Perfection in Software Protection, Licensing and Cybersecurity http://podcast.wibu.com/ In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage. Podcast Generator 2.6 - http://podcastgen.sourceforge.net Wed, 16 Aug 2017 15:19:11 +0200 en Wibu-Systems AG http://podcast.wibu.com/images/itunes_image.jpg Perfection in Software Protection, Licensing and Cybersecurity http://podcast.wibu.com/ In its mission to deliver unique, most secure and highly versatile technologies to software publishers and intelligent device manufacturers, Wibu-Systems has developed CodeMeter, a comprehensive and award-winning suite of hardware- and software-based entitlement solutions for the protection of software rights and technical know-how against piracy, reverse engineering, tampering, sabotage, and espionage. Wibu-Systems' Video Podcast Channel Wibu-Systems Wibu-Systems team@wibu.com clean Activating Software like a Wizard The entitlement and disablement of functionalities, disablement of complete licenses, automatic updating of license checkpoints, and renewals of subscriptions or maintenance contracts are just some use cases you may come across Picture this: You need to change the license of one of your clients, and the user finds his entitlements updated next time he starts the software. Updating software entitlements like magic is possible. With CodeMeter License Central, Gateway, and Software Activation Wizard, you can easily and quickly implement license changes in your software. And the more effortless and straightforward this process becomes, the more likely it is that your customers are fully satisfied and the less support resources you’ll require for your license management.

The use cases for the automatic modification of licenses are numerous. These include:

  • Entitlement and disablement of functionalities
  • Disablement of the complete license
  • Automatic renewal of a subscription after payment
  • Automatic update of license checkpoints
  • Automatic renewal of the maintenance contract

With automatic updates, the user is not requested to perform any action, i.e. he does not have to activate the changes via a portal himself. This is not only easier, but it also gives you full control over the entitlements of your software. The Software Activation Wizard can be completely tailored to meet your requirements: you can integrate it into your software and optionally adapt it for your own processes or customize it in compliance with your own corporate design.

In addition to reducing costs by automation, Software Activation Wizard offers the possibility to track data and pass it on to CodeMeter License Central. One popular application is the registration of users during activation. This is an especially interesting option if the licenses are sold via different channels and you want to understand which users have purchased your software. You can also have free software activated and registered with this powerful tool. In this case, the license is created automatically under the hood during the activation process, and you get to know who is actually using your software. For named user licenses, the user name can also be conveniently recorded and associated with the license.

In this live training, we are going to cover a lot of ground:

  • Basic functions of Software Activation Wizard
    • Activating licenses
    • Disabling licenses
    • Restoring licenses
    • Finishing incomplete transfers
  • Advanced functions
    • Activation-defined parameters
    • Collecting registration data
    • Activating licenses in the network
  • Real-life use cases
    • Subscription models
    • User-bound licenses from the cloud
    • Disabling and locking licenses
    • Free software registration
    • Automatic generation of free and demo licenses
  • Interaction with WebDepot
  • Customization of the user interface
]]>
The entitlement and disablement of functionalities, disablement of complete licenses, automatic updating of license checkpoints, and renewals of subscriptions or maintenance contracts are just some use cases you may come across http://podcast.wibu.com/?name=2017-07-10_activating_software_like_a_wizard.mp4 http://podcast.wibu.com/?name=2017-07-10_activating_software_like_a_wizard.mp4 1:26:55 team@wibu.com (Wibu-Systems) Wibu-Systems Software activation, Software Licensing, Software Monetization no Wed, 21 Jun 2017 18:00:00 +0200
Dominating Industrie 4.0 with Secure Software Licensing The key element of the new CodeMeter Embedded 2.0 is compatibility: Compatibility with any embedded system platform and operating system, the complete array of Wibu-Systems’ hardware and software secure elements, and all the core elements of CodeMeter The future of the industry is digital and intelligent, powered by know-how expressed in software that enables collaborative robotics, Big Data and analytics, IIoT and M2M, augmented and virtual reality, and 3D printing. Collaboration between the makers of innovative solution and manufacturing companies promotes the dissemination of the Automation 4.0 culture, the understanding of its implications for competitiveness, and the implementation of successful use cases. At the core of the new infrastructure, we find Cyber Security 4.0 and Digital Business 4.0, both facilitated by CodeMeter Embedded 2.0.

