SlideShare a Scribd company logo
1 of 58
Dominating Industrie 4.0 with
Secure Software Licensing
Guenther Fischer | Consulting & Professional Services
WIBU-SYSTEMS AG
guenther.fischer@wibu.com
John Battista | Head of Support
WIBU-SYSTEMS USA
john.battista@wibu.us
CodeMeter Embedded
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 1
The Basics
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 2
Delivery to the user
Integration with processes
Integrate Once – Deliver Many
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 3
Integration in the software
Software Software
CodeMeter
Protection Suite
Integrate Once Deliver Many
ERP/CRM
e-commerce
Software
License Portal
License
Central
License
Central
CodeMeter Licensing Systems
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 4
CmDongle
Hardware-based
security
License Server
License Server
in LAN / WAN
CmCloudContainer
User-based
license in the cloud
CmActLicense
Computer-bound
license file
License Entries
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 5
 License entry = Firm Code | Product Code
 Firm Code: issued by Wibu-Systems
 Product Code:
 Defined by the software vendor
 Per Option / Module / Feature
 4 bn. Product Codes (UInt32)
 Product Item Options: Each license can include
combinable options
 Up to 2,000 Product Items per CmContainer
Firm Code: 10
…
Product Item Options
Product Code: 201.000
Product Item Options
Product Code: 201.001
Product Item Options
Product Code: 201.002
Available Firm Codes
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 6
Firm Code
Test Firm Code
CmDongle CmActLicense CmCloudLicense
1xx.xxx
10
CmRuntime /
CmEmbedded
- -
5.xxx.xxx
5.010
-
CmRuntime /
CmEmbedded
-
6.xxx.xxx
6.000.010
CmRuntime /
CmEmbedded 2017
CmRuntime /
CmEmbedded 2017
CmRuntime 2017
License Models
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 7
License Models
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 8
Single User Floating Network Software Rental Pay-Per-Use
Trial / Demo Modular Licenses Downgrade Upgrade
Grace Period Overflow
Maintenance
Contracts
Borrowing
/ Transfer
Cold / Hot Standby Volume Licensing Named User …
CodeMeter Variants
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 9
CodeMeter
Embedded
Personal Computer
Industrial PC
Embedded System
Mobile Device / Tablet
PLC
Microcontroller
Field Programmable Gate Array
Scalable Variants of CodeMeter
High Power
Small Size
CodeMeter
Runtime
CodeMeter
µEmbedded
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 10
Scalable Variants of CodeMeter
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 11
Same CodeMeter Technology for all Platforms
CodeMeter Variants in Detail
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 12
Feature
CodeMeter
µEmbedded
CodeMeter
Embedded
CodeMeter
Runtime
CmDongle | CmActLicense | CmCloudContainer - | x | - x | x | - x | x | x
LAN client | LAN server - | - x | - x | x
Time-based licenses | Counter-based licenses x* | - x* | x* x | x
Feature-based licenses | Version-based licenses x | x x | x x | x
License transfer master | License transfer endpoint - | x - | x x | x
File-based license update x x x
Terminal server detection | Remote desktop detection - | - - | - x | x
Secure key storage x x x
Virtual CodeMeter clock - x x
CodeMeter Embedded
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 13
CodeMeter Embedded
 Alternative to CodeMeter Runtime
 Direct access to one or multiple CmDongles / CmActLicenses
 As static library or source code
 Modular structure
 Compact footprint (ca. 90 kByte .. 300 kByte)
 Compatible Subset of CodeMeter Core API functions
 No local counting of licenses
 Mainly for embedded operating systems
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 14
CodeMeter Embedded Architecture
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 15
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle
CmActLicense CmLAN Runtime Bridge
License Cache
Multi-Application Access
License Transfer
Encrypted Storage Encrypted CommunicationEncrypted Communication
Host-ID CodeMeter License Server CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
Module in Detail
 CodeMeter Embedded Core
 License Cache
 Multiple Application Access
 CmDongle
 CmActLicenses
 CmLAN
 CmRuntimeBridge
 API (subset of CodeMeter Core API)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 16
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle
CmActLicense CmLAN Runtime Bridge
License Cache
Multi-Application Access
License Transfer
Encrypted Storage Encrypted CommunicationEncrypted Communication
Host-ID
CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
CodeMeter Embedded Core
 Core Functions
 All basic functions
 Crypto libraries
 Symmetric encryption
 Asymmetric encryption
 Handle management for accessing
CmDongles/CmActLicenses
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 17
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle CmActLicense CmLAN Runtime Bridge
License Cache
Multi-ApplicationAccess
License Transfer
Encrypted Storage Encrypted CommunicationEncrypted Communication
Host-ID CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
License Cache
 License Cache
 Cached information about the licenses
 Quick access to licenses from the
cache instead of CmDongles and
CmActLicenses
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 18
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle CmActLicense CmLAN Runtime Bridge
License Cache
Multi-ApplicationAccess
License Transfer
Encrypted Storage Encrypted CommunicationEncrypted Communication
Host-ID CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
Multiple Application Access
