetric keypair  Signature with an asymmetric keypair 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 31
  • 32. Sender Symmetric Encryption 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 32 Data Encrypted Data Encrypted Data Recipient Data Decrypt Shared KeyEncrypt Shared Key
  • 33. A Common Symmetric Key for All  The key is generated automatically via a license entry (Firm Code and Product Code)  All users who are allowed to decrypt the protected data will receive the same license entry  Groups of users and even individual users can be assigned different licenses  Use cases  Sales of protected content, and not just software  Protection of configuration files 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 33
  • 34. An Individual Symmetric Key for Everyone  Individual key for every user  A separate license entry for every user  A common license entry with randomly selected Secret Data or Hidden Data entries  User-specific key, alternatively in separate Firm Code or the Firm Code of the vendor  Use cases  Individually protected configuration files  Protection of user’s data 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 34
  • 35. Sender Asymmetric Encryption 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 35 Data Encrypted Data Encrypted Data Recipient Data Decrypt Private KeyEncrypt Public Key
  • 36. Generation of an Asymmetric Keypair  A keypair is generated and the private key is stored securely in the CmContainer  The manufacturer generates the keypair  The user generates the keypair  The public key is known to the system  As a mini-certificate with root key (public key) in the application  Hard-coded in the application  The mini-certificate is signed with an individual root key (private key) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 36
  • 37. Encryption with an Asymmetric Keypair  Encryption with the public key is always possible  Decryption is possible only if a valid license with the matching private key is available  Use cases  Data encryption with a demo version  Music recording software  Data may only be processed by the software of an authorized partner who holds the correct license 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 37
  • 38. Sender Signature 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 38 Data Recipient Validate Public Key Sign Private Key Data Signature Data Signature Hash Hash NoYes
  • 39. Generation of an Asymmetric Keypair  A keypair is generated and the private key is stored securely in the CmContainer  The manufacturer generates the keypair  The user generates the keypair  The public key is known to the system  As a mini-certificate with root key (public key) in the application  Hard-coded in the application  The mini-certificate is signed with an individual root key (private key) 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 39
  • 40. Signature with an Asymmetric Keypair  The signature can only be created if a valid license with the matching private key is available  The verification of the signature with the public key is always possible  The authentication of the public key can be ensured with a mini-certificate  Use cases  Protection of application data against tampering  Secure (engine) journal  Only data from an authorized partner is processed 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 40
  • 41. Summary 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 43
  • 42. Summary  PDF Files  Higher protection standards with SmartShelter|PDF  Standard Documents  Easy integration into a viewer and high protection with SmartShelter|SDL  Integration into an Office application only under certain conditions  Proprietary Documents  Use of CodeMeter Core API  Versatile applications 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 44
  • 43. Deutschland: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Germany: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Thank you very much for your attention! 5 April 2017 © WIBU-SYSTEMS AG 2017 - A Shelter to Protect your Documents 45

Editor's Notes

  1. RK
  2. RK
  3. RK
  4. RK
  5. RK
  6. RK
  7. RK
  8. RK