The brand new generation of CodeMeter Embedded provides a broad spectrum of new features:

  • An extremely compact footprint: the technology is modular, so it’s your choice how to combine the modules you need and build a fully customized solution for your project.
  • Established compatibility with embedded systems and PLCs to cover the complete gamut of intelligent devices you intend to deploy.
  • Wider compatibility with platforms and operating systems; if you use a mainstream system, including ARM, Intel, and PPC, we deliver the corresponding libraries to you; if you use more exotic platforms, the source code is directly available to you.
  • Compatibility with the complete array of Wibu-Systems’ hardware and software secure elements: CmDongles, CmActLicenses, and CmLAN (License Server in a Network).
  • Compatibility with CodeMeter Runtime: no need to pick different solutions for complex architectures; CodeMeter covers all options at once.
  • Compatibility with CodeMeter Protection Suite, because top notch encryption is the starting point of all communication.
  • Compatibility with CodeMeter License Central: once security is in place, you can get on with creating, distributing, and managing your embedded software licenses and start monetizing your business.

Live a fully immersive experience in our next masterclass

During this webinar, we will intersperse theory and practice:

  • The common ground between CodeMeter Runtime and CodeMeter Embedded
  • Overview of all the license models CodeMeter Embedded supports
  • Inventory of all the supported CmDongles and third party hardware secure elements (including TPM) for CmActLicenses
  • ExProtector and AxProtector CmE: the dedicated modules of CodeMeter Protection Suite for CodeMeter Embedded
  • CodeMeter Core API: a powerful tool for robust cryptographic operations
  • Demo: How to encrypt with CodeMeter Core API
  • Demo: How to encrypt with CodeMeter Protection Suite
  • Demo: How to run CodeMeter License Central in offline mode with CodeMeter Embedded
  • Demo: How to license your IoT embedded software online
]]>
The key element of the new CodeMeter Embedded 2.0 is compatibility: Compatibility with any embedded system platform and operating system, the complete array of Wibu-Systems’ hardware and software secure elements, and all the core elements of CodeMeter http://podcast.wibu.com/?name=2017-03-10_dominating_industrie_4_0_with_secure_software_licensing.mp4 http://podcast.wibu.com/?name=2017-03-10_dominating_industrie_4_0_with_secure_software_licensing.mp4 1:08:15 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 08 Mar 2017 18:00:00 +0100
OPC UA Security: Native and Add-on Solutions for the Rise of Smart Factories OPC UA is a multi-platform, plug & play Information Exchange Standard that is facilitating the convergence of OT and IT. CodeMeter Embedded fully supports the defined Security Profiles, configurations and provides even stronger security. The Industrial Internet of Things has set the stage for the convergence of Operations Technology (OT) and Information Technology (IT), that is, the plant floor and the higher-level IT infrastructure. One of the many aspects of this transitional journey is represented by M2M communications.

OPC UA is a multi-platform, plug & play Information Exchange Standard for industrial smart automation and cloud networking. It standardizes communications within machines, between machines, and from machines to smart systems, securely networked with IoT architectures.

As a member of the OPC Foundation, Wibu-Systems has been an early adopter of the OPC UA standard in Industrie 4.0 projects like IUNO, the German national reference project for IT security in Industrie 4.0, S4SmartPro, the key finder prototype production line of SmartFactoryKL, and OpSit, the optimal use of smart items technologies in healthcare.

As recently pointed out in the Industrial Internet Security Framework as well, it is endpoints, i.e. the device or cloud-based components that have interfaces for network communication, that are particularly vulnerable in a world of cyber-physical systems connected to open networks. The Unified Automation ANSI C based and High Performance OPC UA SDKs, powered by CodeMeter Embedded, fully support the OPC UA defined Security Profiles and configurations and provide even stronger security for modern M2M communications. Secret information, like RSA private keys, certificates, and trust lists, is stored in a hardware secure element and protected from theft and tampering attacks. In a time when intellectual property is shifting in the value chain from hardware to software, manufacturers now also have new opportunities to capitalize on their software and offer feature-based, time-based, version-based, or pay-per-use models to scale up their offerings, expand their market share, and produce recurrent revenues.