 Multiple Application Access
 Concurrent access of multiple
applications or processes to a
CmDongle or CmActLicense
 Used in the OPC UA reference
"Implementation for concurrent
access to the private key"
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 19
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle CmActLicense CmLAN Runtime Bridge
License Cache
Multi-Application Access
License Transfer
Encrypted Storage Encrypted CommunicationEncrypted Communication
Host-ID CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
CmDongle
 CmDongle
 Supported communication channels
 I/O File (Mass Storage Device)
 HID (Human Interface Device)
 SPI (Serial Peripheral Interface)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 20
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle
CmActLicense CmLAN Runtime Bridge
License Cache
Multi-Application Access
License Transfer
Encrypted Storage Encrypted CommunicationEncrypted Communication
Host-ID CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
CmActLicenses
 Single implementation of the
binding to the device
 Adapter for
 Implementation of a fingerprint
 Implementation of license storage
 Implementation of dynamic file storage
 Secure counter for return and dynamic data (recommended)
 Activation for CodeMeter API (compatible with CodeMeter Runtime)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 21
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle CmActLicense CmLAN Runtime Bridge
License Cache
Multi-Application Access
License Transfer
Encrypted Storage Encrypted CommunicationEncrypted Communication
Host-ID CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
Typical Binding Factors
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 22
 Unchangeable serial number
 Physical Uncloneable Function
 Unchangeable IMEI
 Unchangeable CID
 Unchangeable CPU ID
 Unchangeable GPU ID
 SGX
 Trust Zone
 TPM 1.2 / 2.0
 etc….
CmLAN
 CmLAN
 Supports the use of concurrent
network licenses
 Compatible with a CodeMeter
License Server in the network
 CmEmbedded as client of a
CodeMeter License Server
(i.e. to count licenses)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 23
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle CmActLicense CmLAN Runtime Bridge
License Cache
Multi-Application Access
License Transfer
Encrypted Storage Encrypted Communication
Encrypted Communication
Host-ID CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
CmRuntimeBridge
 CmRuntimeBridge
 Coexhistence with CodeMeter Runtime
on the same computer
 Designed for testing on development
computers that use CodeMeter Runtime
and CmEmbedded simultaneously
(development environment and device
simulation)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 24
CodeMeter Embedded Core
Core Modules
API (Subset of CodeMeter Core API)
CmDongle CmActLicense CmLAN Runtime Bridge
License Cache
Multi-Application Access
License Transfer
Encrypted Storage
Encrypted Communication
Encrypted Communication
Host-ID CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
API (Subset of CodeMeter Core API)
 API (Application Interface)
 Necessary for embedded scenarios
Subset of CodeMeter Core API
 Access to API
 Authentication API
 Encryption API
 Error Management API
 Management API
 Compatible with CodeMeter API on desktop systems
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 25
CodeMeter Embedded Core Core Modules
API (Teilmenge von CodeMeter Core API)
CmDongle CmActLicense CmLAN Runtime Bridge
License Cache
Multi ApplicationAccess
License Transfer
Encrypted Storage Encrypted
Communication
Encrypted Communication
Host-ID CodeMeter License
Server
CodeMeter RuntimeTPM
ApplicationExEngineAxEngineOPC UA
HID SPIFile-I/O
Supported Secure Elements
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 26
Many
Form Factors
One
Technology
Supported CmDongles
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 27
HID File-I/O SPI
CmStick  (USB)
CmStick/M  (USB)
CmCard/SD  (SD-Card)
CmCard/microSD (SD-Card)
CmCard/CF (ATA)
CmCard/CFast (SATA, eSATA)
CmASIC  (USB) 
Delivery Options of CodeMeter Embedded
 As dynamic libraries (dll / so) for testing
 CmDongles, Runtime Bridge
 As static libraries
 Module and operating system on demand
 As source code (on demand)
 Module on demand
 NDA necessary
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 28
Integration in the Software
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 29
Key Facts of CodeMeter
 Symmetric Encryption
 128-bit AES (Advanced Encryption Standard)
 Used for software protection and data encryption
 Asymmetric Encryption
 224-bit ECC (Elliptic Curve Cryptography)
 2048-bit RSA (Rivest Shamir Adleman)
 Used for signatures, authentication, and Software-as-a-Service (SaaS)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 30
Integration in the Software
 Automatic Encryption
 CodeMeter Protection Suite
 AxProtector CmE
 ExProtector
 CodeMeter Core API
 Use of encryption
 Own license queries in the software
 License activation/de-activation
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 31
CodeMeter Protection Suite
CodeMeter Protection Suite
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing
Automatic Protection
(IP Protection)
Anti-Debug Methods
CodeMeter
Variants Used
Encryption of
Individual Functions
Integrity Protection
(Tamper Protection)
Software Authenticity
(Secure Loader / Authenticity)
Java SE
Java EE
Embedded
Operating System
.NETPC (Windows,
Linux, macOS)
CodeMeter
Runtime
CodeMeter
Runtime
CodeMeter
Runtime
CodeMeter
Embedded
CodeMeter
Embedded
IxProtector
AxProtector
AxProtector .NET
AxProtector Java
