SlideShare a Scribd company logo
1 of 31
Setting Licenses Free vs.
Locking Them Down
Ruediger Kuegler
VP Sales & Professional Services
Dr. Bjoern Grohmann
Security Architect Corporate Technology
License Lock-Down
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 1
Agenda
 Use Case for Locking Licenses Down
 Technical Foundations
 Firm Access Counter
 How to Lock Licenses Down
 with CodeMeter Protection Suite
 with CodeMeter License Central
 with CodeMeter Core API
 Releasing Locked Licenses
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 2
Use Cases for
Locking Down Licenses
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 3
Reverse Engineering Attack
 An attacker attempts to remove the licensing (CmDongle / CmActLicense)
from the software or to extract intellectual property from the application
 Automatically encrypted applications (AxProtector)
 Memory dump of the application
 Reassembly of IAT and OEP
 Queries in the software (CodeMeter Core API)
 Running the application in a debugger (dynamic analysis)
 Analysis of the application with a disassembler (static analysis)
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 4
Reverse Engineering Attack 2
 Individually encrypted application (IxProtector, AxProtector .NET,
AxProtector Java)
 Tooling to decrypt all the encrypted functions in the application
 Application with CodeMoving
 Run many requests and guess the functionality
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 5
Wouldn’t it be nice? (Reverse Engineering)
 Apart from the static analysis of simple API calls in the disassembler,
during each attack, parts of the application are executed and operations
(encryption, CodeMoving) are run in the CmDongle or in the CmRuntime
 This means that the attacker needs a valid license.
Wouldn’t it be nice,
if such attack patterns were detected and
the license was locked automatically?
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 6
Highlights from almost 30 years of dongle support
 “My dog has swallowed the dongle”
 “The dongle is cooked”
 Query
 “The whole factory has burned down and with it all the computers that were in it.
The dongle was still plugged to the computer.”
 “The dongle is dead because my computer has crashed”
 Query
 “The computer was on the desk and the dongle was plugged in, and now is no
longer working.”
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 7
Wouldn’t it be nice? (Lost dongles)
 Dongles can be lost. However, the user could also make such a claim to
get another license for free.
 Users expect a replacement.
 Trust or Doubt is the question.
Wouldn’t it be nice,
If you (the ISV) could deliver the user a new dongle and
did not have to worry about the allegedly lost dongle?
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 8
Cracked and missing CmActLicenses
 CodeMeter SmartBind® provides a tolerance level (Tight, Medium, Loose)
for changes to the user's hardware.
 A license can thus become invalid, if the hardware is changed beyond the tolerance
threshold.
 A license automatically becomes invalid, if the hard disk of one computer is cloned
on that of another computer.
 A license becomes invalid, if it is operated in a virtual high-availability solution, but
was not intended for it.
 A license may be lost, if the hardware crashes and the license has not
been previously disabled.
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 9
Wouldn’t it be nice? (Cracked and missing licenses)
 CmActLicenses can be lost or become invalid.
 Trust or Doubt is the question.
Wouldn’t it be nice,
if you (the ISV) could deliver the user a new license and
did not have to worry about the allegedly lost license?
if the process of releasing a new license could be automated
in accordance to a set of rules?
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 10
Technical Foundations
Firm Access Counter
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 11
Creating a License with CodeMeter
 The highest level is the CmContainer (CmDongle
/ CmActLicense / CmCloudLicense)
 The CmContainer includes 1 (CmActLicense,
CmCloudLicense) to n (CmDongle) Firm Items
 Each Firm Item is defined with properties, the
Firm Item Options
 The Firm Item includes the Licenses in the form
of Product Items
 The Product Item is defined with properties, the
Product Item Options
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 12
Firm Item: 6.000.010
…
Product Item: 201.000
Firm Item Options
Firm Item Text: My Company
Firm Update Counter: 1
Firm Access Counter: 0xFFFF
Firm Precise Time: 2018-05-03 …
…
Product Item: 201.000
Product Item Options
Product Item Text: My Software
License Quantity: 1, local
….
Firm Access Counter (Basics, CodeMeter API)
 Default value is MaxValue (65535, corresponding to 0xFFFF)
 If Firm Access Counter == 0, then cryptographic operations with this Firm
Item are no longer possible
 The Firm Access Counter can be decremented by 1 via CodeMeter API, if
it is not equal to MaxValue