Join Thomas J. Burke, President and Executive Director of the OPC Foundation, and Oliver Winzenried, CEO and co-founder of Wibu-Systems, for an insightful conversation on:

In this one-hour session, we are going to navigate you through a journey of exploration that will touch upon:

  • The elements of innovation in smart manufacturing
  • The connection requirements for M2M in the IIoT age
  • The building blocks of the OPC Unified Architecture
  • Use cases that are accelerating the rise of Smart Factories
  • The integration of CodeMeter in the OPC UA standard
  • The OPC UA security extension for endpoints

Working with Windows, Linux, macOS, or Android? With minimal embedded controllers up to massive cloud infrastructures? OPC UA and CodeMeter are equally suited, scalable, and secure, and most of all integrated in a streamlined fashion to provide the ultimate technology in access control, authentication, and encryption.

]]>
OPC UA is a multi-platform, plug & play Information Exchange Standard that is facilitating the convergence of OT and IT. CodeMeter Embedded fully supports the defined Security Profiles, configurations and provides even stronger security. http://podcast.wibu.com/?name=2016-12-14_final_opc_ua_security-native_and_add-on_solutions_for_the_rise_of_smart_factories.mp4 http://podcast.wibu.com/?name=2016-12-14_final_opc_ua_security-native_and_add-on_solutions_for_the_rise_of_smart_factories.mp4 1:06:37 team@wibu.com (Wibu-Systems) Wibu-Systems OPC UA, M2M, IoT no Tue, 13 Dec 2016 15:00:00 +0100
Perfecting the Art of Unmasking the Hackers In order to prevent a hacking attack, you need to think like a hacker and go beyond textbook cryptography. Planting perfectly crafted mines in the code is the ultimate means to vanquish perpetrators. Textbook cryptography can work in many cases, such as email encryption. But for software protection, theory is not enough – why is that? The author of an email is self-motivated (or not) to preserve the secrecy of his message. By contrast, the user of a software application is mostly interested in the application working seamlessly. Having a properly protected application or preserving security measures are far from his top priority. He is not above deception and disguise if it means fiddling with the system in order to reach his purpose: perfect convenience for himself as the user in the best case, piracy in less honorable cases.

In this context, the use of traps, especially in connection with an irreversible locking of the cryptographic key, proves extremely effective. You may be familiar with spy movies, where devices self-destruct after delivering a message. In software protection, the destruction sequence starts when a trap is triggered. Typically, an end customer uses the software without realizing that traps are even present. A hacker, instead, will trigger them in his attempt to reverse engineer the software.

This masterclass is going to classify the attack methods used by hackers and explore effective ways to safeguard ISVs against them. After outlining the concepts, we will give a live demonstration of  how to integrate traps in your application. With AxProtector .NET, integration is carried out automatically for you. If you prefer pulling the strings yourself or if you are dealing with a native application to protect, AxProtector .NET or AxProtector provide all the necessary freedom. During our time together, we will see both the manual and the automatic options.

Here are the main topics we are going to delve into:

  • Typical attack methods of hackers
    • Dynamic code analysis
    • Static code analysis
  • The concept of traps
    • Definition of traps
    • Secret messages to the dongle
    • How traps are triggered
  • Integration in .NET applications
    • Fully automated with AxProtector .NET
    • Manually in the source code
  • Integration in a native Windows application
    • Manually in the source code
    • Simulated triggering of a lock

Make the hackers’ mission impossible: Plant perfectly crafted mines in the code, and let them work for you.

