SlideShare a Scribd company logo
1 of 16
Download to read offline
The simpler way Ruediger Kuegler
VP Sales & Professional Services
Axel Engelmann
Architect Protection Technologies
Protecting Python
Applications
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 1
Where to find the accompanying audio
To access the on-demand replay of this masterclass, please visit
www.wibu.com/resources/webinars/2021/python-simpler-way/access
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 2
The Classical Way
Cython
AxProtector
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 3
Python
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 4
 Delivery as Python (text) file
 No copy protection, no IP protection
 Source code available to users, competitors, …
class Pi:
def __init__(self):
self.rounds = 100000
def calc_pi(self):
my_sum = 0.0
for i in range(self.rounds + 1):
recent_val = ( (-1) ** i ) / (2 * i + 1)
my_sum += recent_val
return my_sum * 4
Python  Cython
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 5
 Delivery as platform dependent compiled library
 Readable with disassembling tools like IDA Pro
 No copy protection, extremely weak IP protection
FF 53 00 00 01 00 00 00 44 89 0D FC 53 00 00
BA E7 14 00 00 00 00 00 00 44 89 0D E7 53 00
BB 06 00 00 00 00 00 00 00 00 00 0F BA E7 1B
79 0F BA E7 1C 73 73 33 C9 0F 01 D0 48 C1 E2
53 48 83 EC 20 48 83 3D 52 5A 00 00 00 0F 84
00 00 00 48 8D 1D 4D 5A 00 00 0F 1F 44 00 00
48 0B D0 48 89 54 24 20 48 8B 44 24 20 22 C3
C3 75 57 8B 05 B2 53 00 00 83 C8 08 C7 05 A1
00 00 03 00 00 00 89 05 9F 53 00 00 41 F6 C3
74 38 83 C8 20 C7 05 88 53 00 00 05 00 00 00
05 86 53 00 00 B8 00 00 03 D0 44 23 D8 44 3B
75 18 48 8B 44 24 20 24 E0 3C E0 75 0D 83 0D
53 00 00 40 89 1D 5D 53 00 00 48 8B 5C 24 28
C0 48 8B 74 24 30 48 83 C4 10 5F C3 CC CC CC
01 00 00 00 C3 CC CC 33 C0 39 05 50 53 00 00
95 C0 C3 CC CC CC CC CC CC CC CC CC CC CC CC
25 3A 33 00 00 FF 25 84 33 00 00 FF 25 86 33
00 FF 25 88 33 00 00 FF 25 92 33 00 00 FF 25
33 00 00 FF 25 BE 33 00 00 FF 25 98 33 00 00
25 9A 33 00 00 00 00 00 00 00 00 FF 25 9E 33
00 FF 25 78 33 00 00 B0 01 C3 CC 33 C0 C3 CC
53 48 83 EC 20 48 83 3D 52 5A 00 00 00 0F 84
00 00 00 48 8D 1D 4D 5A 00 00 0F 1F 44 00 00
class Pi:
def __init__(self):
self.rounds = 100000
def calc_pi(self):
my_sum = 0.0
for i in range(self.rounds + 1):
recent_val = ( (-1) ** i ) / (2 * i + 1)
my_sum += recent_val
return my_sum * 4
Python  Cython  AxProtector
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 6
 Delivery as encrypted platform dependent library
 Strong copy protection, strong IP protection
 Licensing and protection combined for high security
9A 17 5F E8 22 95 AB 68 71 53 EC E0 08 2F 9A
27 55 63 60 D8 97 10 61 5E 8D 7B 2A 84 D3 AA
7E E5 E2 01 B8 0C 40 74 D5 A1 39 50 21 CE 7D
12 A9 62 13 9A 57 5B 6D 51 BD 21 A0 BB 6B 6A
C8 E3 29 93 68 E1 DA 6E 25 AE 83 D7 3B B4 E0
A3 5E 0E 4D F7 02 9B 0E C2 27 BF 9A 31 25 81
66 30 EB 39 44 48 4F 63 4B 7E EE DC 31 DE 85
96 1D 48 EA 8C F9 8E B4 8F ED E7 5B AD 8F 40
DD A6 A5 96 DA 46 3E E0 65 FD 0C 3C 0F F3 DD
CE D7 BB BF EA D1 65 C1 7B 4B 26 95 15 BC B5
F0 C6 2B F2 04 55 71 5E 42 06 48 7F D0 5C 0B
17 7A 3C 8A 54 5C 87 A6 54 7C 82 64 73 E9 69
DC B6 55 87 BE 2A 5A 19 26 DD 94 95 B7 F9 B9
CD C9 B8 91 A5 2A 9F 16 E0 C7 83 78 5C E6 4A
55 DA 2B 30 83 24 D5 69 B4 C6 9D D2 03 B2 DC
A1 B0 18 5D 71 85 DB CF E5 68 EE EF 50 D0 72
23 FB 1F 51 EE 78 B1 08 77 73 B5 0B 64 02 24
C1 F9 D1 C8 B7 03 5D 35 50 19 D1 DD D6 CD 48
1E 20 31 66 85 C6 68 3B 0F 63 B8 5C 86 19 4E
8C 63 74 87 57 F6 B7 50 86 7C 3A C7 5F AE 3C
DA BB E2 0A 00 FE 83 A0 B2 AA 5B 17 15 86 E1
57 46 24 CE B7 F9 1C 8C 8D B9 AA 6D A3 12 2B
AF 5B 7A 51 26 DD F7 4C 65 6A 00 FB 52 D1 17
FF 53 00 00 01 00 00 00 44 89 0D FC 53 00 00
BA E7 14 00 00 00 00 00 00 44 89 0D E7 53 00
BB 06 00 00 00 00 00 00 00 00 00 0F BA E7 1B