AxProtector CmE
ExProtector
32
AxProtector /
AxProtector CmE
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 33
AxProtector / AxProtector CmE
 Automatic encryption
 Protection of applications and/or libraries
 IP protection against reverse engineering
 Software protection against cracks
 Encryption: 128-bit AES
 Self-extractor (AxProtector)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 34
AxProtector
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 35
Protected ApplicationCompiled Application
Header
AxEngine
(Security Engine)
AxProtector
Encrypted
Code Section
Encrypted
Data Section
Encrypted
Resource Section
Header
Data Section
Resource Section
Code Section
AxProtector CmE
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 36
Protected ApplicationCompiled Application
Header
AxEngine
(Security Engine)
+ CodeMeter Embedded
AxProtector CmE
Encrypted
Code Section
Encrypted
Data Section
Encrypted
Resource Section
Header
Data Section
Resource Section
Code Section
ExProtector
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 37
ExProtector
 For embedded devices
 ExEngine integrated in the operating system
 Wind River VxWorks
 3S CODESYS
 Embedded Linux
 Android
 Protection against reverse engineering
 Tamper protection
 Protection against the use of unauthorized software
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 38
ExProtector
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 39
Protected ApplicationKompilierte Anwendung
Header
Code Section
Credentials
(Signature, Certificates, …)
Data Section
Resource Section
ExProtector
Encrypted
Application
Compiled Application
Header
Data Section
Resource Section
Code Section
ExEngine integrated in the Operating System
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 40
Operating System
Protected Application
ExEngine
(Security Engine)
Integrity CheckStart
Secure Boot
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 41
Boot Loader
Secure Boot (for VxWorks 6.x, 7)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 42
Protected Operating System
Secure Anchor
Protected Application
TPM
ExEngine
(Security Engine)
ExEngine
(Security Engine)
Boot Loader
Secure Boot (Any Operating Systems)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 43
Operating System
Secure Anchor
Protected Application
TPM
TPM
ExEngine
(Security Engine)
CodeMeter Core API
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 44
Key Features of CodeMeter Core API
 CmAccess2 (access to license)
 CmCrypt2 (encryption)
 CmRelease (license release)
 CmCalculateSignature (signature creation)
 CmValidateSignature (signature check)
 CmGetLastErrorCode (error handling)
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 45
What is CodeMeter Core API used for?
 Encryption of your data
 Configuration files / Data files
 Secure data exchange
 Logon process
 With asymmetric encryption
 With Challenge Response processes
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 46
Same API in all CodeMeter Implementations
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 47
CodeMeter Runtime CodeMeter Embedded
Availability of
CodeMeter Embedded
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 48
Supported Platforms – CodeMeter Embedded
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 49
Operating System CPU
CodeMeter
Runtime
DLL/SO
(Eval)
LIB
ANSI-C
Source
Windows Intel  
Linux Intel  
Windows Embedded Standard (WES) Intel   
Windows Embedded Compact (WEC) Intel, ARM 
Embedded Linux Intel, ARM 
Android ARM 
VxWorks Intel, ARM, PPC 
QNX Intel, ARM 
Other Operating System Any CPU 
Supported Platforms – CodeMeter Protection Suite
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 50
Operating System
CodeMeter
Variant
AxProtector
AxProtector
Java
AxProtector
.NET
ExProtector
Windows Runtime    -
Linux Runtime   - 
Windows Embedded Standard Runtime    -
Windows Embedded Compact Embedded legacy - - -
Embedded Linux Embedded  (CmE) 2018 - 
Android Embedded  (CmE) 2017 - 2018
VxWorks Embedded - - - 
QNX Embedded - - - on request
Other Operating System Embedded on request on request - on request
License Creation
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 51
License Creation
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 52
CodeMeter High Level Programming API (HIP)
CmBoxPgm
CodeMeter
License Editor
CodeMeter
License Central
Own
Application
End UserVendor
CodeMeter License Central – Ticketing System
08.03.2017 53
Ticket + Fingerprint
4
License
5
Ticket
2
Order
1
e-commerce
ERP/CRM Software
License Portal
Ticket:
ABCDE-FGHIJ-KLMNO-PQRST-UVWXY
3
Dominating Industrie 4.0 with Secure Software Licensing
WebDepot and Gateway / Software Activation Wizard
 WebDepot
 License activation from the web browser
 Online over WebSockets
 Offline via data transfer
 Gateway / Software Activation Wizard
 License activation from the protected application or via License Manager
 Online over Gateways to CodeMeter License Central
 Offline over RaC (Request) and RaU (Update) files
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 54
WebDepot – License Portal
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 55
Summary
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 56
Summary
 CodeMeter Embedded is multi-vendor
 CodeMeter Embedded is a portable and modular ANSI-C library
 Same API for CodeMeter Standard and CodeMeter Embedded
 Same toolset
 Same license management system
08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 57
Deutschland: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Germany: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Many thanks for your attention!