]]>
In order to prevent a hacking attack, you need to think like a hacker and go beyond textbook cryptography. Planting perfectly crafted mines in the code is the ultimate means to vanquish perpetrators. http://podcast.wibu.com/?name=2016-11-04_perfecting_the_art_of_unmasking_the_hackers.mp4 http://podcast.wibu.com/?name=2016-11-04_perfecting_the_art_of_unmasking_the_hackers.mp4 1:04:36 team@wibu.com (Wibu-Systems) Wibu-Systems Hacker, Protection, Software no Wed, 19 Oct 2016 10:00:00 +0200
The License Portal – A Golden Pot of Opportunities The license portal is the turning point of the entire license lifecycle management system, as it couples expectations and requirements of end users and ISVs. The scope of a license portal goes way beyond license activation. When software administrators access the portal, they expect to easily manage the licenses they have purchased and typically have two main questions in mind: "How many licenses do I have left?" and "On which machine is a certain license?". The license portal should deliver an immediate and clear answer to them.

A software publishing startup that is about to commercialize its first application would explore the available license portals in search of a solution that offers not just automatic communication with its customers and saves support costs for the company, but also manages all license entitlement actions. More experienced ISVs that are already using WebDepot may be interested in more advanced features, such as integration with third party systems or even the coupling of proprietary solution with a fully comprehensive technology.

CodeMeter License Central WebDepot fulfills the requirements of all parties involved in license lifecycle management. This new masterclass will bring value to all software-powered businesses and present an excursus from basic principles like activation, de-activation, and re-activation to the latest functionalities, like restoring a lost CmContainer on the same computer, resuming a transaction that was interrupted, or distributing enforced updates.

Two of the main features of WebDepot are adjustable versatility and seamless integration into third party systems. If you don’t operate a customer portal yet or if you rather want to use the license portal as a separate solution in parallel with your existing portal, WebDepot comes in handy. During the online event, we will show you how you can customize WebDepot to match your corporate design style, even without any particular programming skills, and realize an efficient workflow with a simple configuration. For broader requirements, WebDepot provides a number of programming interfaces that can extend its core scope.

Even if you were already using a customer portal, you can still integrate WebDepot to achieve greater customer satisfaction. Depending on your framework and requirements, you can either simply connect WebDepot to your customer portal and use it directly or implement WebDepot functionalities into your own portal. During the live session, we will review a number of examples and best practices of effective integration from real life scenarios.

Alternatively or additionally to WebDepot, you can have your licenses activated by integrating the activation wizard in your own software. If you now ask yourself whether you then need to double-map your workflow, the answer is: No. Only the user interface is going to be available twice, in the portal and in your wizard. The business logic on the server, which maps most of the workflow, is identical. ActivationGateway, which your activation wizard uses to communicate with CodeMeter License Central, is derived from WebDepot.

Topics:

  • Online activation with WebDepot
  • Online activation with the software wizard and ActivationGateway
  • New functions of WebDepot
  • Customization of WebDepot to reflect corporate designs
  • Overview and examples of WebDepot extended functions
  • Integration in third party systems
  • Customizations of the software activation wizard

 

]]>
The license portal is the turning point of the entire license lifecycle management system, as it couples expectations and requirements of end users and ISVs. http://podcast.wibu.com/?name=2016-10-05_the_license_portal__a_golden_pot_of_opportunities.mp4 http://podcast.wibu.com/?name=2016-10-05_the_license_portal__a_golden_pot_of_opportunities.mp4 1:01:16 team@wibu.com (Wibu-Systems) Wibu-Systems License Management, Software Monetization, Licensing no Wed, 28 Sep 2016 18:00:00 +0200
Unleash the power of CodeMeter The new generation of CodeMeter is a goldmine of opportunities for ISVs and their users. Enriched with augmented automation capabilities and new flexibility, the secure distribution of software enters a new phase. Over the history of Wibu-Systems, there have been certain recurring reasons that have brought customers to select protection and licensing solutions: usually, these were software getting hacked, revenues lost, the inability to keep up with a homegrown solution in the long run, the wish to supply multiple licensing models, or the plan to integrate licensing into an existing back office system. However, when your primary needs are met, there’s still a ton of features that remain underutilized or not explored at all, just as happens with the configuration of our smart phones or the office applications we use every day.

 

Overview of CodeMeter

Integrate Once and Deliver Many: This has been our motto for more than 25 years. With the new breed of CodeMeter, we have brought this strategy to a new level. Learn how you can protect your software in a way that the next developments from Wibu-Systems can be enjoyed automatically without needing any adjustment to your software.