 Prior to the delivery, the Firm Item must be set to the appropriate value !=MaxValue
 Call of CmCrpyt wih flag CM_CRYPT_FACDECREMENT
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 13
Firm Access Counter (IFIL, CodeMoving)
 The Firm Access Counter can be set directly to 0 via IFIL (Implicit Firm
Item Locking)
 No preliminary programming necessary, requires CmDongle firmware 1.14
 Requires the use of CodeMeter Protection Suite
 Used when reverse engineering of the application is detected
 Used when the code “falls into a trap”
 IFIL can be triggered via CodeMoving using the CodeMoving API function
trap_execute
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 14
Firm Access Counter (CodeMeter License Central)
 The Firm Access Counter can be set with CodeMeter License Central
 No preliminary programming necessary
 Can be set to any value
 Locking and unlocking are possible
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 15
Locking Licenses with
CodeMeter Protection Suite
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 16
Configuration in AxProtector
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 17
 Activate license access lock
 Recommendation: Lock license
container (new)
 Uses IFIL and does not require a
prepared Firm Access Counter
 The license is locked as soon as
one of the active anti-debug
checks reports a find
Use of IxProtector and Traps
 Implement a function
 Export the function
 Encrypt with AxProtector
 Specify the function under IxProtector with
the exported name
 Set the flag “trap”
 The decryption (e.g., due to execution) of this function triggers IFIL and
locks the license
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 18
Use of AxProtector .NET
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 19
 Activate license access lock
 Recommendation: Lock license
container (new)
 Uses IFIL and does not require a
prepared Firm Access Counter
 The license is locked as soon as
one of the active anti-debug
checks reports a find
 A license is also locked when a
trap is decrypted
Use of AxProtector .NET (automatic traps)
private void myFunction
(String value)
{
MessageBox.Show(value);
}
private void
btnHelloWorld_Click
(object sender, EventArgs e)
{
myFunction("Hello World");
}
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 20
Locking Licenses with
CodeMeter License Central
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 21
Automatic Blacklists
 The reactivation of an already activated license results in the addition of
the CmContainer in question to the blacklist
 Manual authorization by the vendor
 Automatic authorization with rules in CodeMeter License Central
 Next actions lock down all licenses with the same Firm Code
 License update (activation / deactivation)
 Auto update via WebDepot
 Auto update in your software
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 22
Automatic Blacklisting in CodeMeter License Central
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 23
Locking Licenses with
CodeMeter API
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 24
How to Integrate a Lock into Your Software
 Deploy blacklists with the next software release
 Export from CodeMeter License Central
 Integrate into the software (hash list)
 Check used serial numbers in software
 “Call” a trap function to execute the Lock-Down
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 25
AxProtector .NET (individual integration of a trap)
[WupiEngine.Protection
(WupiEngine.TrapLevel.Trap1)]
private void trap()
{
return;
}
private void btnDontClick_Click
(object sender, EventArgs e)
{
trap();
}
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 26
 One or more special functions
are marked as traps
 The decryption of the feature
automatically locks the license
(IFIL)
 A call to the function decrypts the
function
 As a test or for blacklisting
purposes
Releasing Locked Licenses
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 27
Removing a License Lock
The ISV
 Creates a “Remove Lock” Item in CodeMeter License Central
 Removes CmContainers from the blacklist 
 Sells the “Remove Lock” Item
 As Ticket (flexible)
 As auto update (assigned to a locked CmContainer)
The User
 Activates the “Remove Lock”
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 28
Summary
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 29
Summary
 License Lock-Down is a powerful CodeMeter feature that can be used in
the following use cases:
 Extended protection against reverse engineering
 Replacement of lost CmDongles
 Replacement of lost and invalid CmActLicenses
 Depending on the application, the integration can be carried out via
 CodeMeter Protection Suite
 CodeMeter License Central
 CodeMeter API and blacklist of missing CmContainers
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 30
Germany: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
http://www.wibu.com
info@wibu.com
Thank you for joining our today’s session
16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 31