More Related Content

What's hot

OST Market - Hybrid Case Histories
OST Market - Hybrid Case HistoriesOST Market - Hybrid Case Histories
OST Market - Hybrid Case HistoriesRoberto Galoppini
 
ARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidKan-Han (John) Lu
 
HSM (Hardware Security Module)
HSM (Hardware Security Module)HSM (Hardware Security Module)
HSM (Hardware Security Module)Umesh Kolhe
 
HKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: IntroductionHKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: IntroductionLinaro
 
FieldServer Overview 2015.r1
FieldServer Overview 2015.r1FieldServer Overview 2015.r1
FieldServer Overview 2015.r1Eric W Dunn
 
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...Hitachi, Ltd. OSS Solution Center.
 
CIP for PCI 4.0 Release Notes for ArcSight Logger
CIP for PCI 4.0 Release Notes for ArcSight LoggerCIP for PCI 4.0 Release Notes for ArcSight Logger
CIP for PCI 4.0 Release Notes for ArcSight Loggerprotect724rkeer
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC securityShiu-Fun Poon
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Hitachi, Ltd. OSS Solution Center.
 

What's hot (13)

OST Market - Hybrid Case Histories
OST Market - Hybrid Case HistoriesOST Market - Hybrid Case Histories
OST Market - Hybrid Case Histories
 
ARM: Trusted Zone on Android
ARM: Trusted Zone on AndroidARM: Trusted Zone on Android
ARM: Trusted Zone on Android
 
Asterisk: the future is at REST
Asterisk: the future is at RESTAsterisk: the future is at REST
Asterisk: the future is at REST
 
FieldServer for OEM Overview
FieldServer for OEM OverviewFieldServer for OEM Overview
FieldServer for OEM Overview
 
HSM (Hardware Security Module)
HSM (Hardware Security Module)HSM (Hardware Security Module)
HSM (Hardware Security Module)
 
HKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: IntroductionHKG18-212 - Trusted Firmware M: Introduction
HKG18-212 - Trusted Firmware M: Introduction
 
FieldServer for Integrators Overview
FieldServer for Integrators OverviewFieldServer for Integrators Overview
FieldServer for Integrators Overview
 
FieldServer Overview 2015.r1
FieldServer Overview 2015.r1FieldServer Overview 2015.r1
FieldServer Overview 2015.r1
 
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
Overall pictures of Identity provider mix-up attack patterns and trade-offs b...
 
CIP for PCI 4.0 Release Notes for ArcSight Logger
CIP for PCI 4.0 Release Notes for ArcSight LoggerCIP for PCI 4.0 Release Notes for ArcSight Logger
CIP for PCI 4.0 Release Notes for ArcSight Logger
 
Zsq03116usen 02
Zsq03116usen 02Zsq03116usen 02
Zsq03116usen 02
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
 
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
Lightweight Zero-trust Network Implementation and Transition with Keycloak an...
 