79 0F BA E7 1C 73 73 33 C9 0F 01 D0 48 C1 E2
53 48 83 EC 20 48 83 3D 52 5A 00 00 00 0F 84
00 00 00 48 8D 1D 4D 5A 00 00 0F 1F 44 00 00
48 0B D0 48 89 54 24 20 48 8B 44 24 20 22 C3
C3 75 57 8B 05 B2 53 00 00 83 C8 08 C7 05 A1
00 00 03 00 00 00 89 05 9F 53 00 00 41 F6 C3
74 38 83 C8 20 C7 05 88 53 00 00 05 00 00 00
05 86 53 00 00 B8 00 00 03 D0 44 23 D8 44 3B
75 18 48 8B 44 24 20 24 E0 3C E0 75 0D 83 0D
53 00 00 40 89 1D 5D 53 00 00 48 8B 5C 24 28
C0 48 8B 74 24 30 48 83 C4 10 5F C3 CC CC CC
01 00 00 00 C3 CC CC 33 C0 39 05 50 53 00 00
95 C0 C3 CC CC CC CC CC CC CC CC CC CC CC CC
25 3A 33 00 00 FF 25 84 33 00 00 FF 25 86 33
00 FF 25 88 33 00 00 FF 25 92 33 00 00 FF 25
33 00 00 FF 25 BE 33 00 00 FF 25 98 33 00 00
25 9A 33 00 00 00 00 00 00 00 00 FF 25 9E 33
00 FF 25 78 33 00 00 B0 01 C3 CC 33 C0 C3 CC
53 48 83 EC 20 48 83 3D 52 5A 00 00 00 0F 84
00 00 00 48 8D 1D 4D 5A 00 00 0F 1F 44 00 00
class Pi:
def __init__(self):
self.rounds = 100000
def calc_pi(self):
my_sum = 0.0
for i in range(self.rounds + 1):
recent_val = ( (-1) ** i ) / (2 * i + 1)
my_sum += recent_val
return my_sum * 4
Additional Options
 Automatically realizing different license models with AxProtector
 Single User Licenses
 Floating Network Licenses
 Subscription Licenses
 Using CodeMeter Core API for additional license models (officially
available since release 7.20)
 Modular Licenses (Features On Demand)
 Pay-per-Use Licenses
 Protection of data files
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 7
Demo
Demo
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 8
The New Way
AxProtector Python
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 9
Why Do We Need a New Way?
 The solution via Cython offers high security, but Wibu-Systems wants to
offer even more
 On-Demand Decryption during runtime
 Modular Licenses with different cryptographic keys
 The way via Cython creates platform dependent binaries
 Simplified integration for software developers (no Cython needed)
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 10
import axengine
class Pi:
def __init__(self):
instance = axengine.axe_load(21, globals())
return instance(self)
def calc_pi(self):
instance = axengine.axe_load(22, globals())
return instance(self)
Python  AxProtector Python
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 11
 Every function is encrypted separately
 Highest Security
 Application is still platform independent
 CodeMeter Runtime / Protection Suite Runtime needed (Windows, Linux, macOS)
class Pi:
def __init__(self):
self.rounds = 100000
def calc_pi(self):
my_sum = 0.0
for i in range(self.rounds + 1):
recent_val = ( (-1) ** i ) / (2 * i + 1)
my_sum += recent_val
return my_sum * 4
Demo
Demo
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 12
Demo
 Encryption of a simple application
 How to protect global functions
 Moving them into a new function
 How to combine Core API and AxProtector Python
 Modular Licensing at source code level
 Error handling via exceptions
 IP Protection
 Requirements (License, CPSRT, …)
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 13
Summary
AxProtector Python
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 14
Summary
 The new AxProtector Python offers highest security
 Simplified integration for software developers
 Easy and strong implementation of modular licenses
 Combination of AxProtector Python and CodeMeter Core API is possible
 Additional encryption of data
 The classical way via Cython and AxProtector is still available
 The principles AxProtector Python relies on are similar to those of
AxProtector .NET
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 15
https://www.wibu.com
info@wibu.com
Europe: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
Japan: +81-3-43608205
Thank you very much for your attention
2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 16