More Related Content

Similar to Setting licenses free vs. locking them down

Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackersteam-WIBU
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-howteam-WIBU
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionHimanshu Arora
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCloudIDSummit
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesteam-WIBU
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET Journal
 
Top Ten Tips for IBM i Security and Compliance
Top Ten Tips for IBM i Security and ComplianceTop Ten Tips for IBM i Security and Compliance
Top Ten Tips for IBM i Security and CompliancePrecisely
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applicationsteam-WIBU
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponseErtugrul Akbas
 
HCLs Digital Asset Management Software to Organize Your Brand's Digital Assets
HCLs Digital Asset Management Software to Organize Your Brand's Digital AssetsHCLs Digital Asset Management Software to Organize Your Brand's Digital Assets
HCLs Digital Asset Management Software to Organize Your Brand's Digital AssetsHCLSoftware
 
Software License Models - Spicing up the Mix
Software License Models - Spicing up the MixSoftware License Models - Spicing up the Mix
Software License Models - Spicing up the Mixteam-WIBU
 
DataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance BenchmarksDataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance BenchmarksOzair Sheikh
 
DataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance BenchmarksDataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance BenchmarksIBM DataPower Gateway
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 parisMarcel Hartgerink
 
Building Automation System (BAS) competitive buying strategies
Building Automation System (BAS) competitive buying strategiesBuilding Automation System (BAS) competitive buying strategies
Building Automation System (BAS) competitive buying strategiesRich Purtell
 
Licensing for cross-platform applications made with Python, PHP, and JavaScript
Licensing for cross-platform applications made with Python, PHP, and JavaScriptLicensing for cross-platform applications made with Python, PHP, and JavaScript
Licensing for cross-platform applications made with Python, PHP, and JavaScriptteam-WIBU
 
SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech Quentin Samelson
 
brainwaregroup ITAM Review Tools Day Presentation 2015
brainwaregroup ITAM Review Tools Day Presentation 2015brainwaregroup ITAM Review Tools Day Presentation 2015
brainwaregroup ITAM Review Tools Day Presentation 2015Martin Thompson
 
Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Jeff Williams
 

Similar to Setting licenses free vs. locking them down (20)

Perfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the HackersPerfecting the Art of Unmasking the Hackers
Perfecting the Art of Unmasking the Hackers
 
StarForce ProActive for Business
StarForce ProActive for BusinessStarForce ProActive for Business
StarForce ProActive for Business
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
 
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes TschofenigCIS 2015 How to secure the Internet of Things? Hannes Tschofenig
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
 
Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
IRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable SoftwareIRJET- Development of Uncrackable Software
IRJET- Development of Uncrackable Software
 
Top Ten Tips for IBM i Security and Compliance
Top Ten Tips for IBM i Security and ComplianceTop Ten Tips for IBM i Security and Compliance
Top Ten Tips for IBM i Security and Compliance
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
ANET SureLog SIEM IntelligentResponse
ANET SureLog  SIEM IntelligentResponseANET SureLog  SIEM IntelligentResponse
ANET SureLog SIEM IntelligentResponse
 
HCLs Digital Asset Management Software to Organize Your Brand's Digital Assets
HCLs Digital Asset Management Software to Organize Your Brand's Digital AssetsHCLs Digital Asset Management Software to Organize Your Brand's Digital Assets
HCLs Digital Asset Management Software to Organize Your Brand's Digital Assets
 
Software License Models - Spicing up the Mix
Software License Models - Spicing up the MixSoftware License Models - Spicing up the Mix
Software License Models - Spicing up the Mix
 
DataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance BenchmarksDataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance Benchmarks
 
DataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance BenchmarksDataPower API Gateway Performance Benchmarks
DataPower API Gateway Performance Benchmarks
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 paris
 
Building Automation System (BAS) competitive buying strategies
Building Automation System (BAS) competitive buying strategiesBuilding Automation System (BAS) competitive buying strategies
Building Automation System (BAS) competitive buying strategies
 
Licensing for cross-platform applications made with Python, PHP, and JavaScript
Licensing for cross-platform applications made with Python, PHP, and JavaScriptLicensing for cross-platform applications made with Python, PHP, and JavaScript
Licensing for cross-platform applications made with Python, PHP, and JavaScript
 
SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech SMTAI PowerPoint: Blockchain for High Tech
SMTAI PowerPoint: Blockchain for High Tech
 
brainwaregroup ITAM Review Tools Day Presentation 2015
brainwaregroup ITAM Review Tools Day Presentation 2015brainwaregroup ITAM Review Tools Day Presentation 2015
brainwaregroup ITAM Review Tools Day Presentation 2015
 
Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security Innovating Faster with Continuous Application Security
Innovating Faster with Continuous Application Security
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Securityteam-WIBU
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Togetherteam-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basicsteam-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuitätteam-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityteam-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenariosteam-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practicesteam-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses Moreteam-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edgeteam-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magicteam-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisiveteam-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesteam-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licensesteam-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetiteteam-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxteam-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solutionteam-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to lastteam-WIBU
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applicationsteam-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
 

Recently uploaded

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 

Recently uploaded (20)

Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 

Setting licenses free vs. locking them down

  • 1. Setting Licenses Free vs. Locking Them Down Ruediger Kuegler VP Sales & Professional Services Dr. Bjoern Grohmann Security Architect Corporate Technology License Lock-Down 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 1
  • 2. Agenda  Use Case for Locking Licenses Down  Technical Foundations  Firm Access Counter  How to Lock Licenses Down  with CodeMeter Protection Suite  with CodeMeter License Central  with CodeMeter Core API  Releasing Locked Licenses 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 2
  • 3. Use Cases for Locking Down Licenses 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 3
  • 4. Reverse Engineering Attack  An attacker attempts to remove the licensing (CmDongle / CmActLicense) from the software or to extract intellectual property from the application  Automatically encrypted applications (AxProtector)  Memory dump of the application  Reassembly of IAT and OEP  Queries in the software (CodeMeter Core API)  Running the application in a debugger (dynamic analysis)  Analysis of the application with a disassembler (static analysis) 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 4
  • 5. Reverse Engineering Attack 2  Individually encrypted application (IxProtector, AxProtector .NET, AxProtector Java)  Tooling to decrypt all the encrypted functions in the application  Application with CodeMoving  Run many requests and guess the functionality 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 5
  • 6. Wouldn’t it be nice? (Reverse Engineering)  Apart from the static analysis of simple API calls in the disassembler, during each attack, parts of the application are executed and operations (encryption, CodeMoving) are run in the CmDongle or in the CmRuntime  This means that the attacker needs a valid license. Wouldn’t it be nice, if such attack patterns were detected and the license was locked automatically? 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 6
  • 7. Highlights from almost 30 years of dongle support  “My dog has swallowed the dongle”  “The dongle is cooked”  Query  “The whole factory has burned down and with it all the computers that were in it. The dongle was still plugged to the computer.”  “The dongle is dead because my computer has crashed”  Query  “The computer was on the desk and the dongle was plugged in, and now is no longer working.” 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 7
  • 8. Wouldn’t it be nice? (Lost dongles)  Dongles can be lost. However, the user could also make such a claim to get another license for free.  Users expect a replacement.  Trust or Doubt is the question. Wouldn’t it be nice, If you (the ISV) could deliver the user a new dongle and did not have to worry about the allegedly lost dongle? 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 8
  • 9. Cracked and missing CmActLicenses  CodeMeter SmartBind® provides a tolerance level (Tight, Medium, Loose) for changes to the user's hardware.  A license can thus become invalid, if the hardware is changed beyond the tolerance threshold.  A license automatically becomes invalid, if the hard disk of one computer is cloned on that of another computer.  A license becomes invalid, if it is operated in a virtual high-availability solution, but was not intended for it.  A license may be lost, if the hardware crashes and the license has not been previously disabled. 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 9
  • 10. Wouldn’t it be nice? (Cracked and missing licenses)  CmActLicenses can be lost or become invalid.  Trust or Doubt is the question. Wouldn’t it be nice, if you (the ISV) could deliver the user a new license and did not have to worry about the allegedly lost license? if the process of releasing a new license could be automated in accordance to a set of rules? 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 10
  • 11. Technical Foundations Firm Access Counter 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 11