Similar to Dominating Industrie 4.0 with Secure Software Licensing

Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensedteam-WIBU
 
RISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V International
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsteam-WIBU
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Software License Models - Spicing up the Mix
Software License Models - Spicing up the MixSoftware License Models - Spicing up the Mix
Software License Models - Spicing up the Mixteam-WIBU
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLinaro
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuArm
 
LAS16-112: mbed OS Technical Overview
LAS16-112: mbed OS Technical OverviewLAS16-112: mbed OS Technical Overview
LAS16-112: mbed OS Technical OverviewLinaro
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGDmitry Tikhovich
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationKim Clark
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
 
Your Migration Map to a Comprehensive Protection and Licensing System
Your Migration Map to a Comprehensive Protection and Licensing SystemYour Migration Map to a Comprehensive Protection and Licensing System
Your Migration Map to a Comprehensive Protection and Licensing Systemteam-WIBU
 
CIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight LoggerCIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight Loggerprotect724rkeer
 
HP: Implementácia cloudu s HP
HP: Implementácia cloudu s HPHP: Implementácia cloudu s HP
HP: Implementácia cloudu s HPASBIS SK
 
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018Amazon Web Services
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304Linaro
 
Approach-to-Security-applications-running-from-different-HW-platforms-Daniel-...
Approach-to-Security-applications-running-from-different-HW-platforms-Daniel-...Approach-to-Security-applications-running-from-different-HW-platforms-Daniel-...
Approach-to-Security-applications-running-from-different-HW-platforms-Daniel-...AAnt87
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applicationsteam-WIBU
 
The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT SecurityHannes Tschofenig
 

Similar to Dominating Industrie 4.0 with Secure Software Licensing (20)

Your CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and LicensedYour CODESYS Applications, Protected and Licensed
Your CODESYS Applications, Protected and Licensed
 
RISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmwareRISC-V 30906 hex five multi_zone iot firmware
RISC-V 30906 hex five multi_zone iot firmware
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Software License Models - Spicing up the Mix
Software License Models - Spicing up the MixSoftware License Models - Spicing up the Mix
Software License Models - Spicing up the Mix
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
LAS16-112: mbed OS Technical Overview
LAS16-112: mbed OS Technical OverviewLAS16-112: mbed OS Technical Overview
LAS16-112: mbed OS Technical Overview
 
F5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMGF5 Networks: миграция c Microsoft TMG
F5 Networks: миграция c Microsoft TMG
 
Implementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for IntegrationImplementing zero trust in IBM Cloud Pak for Integration
Implementing zero trust in IBM Cloud Pak for Integration
 
Secure IoT Firmware for RISC-V
Secure IoT Firmware for RISC-VSecure IoT Firmware for RISC-V
Secure IoT Firmware for RISC-V
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Your Migration Map to a Comprehensive Protection and Licensing System
Your Migration Map to a Comprehensive Protection and Licensing SystemYour Migration Map to a Comprehensive Protection and Licensing System
Your Migration Map to a Comprehensive Protection and Licensing System
 
CIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight LoggerCIP for PCI 4.0 Solution Guide for ArcSight Logger
CIP for PCI 4.0 Solution Guide for ArcSight Logger
 
HP: Implementácia cloudu s HP
HP: Implementácia cloudu s HPHP: Implementácia cloudu s HP
HP: Implementácia cloudu s HP
 
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
 
Approach-to-Security-applications-running-from-different-HW-platforms-Daniel-...
Approach-to-Security-applications-running-from-different-HW-platforms-Daniel-...Approach-to-Security-applications-running-from-different-HW-platforms-Daniel-...
Approach-to-Security-applications-running-from-different-HW-platforms-Daniel-...
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
 
The Role of Standards in IoT Security
The Role of Standards in IoT SecurityThe Role of Standards in IoT Security
The Role of Standards in IoT Security
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Togetherteam-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityteam-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenariosteam-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses Moreteam-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edgeteam-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applicationsteam-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magicteam-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisiveteam-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxteam-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solutionteam-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to lastteam-WIBU
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedteam-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integrated
 