More Related Content

Similar to Protecting Python applications the simpler way

TC74VHCT04AFN PSpice Model (Free SPICE Model)
TC74VHCT04AFN PSpice Model  (Free SPICE Model)TC74VHCT04AFN PSpice Model  (Free SPICE Model)
TC74VHCT04AFN PSpice Model (Free SPICE Model)Tsuyoshi Horigome
 
20200312 楊芝青律師-如何選擇適合的授權書取得權利
20200312 楊芝青律師-如何選擇適合的授權書取得權利20200312 楊芝青律師-如何選擇適合的授權書取得權利
20200312 楊芝青律師-如何選擇適合的授權書取得權利Jamie C. Yang
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON
 
Electrical Schematic of PowerPC GNU/Linux Notebook
Electrical Schematic of PowerPC GNU/Linux NotebookElectrical Schematic of PowerPC GNU/Linux Notebook
Electrical Schematic of PowerPC GNU/Linux NotebookRoberto Innocenti
 
OSDC 2017 - Werner Fischer - Linux performance profiling and monitoring
OSDC 2017 - Werner Fischer - Linux performance profiling and monitoringOSDC 2017 - Werner Fischer - Linux performance profiling and monitoring
OSDC 2017 - Werner Fischer - Linux performance profiling and monitoringNETWAYS
 
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...Anne Nicolas
 
Kernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPFKernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPFBrendan Gregg
 
Development of Airshuttle AS-202
Development of Airshuttle AS-202Development of Airshuttle AS-202
Development of Airshuttle AS-202DebpratikGhosh
 
Examining Malware with Python
Examining Malware with PythonExamining Malware with Python
Examining Malware with Pythonmrphilroth
 
OSMC 2015: Linux Performance Profiling and Monitoring by Werner Fischer
OSMC 2015: Linux Performance Profiling and Monitoring by Werner FischerOSMC 2015: Linux Performance Profiling and Monitoring by Werner Fischer
OSMC 2015: Linux Performance Profiling and Monitoring by Werner FischerNETWAYS
 
OSMC 2015 | Linux Performance Profiling and Monitoring by Werner Fischer
OSMC 2015 | Linux Performance Profiling and Monitoring by Werner FischerOSMC 2015 | Linux Performance Profiling and Monitoring by Werner Fischer
OSMC 2015 | Linux Performance Profiling and Monitoring by Werner FischerNETWAYS
 
Electrical Schematic Open Hardware PowerPC Notebook motherboard
Electrical Schematic Open Hardware PowerPC Notebook motherboard Electrical Schematic Open Hardware PowerPC Notebook motherboard
Electrical Schematic Open Hardware PowerPC Notebook motherboard Roberto Innocenti
 
Linux kernel debugging(PDF format)
Linux kernel debugging(PDF format)Linux kernel debugging(PDF format)
Linux kernel debugging(PDF format)yang firo
 