CodeMeter Core Features

Licensing is not child’s play; there are several technical, commercial, and marketing aspects to take into account in your overall strategy. CodeMeter offers a wide array of options for you. Our experts will show the best approach for each use case, the options that are applied the most, and the ones that are put into practice the least.

  • Firm Code, Product Code and License Options
  • CodeMeter Runtime – what you actually deliver to your end users
  • Setup of CodeMeter in a Network Environment
  • License Transfer – the art of borrowing licenses

Integration in the Software

To achieve effective security against piracy and reverse engineering, integrating CodeMeter into your software is one of the most delicate steps in the entire process. The Protection Suite offers a complete set of automated tools for the easy and secure encryption of your application or library. Additional APIs complement the technology and are specifically recommended for special purposes.

  • Automatic Encryption with the Protection Suite
  • WUPI: Software Protection API
  • CodeMeter Core API

Integration with Back Office Processes

A key success factor in license lifecycle management is a smooth progression from license creation to license delivery. CodeMeter License Central provides a simple and intuitive interface for creating licenses that can be integrated through SOAP interfaces with existing systems, such as SAP, Navision, Salesforce, Digital River, and many more. The usual complex process of transferring licenses is reduced to simple point-and-click with our online activation system.

  • Integration options
  • CodeMeter License Central – Editions and interfaces
  • Online activation over WebDepot and the Software Activation Wizard

This class is open to both newbies and pros. Regardless of your current expertise in protection and licensing, you will walk away with some priceless takeaways that will enrich your practices and make your business fly.

]]>
The new generation of CodeMeter is a goldmine of opportunities for ISVs and their users. Enriched with augmented automation capabilities and new flexibility, the secure distribution of software enters a new phase. http://podcast.wibu.com/?name=2016-06-23_24_unleash_the_power_of_codemeter.mp4 http://podcast.wibu.com/?name=2016-06-23_24_unleash_the_power_of_codemeter.mp4 1:16:45 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 13 Apr 2016 15:00:00 +0200
Smart factories redefine security paradigms The surge of smart factories is reshaping the very essence of industrial manufacturing. The security implications in terms of data, communication, and company assets are enormous. While the world still seems undecided on which terminology to use, the new industrial revolution has started and is already transforming the way we plan our future. Fuelled by the need to optimize the complete production lifecycle, make wiser use of natural resources, respond to fast-paced market changes, and level profitability across the globe, the new concept of Smart Factories was born.

We see several research hubs, laboratories, and aggregators in action across the globe, where private, public, and academic entities are collaborating to define the guidelines, best practices, and use cases for the new smart manufacturing world. The topic is still hotly debated, but it has already defined some fundamental building blocks:

  • Telecommunication – for the estimated 500 connected devices for every person that are expected to exist by 2020, we need fast, secure, and widespread distribution of internet access points and datacenters
  • Big Data – for decision management platforms to expand at a foreseen CAGR of 60% through 2019, we need enhanced data processing and security algorithms
  • Security in the most pervasive way – being secure, vigilant, and resilient is the new black in the connected age

The Industrial Internet Consortium (IIC) was founded in 2014 to promote the discussion between the leading vendors in IIoT and guide the future generation of intelligent manufacturing. 

In their exclusive presentation, Dr. Richard Soley, IIC Executive Director, and Oliver Winzenried, CEO and founder of Wibu-Systems, are sharing:

  • An outlook on today’s and tomorrow’s manufacturing notion
  • The role of IIC in coordinating a vast ecosystem of initiatives
  • The surge of Smart Factories in the IIC agenda
  • The security implications of the rise of AI in an industrial context
  • The reasons behind an endpoint security approach
  • The projects WIBU is engaged in for the development of secure smart factories
  • The turnkey technologies that are already available for safeguarding and monetizing the intellectual property of intelligent device manufacturers

The new generation of embedded system developers is essentially in the same predicament that ISVs of traditional PC applications found themselves in years ago. Let’s openly share the state of the union and forge secure and connected supply chains together.