Recently uploaded

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

Dominating Industrie 4.0 with Secure Software Licensing

  • 1. Dominating Industrie 4.0 with Secure Software Licensing Guenther Fischer | Consulting & Professional Services WIBU-SYSTEMS AG guenther.fischer@wibu.com John Battista | Head of Support WIBU-SYSTEMS USA john.battista@wibu.us CodeMeter Embedded 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 1
  • 2. The Basics 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 2
  • 3. Delivery to the user Integration with processes Integrate Once – Deliver Many 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 3 Integration in the software Software Software CodeMeter Protection Suite Integrate Once Deliver Many ERP/CRM e-commerce Software License Portal License Central License Central
  • 4. CodeMeter Licensing Systems 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 4 CmDongle Hardware-based security License Server License Server in LAN / WAN CmCloudContainer User-based license in the cloud CmActLicense Computer-bound license file
  • 5. License Entries 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 5  License entry = Firm Code | Product Code  Firm Code: issued by Wibu-Systems  Product Code:  Defined by the software vendor  Per Option / Module / Feature  4 bn. Product Codes (UInt32)  Product Item Options: Each license can include combinable options  Up to 2,000 Product Items per CmContainer Firm Code: 10 … Product Item Options Product Code: 201.000 Product Item Options Product Code: 201.001 Product Item Options Product Code: 201.002
  • 6. Available Firm Codes 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 6 Firm Code Test Firm Code CmDongle CmActLicense CmCloudLicense 1xx.xxx 10 CmRuntime / CmEmbedded - - 5.xxx.xxx 5.010 - CmRuntime / CmEmbedded - 6.xxx.xxx 6.000.010 CmRuntime / CmEmbedded 2017 CmRuntime / CmEmbedded 2017 CmRuntime 2017
  • 7. License Models 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 7
  • 8. License Models 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 8 Single User Floating Network Software Rental Pay-Per-Use Trial / Demo Modular Licenses Downgrade Upgrade Grace Period Overflow Maintenance Contracts Borrowing / Transfer Cold / Hot Standby Volume Licensing Named User …
  • 9. CodeMeter Variants 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 9
  • 10. CodeMeter Embedded Personal Computer Industrial PC Embedded System Mobile Device / Tablet PLC Microcontroller Field Programmable Gate Array Scalable Variants of CodeMeter High Power Small Size CodeMeter Runtime CodeMeter µEmbedded 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 10
  • 11. Scalable Variants of CodeMeter 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 11 Same CodeMeter Technology for all Platforms
  • 12. CodeMeter Variants in Detail 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 12 Feature CodeMeter µEmbedded CodeMeter Embedded CodeMeter Runtime CmDongle | CmActLicense | CmCloudContainer - | x | - x | x | - x | x | x LAN client | LAN server - | - x | - x | x Time-based licenses | Counter-based licenses x* | - x* | x* x | x Feature-based licenses | Version-based licenses x | x x | x x | x License transfer master | License transfer endpoint - | x - | x x | x File-based license update x x x Terminal server detection | Remote desktop detection - | - - | - x | x Secure key storage x x x Virtual CodeMeter clock - x x
  • 13. CodeMeter Embedded 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 13
  • 14. CodeMeter Embedded  Alternative to CodeMeter Runtime  Direct access to one or multiple CmDongles / CmActLicenses  As static library or source code  Modular structure  Compact footprint (ca. 90 kByte .. 300 kByte)  Compatible Subset of CodeMeter Core API functions  No local counting of licenses  Mainly for embedded operating systems 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 14
  • 15. CodeMeter Embedded Architecture 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 15 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-Application Access License Transfer Encrypted Storage Encrypted CommunicationEncrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 16. Module in Detail  CodeMeter Embedded Core  License Cache  Multiple Application Access  CmDongle  CmActLicenses  CmLAN  CmRuntimeBridge  API (subset of CodeMeter Core API) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 16 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-Application Access License Transfer Encrypted Storage Encrypted CommunicationEncrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 17. CodeMeter Embedded Core  Core Functions  All basic functions  Crypto libraries  Symmetric encryption  Asymmetric encryption  Handle management for accessing CmDongles/CmActLicenses 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 17 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-ApplicationAccess License Transfer Encrypted Storage Encrypted CommunicationEncrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 18. License Cache  License Cache  Cached information about the licenses  Quick access to licenses from the cache instead of CmDongles and CmActLicenses 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 18 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-ApplicationAccess License Transfer Encrypted Storage Encrypted CommunicationEncrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 19. Multiple Application Access  Multiple Application Access  Concurrent access of multiple applications or processes to a CmDongle or CmActLicense  Used in the OPC UA reference "Implementation for concurrent access to the private key" 