  • 12. Creating a License with CodeMeter  The highest level is the CmContainer (CmDongle / CmActLicense / CmCloudLicense)  The CmContainer includes 1 (CmActLicense, CmCloudLicense) to n (CmDongle) Firm Items  Each Firm Item is defined with properties, the Firm Item Options  The Firm Item includes the Licenses in the form of Product Items  The Product Item is defined with properties, the Product Item Options 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 12 Firm Item: 6.000.010 … Product Item: 201.000 Firm Item Options Firm Item Text: My Company Firm Update Counter: 1 Firm Access Counter: 0xFFFF Firm Precise Time: 2018-05-03 … … Product Item: 201.000 Product Item Options Product Item Text: My Software License Quantity: 1, local ….
  • 13. Firm Access Counter (Basics, CodeMeter API)  Default value is MaxValue (65535, corresponding to 0xFFFF)  If Firm Access Counter == 0, then cryptographic operations with this Firm Item are no longer possible  The Firm Access Counter can be decremented by 1 via CodeMeter API, if it is not equal to MaxValue  Prior to the delivery, the Firm Item must be set to the appropriate value !=MaxValue  Call of CmCrpyt wih flag CM_CRYPT_FACDECREMENT 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 13
  • 14. Firm Access Counter (IFIL, CodeMoving)  The Firm Access Counter can be set directly to 0 via IFIL (Implicit Firm Item Locking)  No preliminary programming necessary, requires CmDongle firmware 1.14  Requires the use of CodeMeter Protection Suite  Used when reverse engineering of the application is detected  Used when the code “falls into a trap”  IFIL can be triggered via CodeMoving using the CodeMoving API function trap_execute 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 14
  • 15. Firm Access Counter (CodeMeter License Central)  The Firm Access Counter can be set with CodeMeter License Central  No preliminary programming necessary  Can be set to any value  Locking and unlocking are possible 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 15
  • 16. Locking Licenses with CodeMeter Protection Suite 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 16
  • 17. Configuration in AxProtector 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 17  Activate license access lock  Recommendation: Lock license container (new)  Uses IFIL and does not require a prepared Firm Access Counter  The license is locked as soon as one of the active anti-debug checks reports a find
  • 18. Use of IxProtector and Traps  Implement a function  Export the function  Encrypt with AxProtector  Specify the function under IxProtector with the exported name  Set the flag “trap”  The decryption (e.g., due to execution) of this function triggers IFIL and locks the license 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 18
  • 19. Use of AxProtector .NET 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 19  Activate license access lock  Recommendation: Lock license container (new)  Uses IFIL and does not require a prepared Firm Access Counter  The license is locked as soon as one of the active anti-debug checks reports a find  A license is also locked when a trap is decrypted
  • 20. Use of AxProtector .NET (automatic traps) private void myFunction (String value) { MessageBox.Show(value); } private void btnHelloWorld_Click (object sender, EventArgs e) { myFunction("Hello World"); } 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 20
  • 21. Locking Licenses with CodeMeter License Central 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 21
  • 22. Automatic Blacklists  The reactivation of an already activated license results in the addition of the CmContainer in question to the blacklist  Manual authorization by the vendor  Automatic authorization with rules in CodeMeter License Central  Next actions lock down all licenses with the same Firm Code  License update (activation / deactivation)  Auto update via WebDepot  Auto update in your software 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 22
  • 23. Automatic Blacklisting in CodeMeter License Central 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 23
  • 24. Locking Licenses with CodeMeter API 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 24
  • 25. How to Integrate a Lock into Your Software  Deploy blacklists with the next software release  Export from CodeMeter License Central  Integrate into the software (hash list)  Check used serial numbers in software  “Call” a trap function to execute the Lock-Down 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 25
  • 26. AxProtector .NET (individual integration of a trap) [WupiEngine.Protection (WupiEngine.TrapLevel.Trap1)] private void trap() { return; } private void btnDontClick_Click (object sender, EventArgs e) { trap(); } 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 26  One or more special functions are marked as traps  The decryption of the feature automatically locks the license (IFIL)  A call to the function decrypts the function  As a test or for blacklisting purposes
  • 27. Releasing Locked Licenses 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 27
  • 28. Removing a License Lock The ISV  Creates a “Remove Lock” Item in CodeMeter License Central  Removes CmContainers from the blacklist   Sells the “Remove Lock” Item  As Ticket (flexible)  As auto update (assigned to a locked CmContainer) The User  Activates the “Remove Lock” 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 28
  • 29. Summary 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 29
  • 30. Summary  License Lock-Down is a powerful CodeMeter feature that can be used in the following use cases:  Extended protection against reverse engineering  Replacement of lost CmDongles  Replacement of lost and invalid CmActLicenses  Depending on the application, the integration can be carried out via  CodeMeter Protection Suite  CodeMeter License Central  CodeMeter API and blacklist of missing CmContainers 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 30
  • 31. Germany: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 http://www.wibu.com info@wibu.com Thank you for joining our today’s session 16.05.2018 © WIBU-SYSTEMS AG 2018 - Setting Licenses Free vs. Locking Them Down 31