Linux kernel debugging(ODP format)
Linux kernel debugging(ODP format)Linux kernel debugging(ODP format)
Linux kernel debugging(ODP format)yang firo
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined NetworksCisco Canada
 
TC74VHCT244AFW PSpice Model (Free SPICE Model)
TC74VHCT244AFW PSpice Model (Free SPICE Model)TC74VHCT244AFW PSpice Model (Free SPICE Model)
TC74VHCT244AFW PSpice Model (Free SPICE Model)Tsuyoshi Horigome
 
Symbolic Debugging with DWARF
Symbolic Debugging with DWARFSymbolic Debugging with DWARF
Symbolic Debugging with DWARFSamy Bahra
 

Similar to Protecting Python applications the simpler way (20)

TC74VHCT04AFN PSpice Model (Free SPICE Model)
TC74VHCT04AFN PSpice Model  (Free SPICE Model)TC74VHCT04AFN PSpice Model  (Free SPICE Model)
TC74VHCT04AFN PSpice Model (Free SPICE Model)
 
20200312 楊芝青律師-如何選擇適合的授權書取得權利
20200312 楊芝青律師-如何選擇適合的授權書取得權利20200312 楊芝青律師-如何選擇適合的授權書取得權利
20200312 楊芝青律師-如何選擇適合的授權書取得權利
 
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
44CON London 2015 - Jtagsploitation: 5 wires, 5 ways to root
 
Electrical Schematic of PowerPC GNU/Linux Notebook
Electrical Schematic of PowerPC GNU/Linux NotebookElectrical Schematic of PowerPC GNU/Linux Notebook
Electrical Schematic of PowerPC GNU/Linux Notebook
 
OSDC 2017 - Werner Fischer - Linux performance profiling and monitoring
OSDC 2017 - Werner Fischer - Linux performance profiling and monitoringOSDC 2017 - Werner Fischer - Linux performance profiling and monitoring
OSDC 2017 - Werner Fischer - Linux performance profiling and monitoring
 
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
Kernel Recipes 2017 - Performance analysis Superpowers with Linux BPF - Brend...
 
Kernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPFKernel Recipes 2017: Performance Analysis with BPF
Kernel Recipes 2017: Performance Analysis with BPF
 
Development of Airshuttle AS-202
Development of Airshuttle AS-202Development of Airshuttle AS-202
Development of Airshuttle AS-202
 
Examining Malware with Python
Examining Malware with PythonExamining Malware with Python
Examining Malware with Python
 
ARM 64bit has come!
ARM 64bit has come!ARM 64bit has come!
ARM 64bit has come!
 
crack satellite
crack satellite crack satellite
crack satellite
 
OSMC 2015: Linux Performance Profiling and Monitoring by Werner Fischer
OSMC 2015: Linux Performance Profiling and Monitoring by Werner FischerOSMC 2015: Linux Performance Profiling and Monitoring by Werner Fischer
OSMC 2015: Linux Performance Profiling and Monitoring by Werner Fischer
 
OSMC 2015 | Linux Performance Profiling and Monitoring by Werner Fischer
OSMC 2015 | Linux Performance Profiling and Monitoring by Werner FischerOSMC 2015 | Linux Performance Profiling and Monitoring by Werner Fischer
OSMC 2015 | Linux Performance Profiling and Monitoring by Werner Fischer
 
Hta r31
Hta r31Hta r31
Hta r31
 
Electrical Schematic Open Hardware PowerPC Notebook motherboard
Electrical Schematic Open Hardware PowerPC Notebook motherboard Electrical Schematic Open Hardware PowerPC Notebook motherboard
Electrical Schematic Open Hardware PowerPC Notebook motherboard
 
Linux kernel debugging(PDF format)
Linux kernel debugging(PDF format)Linux kernel debugging(PDF format)
Linux kernel debugging(PDF format)
 
Linux kernel debugging(ODP format)
Linux kernel debugging(ODP format)Linux kernel debugging(ODP format)
Linux kernel debugging(ODP format)
 
Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
TC74VHCT244AFW PSpice Model (Free SPICE Model)
TC74VHCT244AFW PSpice Model (Free SPICE Model)TC74VHCT244AFW PSpice Model (Free SPICE Model)
TC74VHCT244AFW PSpice Model (Free SPICE Model)
 