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 19 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-Application Access License Transfer Encrypted Storage Encrypted CommunicationEncrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 20. CmDongle  CmDongle  Supported communication channels  I/O File (Mass Storage Device)  HID (Human Interface Device)  SPI (Serial Peripheral Interface) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 20 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-Application Access License Transfer Encrypted Storage Encrypted CommunicationEncrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 21. CmActLicenses  Single implementation of the binding to the device  Adapter for  Implementation of a fingerprint  Implementation of license storage  Implementation of dynamic file storage  Secure counter for return and dynamic data (recommended)  Activation for CodeMeter API (compatible with CodeMeter Runtime) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 21 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-Application Access License Transfer Encrypted Storage Encrypted CommunicationEncrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 22. Typical Binding Factors 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 22  Unchangeable serial number  Physical Uncloneable Function  Unchangeable IMEI  Unchangeable CID  Unchangeable CPU ID  Unchangeable GPU ID  SGX  Trust Zone  TPM 1.2 / 2.0  etc….
  • 23. CmLAN  CmLAN  Supports the use of concurrent network licenses  Compatible with a CodeMeter License Server in the network  CmEmbedded as client of a CodeMeter License Server (i.e. to count licenses) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 23 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-Application Access License Transfer Encrypted Storage Encrypted Communication Encrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 24. CmRuntimeBridge  CmRuntimeBridge  Coexhistence with CodeMeter Runtime on the same computer  Designed for testing on development computers that use CodeMeter Runtime and CmEmbedded simultaneously (development environment and device simulation) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 24 CodeMeter Embedded Core Core Modules API (Subset of CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi-Application Access License Transfer Encrypted Storage Encrypted Communication Encrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 25. API (Subset of CodeMeter Core API)  API (Application Interface)  Necessary for embedded scenarios Subset of CodeMeter Core API  Access to API  Authentication API  Encryption API  Error Management API  Management API  Compatible with CodeMeter API on desktop systems 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 25 CodeMeter Embedded Core Core Modules API (Teilmenge von CodeMeter Core API) CmDongle CmActLicense CmLAN Runtime Bridge License Cache Multi ApplicationAccess License Transfer Encrypted Storage Encrypted Communication Encrypted Communication Host-ID CodeMeter License Server CodeMeter RuntimeTPM ApplicationExEngineAxEngineOPC UA HID SPIFile-I/O
  • 26. Supported Secure Elements 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 26 Many Form Factors One Technology
  • 27. Supported CmDongles 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 27 HID File-I/O SPI CmStick  (USB) CmStick/M  (USB) CmCard/SD  (SD-Card) CmCard/microSD (SD-Card) CmCard/CF (ATA) CmCard/CFast (SATA, eSATA) CmASIC  (USB) 
  • 28. Delivery Options of CodeMeter Embedded  As dynamic libraries (dll / so) for testing  CmDongles, Runtime Bridge  As static libraries  Module and operating system on demand  As source code (on demand)  Module on demand  NDA necessary 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 28
  • 29. Integration in the Software 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 29
  • 30. Key Facts of CodeMeter  Symmetric Encryption  128-bit AES (Advanced Encryption Standard)  Used for software protection and data encryption  Asymmetric Encryption  224-bit ECC (Elliptic Curve Cryptography)  2048-bit RSA (Rivest Shamir Adleman)  Used for signatures, authentication, and Software-as-a-Service (SaaS) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 30
  • 31. Integration in the Software  Automatic Encryption  CodeMeter Protection Suite  AxProtector CmE  ExProtector  CodeMeter Core API  Use of encryption  Own license queries in the software  License activation/de-activation 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 31
  • 32. CodeMeter Protection Suite CodeMeter Protection Suite 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing Automatic Protection (IP Protection) Anti-Debug Methods CodeMeter Variants Used Encryption of Individual Functions Integrity Protection (Tamper Protection) Software Authenticity (Secure Loader / Authenticity) Java SE Java EE Embedded Operating System .NETPC (Windows, Linux, macOS) CodeMeter Runtime CodeMeter Runtime CodeMeter Runtime CodeMeter Embedded CodeMeter Embedded IxProtector AxProtector AxProtector .NET AxProtector Java AxProtector CmE ExProtector 32
  • 33. AxProtector / AxProtector CmE 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 33
  • 34. AxProtector / AxProtector CmE  Automatic encryption  Protection of applications and/or libraries  IP protection against reverse engineering  Software protection against cracks  Encryption: 128-bit AES  Self-extractor (AxProtector) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 34
  • 35. AxProtector 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 35 Protected ApplicationCompiled Application Header AxEngine (Security Engine) AxProtector Encrypted Code Section Encrypted Data Section Encrypted Resource Section Header Data Section Resource Section Code Section