]]>
The surge of smart factories is reshaping the very essence of industrial manufacturing. The security implications in terms of data, communication, and company assets are enormous. http://podcast.wibu.com/?name=2016-06-23_23_smart-factories-redefine-security-paradigms.mp4 http://podcast.wibu.com/?name=2016-06-23_23_smart-factories-redefine-security-paradigms.mp4 1:07:36 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 09 Mar 2016 15:00:00 +0100
Get your Licenses in Pole Position Ready to create an unbeatable licensing map to revitalize your sales and offer user's convenience? CodeMeter License Central 2.20 increases your productivity and reduces the time impact of your operations. All international surveys about software monetization agree on one thing: static or perpetual licensing models belong to the past. A strategic and proactive approach to licensing revitalizes software publishers’ sales and offers the convenience that users have come to expect.CodeMeter License Central 2.20 is a powerful answer to the question of high productivity / low time impact, and features three new license management highlights:

  • The configuration of transferable licenses for unrivaled ease of use
  • The bundling of products for a simplified management of modular licenses
  • A beautiful redesign of WebDepot and Gateway for license activation by the user

Topics

Transferrable licenses offer your users the option to temporarily borrow a license from a license server to their computer. The license can then be used online or offline. For the entire duration of the borrowing, the license becomes unavailable on the license server. We are going to show you the complete license lifecycle of a transferrable license, from its creation as a ticket in CodeMeter License Central to its delivery and use on the license server.

With Product Bundles, you can easily set up different product configurations and test them right away in the market. A bundle can be assigned to existing products or can be a product that includes a number of modules in itself. You can specify whether modules belong to a bundle simply by ticking and unticking them.

WebDepot and Gateway are both available as the interfaces for an online activation process and play an essential role for user’s convenience. We need to distinguish between two separate types of error messages: those that the users can deal with themselves, and internal errors. We will demonstrate how you can effectively detect and fix internal configuration errors, and how you can enable additional features, like the activation of multiple licenses, with just one request.

  • License transfer
    • Configuration of transferrable licenses
    • Activation on a license server (online / offline)
    • End-to-end transfer by the user
  • Product Bundles
    • The selling of modular products made easy
    • Configuration of Product Bundles
    • Activation of Product Bundles
  • The new version of Gateways / WebDepot
    • Error handling on the user’s or the vendor’s side
    • Activation of several tickets in one single request
    • Download the correct LIF file

A license management system should be as flexible as the license models you want to provide to your customers. Consider leveling up your offerings to keep up and outperform your clients’ expectations.

]]>
Ready to create an unbeatable licensing map to revitalize your sales and offer user's convenience? CodeMeter License Central 2.20 increases your productivity and reduces the time impact of your operations. http://podcast.wibu.com/?name=2016-06-23_22_get_your_licenses_in_pole_position.mp4 http://podcast.wibu.com/?name=2016-06-23_22_get_your_licenses_in_pole_position.mp4 1:03:24 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 17 Feb 2016 15:00:00 +0100
End-to-End License Transfer License deployment can take many different forms depending on environmental circumstances. It can be as straightforward as an activation on the license server for the networked users to use and monitor their license immediately. For many years, customers have been enjoying licensing from their server networks. Users can employ their licenses effectively and manage and analyze their use. Software publishers follow a simple deployment process: licenses are activated on a license server and can then immediately be used on networked computers. However, there are cases where a single license on a local computer or in a local dongle would be a better solution; for example, when the software is used on a construction site and the user has no VPN connection to the license server. A mobile license is also ideal when the user wants to continue editing a current project from his home office.

Wouldn‘t it be fantastic if the user could perform this conversion and transfer licenses by himself?

Join us for our next masterclass on End-to-End License Transfer to learn how we have streamlined the complete end-to-end process.

CodeMeter License Transfer offers more than just license borrowing. It combines a permanent end-to-end license transfer solution with traditional license borrowing from a network server. A permanent license transfer makes activating licenses easier on machines and devices that are still not connected to the Internet. In such cases, licenses can be carried manually by the service technician to the machine by means of a CmDongle.