Symbolic Debugging with DWARF
Symbolic Debugging with DWARFSymbolic Debugging with DWARF
Symbolic Debugging with DWARF
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Togetherteam-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityteam-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenariosteam-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses Moreteam-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edgeteam-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applicationsteam-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magicteam-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisiveteam-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxteam-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solutionteam-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsteam-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 

Recently uploaded

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 

Recently uploaded (20)

办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 

Protecting Python applications the simpler way

  • 1. The simpler way Ruediger Kuegler VP Sales & Professional Services Axel Engelmann Architect Protection Technologies Protecting Python Applications 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 1
  • 2. Where to find the accompanying audio To access the on-demand replay of this masterclass, please visit www.wibu.com/resources/webinars/2021/python-simpler-way/access 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 2
  • 3. The Classical Way Cython AxProtector 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 3
  • 4. Python 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 4  Delivery as Python (text) file  No copy protection, no IP protection  Source code available to users, competitors, … class Pi: def __init__(self): self.rounds = 100000 def calc_pi(self): my_sum = 0.0 for i in range(self.rounds + 1): recent_val = ( (-1) ** i ) / (2 * i + 1) my_sum += recent_val return my_sum * 4
  • 5. Python  Cython 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 5  Delivery as platform dependent compiled library  Readable with disassembling tools like IDA Pro  No copy protection, extremely weak IP protection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class Pi: def __init__(self): self.rounds = 100000 def calc_pi(self): my_sum = 0.0 for i in range(self.rounds + 1): recent_val = ( (-1) ** i ) / (2 * i + 1) my_sum += recent_val return my_sum * 4
  • 6. Python  Cython  AxProtector 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 6  Delivery as encrypted platform dependent library  Strong copy protection, strong IP protection  Licensing and protection combined for high security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class Pi: def __init__(self): self.rounds = 100000 def calc_pi(self): my_sum = 0.0 for i in range(self.rounds + 1): recent_val = ( (-1) ** i ) / (2 * i + 1) my_sum += recent_val return my_sum * 4
  • 7. Additional Options  Automatically realizing different license models with AxProtector  Single User Licenses  Floating Network Licenses  Subscription Licenses  Using CodeMeter Core API for additional license models (officially available since release 7.20)  Modular Licenses (Features On Demand)  Pay-per-Use Licenses  Protection of data files 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 7
  • 8. Demo Demo 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 8
  • 9. The New Way AxProtector Python 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 9
  • 10. Why Do We Need a New Way?  The solution via Cython offers high security, but Wibu-Systems wants to offer even more  On-Demand Decryption during runtime  Modular Licenses with different cryptographic keys  The way via Cython creates platform dependent binaries  Simplified integration for software developers (no Cython needed) 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 10
  • 11. import axengine class Pi: def __init__(self): instance = axengine.axe_load(21, globals()) return instance(self) def calc_pi(self): instance = axengine.axe_load(22, globals()) return instance(self) Python  AxProtector Python 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 11  Every function is encrypted separately  Highest Security  Application is still platform independent  CodeMeter Runtime / Protection Suite Runtime needed (Windows, Linux, macOS) class Pi: def __init__(self): self.rounds = 100000 def calc_pi(self): my_sum = 0.0 for i in range(self.rounds + 1): recent_val = ( (-1) ** i ) / (2 * i + 1) my_sum += recent_val return my_sum * 4
  • 12. Demo Demo 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 12
  • 13. Demo  Encryption of a simple application  How to protect global functions  Moving them into a new function  How to combine Core API and AxProtector Python  Modular Licensing at source code level  Error handling via exceptions  IP Protection  Requirements (License, CPSRT, …) 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 13
  • 14. Summary AxProtector Python 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 14
  • 15. Summary  The new AxProtector Python offers highest security  Simplified integration for software developers  Easy and strong implementation of modular licenses  Combination of AxProtector Python and CodeMeter Core API is possible  Additional encryption of data  The classical way via Cython and AxProtector is still available  The principles AxProtector Python relies on are similar to those of AxProtector .NET 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 15
  • 16. https://www.wibu.com info@wibu.com Europe: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 Japan: +81-3-43608205 Thank you very much for your attention 2021-03-24 © WIBU-SYSTEMS AG 2021 – Protecting Python Applications the simpler way 16