  • 36. AxProtector CmE 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 36 Protected ApplicationCompiled Application Header AxEngine (Security Engine) + CodeMeter Embedded AxProtector CmE Encrypted Code Section Encrypted Data Section Encrypted Resource Section Header Data Section Resource Section Code Section
  • 37. ExProtector 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 37
  • 38. ExProtector  For embedded devices  ExEngine integrated in the operating system  Wind River VxWorks  3S CODESYS  Embedded Linux  Android  Protection against reverse engineering  Tamper protection  Protection against the use of unauthorized software 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 38
  • 39. ExProtector 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 39 Protected ApplicationKompilierte Anwendung Header Code Section Credentials (Signature, Certificates, …) Data Section Resource Section ExProtector Encrypted Application Compiled Application Header Data Section Resource Section Code Section
  • 40. ExEngine integrated in the Operating System 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 40 Operating System Protected Application ExEngine (Security Engine) Integrity CheckStart
  • 41. Secure Boot 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 41
  • 42. Boot Loader Secure Boot (for VxWorks 6.x, 7) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 42 Protected Operating System Secure Anchor Protected Application TPM ExEngine (Security Engine) ExEngine (Security Engine)
  • 43. Boot Loader Secure Boot (Any Operating Systems) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 43 Operating System Secure Anchor Protected Application TPM TPM ExEngine (Security Engine)
  • 44. CodeMeter Core API 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 44
  • 45. Key Features of CodeMeter Core API  CmAccess2 (access to license)  CmCrypt2 (encryption)  CmRelease (license release)  CmCalculateSignature (signature creation)  CmValidateSignature (signature check)  CmGetLastErrorCode (error handling) 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 45
  • 46. What is CodeMeter Core API used for?  Encryption of your data  Configuration files / Data files  Secure data exchange  Logon process  With asymmetric encryption  With Challenge Response processes 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 46
  • 47. Same API in all CodeMeter Implementations 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 47 CodeMeter Runtime CodeMeter Embedded
  • 48. Availability of CodeMeter Embedded 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 48
  • 49. Supported Platforms – CodeMeter Embedded 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 49 Operating System CPU CodeMeter Runtime DLL/SO (Eval) LIB ANSI-C Source Windows Intel   Linux Intel   Windows Embedded Standard (WES) Intel    Windows Embedded Compact (WEC) Intel, ARM  Embedded Linux Intel, ARM  Android ARM  VxWorks Intel, ARM, PPC  QNX Intel, ARM  Other Operating System Any CPU 
  • 50. Supported Platforms – CodeMeter Protection Suite 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 50 Operating System CodeMeter Variant AxProtector AxProtector Java AxProtector .NET ExProtector Windows Runtime    - Linux Runtime   -  Windows Embedded Standard Runtime    - Windows Embedded Compact Embedded legacy - - - Embedded Linux Embedded  (CmE) 2018 -  Android Embedded  (CmE) 2017 - 2018 VxWorks Embedded - - -  QNX Embedded - - - on request Other Operating System Embedded on request on request - on request
  • 51. License Creation 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 51
  • 52. License Creation 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 52 CodeMeter High Level Programming API (HIP) CmBoxPgm CodeMeter License Editor CodeMeter License Central Own Application
  • 53. End UserVendor CodeMeter License Central – Ticketing System 08.03.2017 53 Ticket + Fingerprint 4 License 5 Ticket 2 Order 1 e-commerce ERP/CRM Software License Portal Ticket: ABCDE-FGHIJ-KLMNO-PQRST-UVWXY 3 Dominating Industrie 4.0 with Secure Software Licensing
  • 54. WebDepot and Gateway / Software Activation Wizard  WebDepot  License activation from the web browser  Online over WebSockets  Offline via data transfer  Gateway / Software Activation Wizard  License activation from the protected application or via License Manager  Online over Gateways to CodeMeter License Central  Offline over RaC (Request) and RaU (Update) files 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 54
  • 55. WebDepot – License Portal 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 55
  • 56. Summary 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 56
  • 57. Summary  CodeMeter Embedded is multi-vendor  CodeMeter Embedded is a portable and modular ANSI-C library  Same API for CodeMeter Standard and CodeMeter Embedded  Same toolset  Same license management system 08.03.2017 Dominating Industrie 4.0 with Secure Software Licensing 57
  • 58. Deutschland: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Germany: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Many thanks for your attention!

Editor's Notes

  1. Je Modul mind. eine Folie
  2. Diese Folie kommt hier so unvermittelt, um sagen zu können: Eigentlich müssten Sie sich darum kümmern, wie Sie den Encryption Code sinnvoll variieren und einsetzen. AxProtector, IxProtetcor und Wupi nehmen Ihnen dies ab. Diese Tools erzeugen automatisch Arrays von Encryption Codes. Nur mit dem Core API müssen Sie dies manuell machen.
  3. Animation Prüfen
  4. Bilder neu machen (Runtime Sample mit Statischer Lib)
  5. Englischer Screenshot