License borrowing from a network server with CodeMeter License Transfer could not be easier. The user selects the license and clicks “Borrow”. The borrowable license is configured straightaway. Even changing licenses on the license server while licenses are borrowed becomes possible with CodeMeter. In the event that the user is outside the network, the administrator can also borrow the license offline for him. The borrowing period can be determined by the user for any duration between one second and a maximum value defined by the software publisher. After expiration, the borrowed license automatically becomes available again on the license server. A premature return or renewal is also possible at any time.

During this free 60-minute event, you will be able to learn about:

  • CodeMeter License Transfer
    • End-to-end license transfer
    • License borrowing in the network
    • Returning borrowed licenses
  • Options for license borrowing
    • Permitted target containers (CmDongle or computer-bound CmActLicense)
    • Authorization of end-to-end license transfer
    • Maximum borrowable time
  • Borrowing and moving modular licenses
    • Nested Product Items
  • Online and offline transfer of licenses
  • License updates by the manufacturer
  • Comparing moved licenses with CodeMeter License Central

Even though the Internet makes life easier in so many ways, there is no reason why users who are not connected to it should be put at a disadvantage. The new CodeMeter License Transfer facilitates license re-assignment in all possible environments.

]]>
License deployment can take many different forms depending on environmental circumstances. It can be as straightforward as an activation on the license server for the networked users to use and monitor their license immediately. http://podcast.wibu.com/?name=2015-11-05_21_end-to-end-transfer.mp4 http://podcast.wibu.com/?name=2015-11-05_21_end-to-end-transfer.mp4 1:09:28 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 04 Nov 2015 18:00:00 +0100
Demystifying Industrial Security The Industrial Internet is a massive game changer with its commercial value estimated at $33 trillion. Ruggedized environments are often characterized by substantial swings in temperature, humidity, and vibrations. The Industrial Internet is a massive game changer with its commercial value estimated at $33 trillion. Not only is it expected to give a strong boost in confidence to global GDP, increase performance even in customized production, and introduce a more sustainable manufacturing model, but it is also a remarkable accelerator of technological innovation. To be part of this evolution, OEMs need to implement guidelines that will reshape workflows and help them boost productivity. Security aspects are particularly relevant as they represent the keystone of the new connected infrastructure.

Over the recent years, Wibu-Systems has hardened CodeMeter®, its own protection, licensing, and security technology, to withstand ruggedized environments. Unlike the office world, many sectors of industry have special requirements, often characterized by substantial swings in temperature, humidity, and vibrations. This implies a complete redesign of the hardware secure elements where machine code is encrypted, login credentials stored, and licenses saved.

Among the many components that were carefully picked and subjected to extensive tests, the flash memory is one of the most critical ones. Our trusted solution partner Swissbit will cohost a webinar with us to shed light on the elements that should guide intelligent device manufacturers in their choice of reliable and fail-safe embedded memory.

During this free 60-minute event, you will be able to learn about:

  • Security threats that undermine connected industry
  • Pros and cons of industrial storage solutions
  • Fundamentals of flash memory NAND technology
  • Product highlights of Swissbit memory components
  • Benefits of adding security to a memory component
  • Available solutions for IP and integrity protection
  • Use cases for combining storage and security
  • Examples of an integration process workflow

Safeguard your knowledge with an all-round solution tailored to meet the needs of the most demanding market segments, including industrial, automation, automotive, networking and telecommunications, healthcare and life science, and defense.

]]>
The Industrial Internet is a massive game changer with its commercial value estimated at $33 trillion. Ruggedized environments are often characterized by substantial swings in temperature, humidity, and vibrations. http://podcast.wibu.com/?name=2015-10-12_20_demystifying_ind_sec.mp4 http://podcast.wibu.com/?name=2015-10-12_20_demystifying_ind_sec.mp4 1:07:18 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 07 Oct 2015 18:00:00 +0200
Certificates for Authenticity, Authentication or both? A journey from essential elements, to security requirements and applications, in order to master certificate usage, implement software authenticity, enforce user authentication, ensure integrity, and control access rights management. Digital certificates are a landmark in security history. Since their introduction, vendors and users have taken advantage of encrypted communication in secure email exchanges, file and disk cryptography, and secure logon to local and online systems. Law makers have taken decisive steps in promoting their applications and regulating their usage. Despite their effectiveness however, certificates still appear cryptic and cumbersome to many.

With this new masterclass, we would like to offer a comprehensive overview about certificate fundamentals and their potent role in relation to software protection, licensing and security. Through certificates, ISVs and intelligent device manufacturers can implement software authenticity and enforce user authentication, thus ensuring software integrity and access right management.

In this new webinar, we are going to illustrate:

  • What are certificates
    • Overview of asymmetric cryptography
    • How to identify a key as authentic
    • Self-signed certificates
    • Root certificates
    • Certificate chains
    • Revokation lists
  • Main applications for the use of certificates
  • Use case of a server certificate
    • Creation of a server certificate
    • Server requirements
  • Use case of a client certificate
    • Creation of a client certificate
    • Server requirements
    • Storage of client certificate on the PC
    • Demo with CodeMeter License Central
  • Certificate storage
    • Storage on a PC
    • Storage on a PC as a file
    • Storage on a PC with CSSI middleware
  • Certificates in software security
    • Authenticode
    • Certificate-based CodeMeter Universal Firm Code
    • Code integrity in AxProtector with certificates

Whether you are dealing with a computer-based or an embedded system application, certificates have reshaped the whole software security sphere.

Wibu-Systems technology is certificate-ready for straightforward integration. Smart card chips embedded in our devices, as well as security tools encompassed in our software protection tools simplify the use of certificates.

This is your chance to become certificate savvy and embark on a new journey towards a smarter use of certificates.

]]>
A journey from essential elements, to security requirements and applications, in order to master certificate usage, implement software authenticity, enforce user authentication, ensure integrity, and control access rights management. http://podcast.wibu.com/?name=2015-04-30_17_certificates_en.mp4 http://podcast.wibu.com/?name=2015-04-30_17_certificates_en.mp4 1:07:09 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 29 Apr 2015 18:00:00 +0200
Embedded Security and the Internet of Things - challenges, trends, solutions. Cisco forecasts that by 2020 there will be 50 billion connected devices on the planet spanning everything from entertainment and information to the industrial and medical markets Cisco forecasts that by 2020 there will be 50 billion connected devices on the planet spanning everything from entertainment and information to the industrial and medical markets. The benefits are obvious. The risks are significant with catastrophic consequences. Internet of Things (IoT) security is a broad issue with many dimensions.

Security experts from RTI, Texas Instruments, Thingworx, and Wibu-Systems willl describe risks and solutions for securing IoT devices during this one hour Webinar hosted by OpenSystems Media.

Topics for discussion include:

  • Secure software updates via integrity protection
  • Data centric security for the IoT
  • Protecting Internet communications in IoT devices
  • Secure IoT deployments

Join Wibu-Systems and other IoT security experts from the silicon, software, and services sectors as we describe risks and solutions for securing IoT devices during a one hour Webinar.

]]>
Cisco forecasts that by 2020 there will be 50 billion connected devices on the planet spanning everything from entertainment and information to the industrial and medical markets http://podcast.wibu.com/?name=2015-04-15_16-17_iot-opensystemmedia_embedded_security.mp4 http://podcast.wibu.com/?name=2015-04-15_16-17_iot-opensystemmedia_embedded_security.mp4 1:05:52 team@wibu.com (Wibu-Systems) Wibu-Systems IoT, Security, Protection no Thu, 09 Apr 2015 16:09:00 +0200
Embedded security in ARM-based microcontrollers CodeMeter µEmbedded extends the security features to Programmable Logic Controllers and microcontrollers. The integration with the XMC4000 microcontroller from Infineon Technologies offers software developers the ability to protect and license their code CodeMeter µEmbedded from Wibu-Systems enhances the standard tool chain to provide secure firmware updates or functional upgrades in embedded systems built around the XMC4000 microcontrollers made by Infineon Technologies. This ARM Cortex™ family features a huge set of connectivity peripherals and is designed for controls of industrial applications, especially in harsh environments. It predominantly addresses five target markets: factory automation, building automation, transportation, power and energy, and home and professional applications. What these have in common is the many and diverse security challenges they face.

With CodeMeter µEmbedded, software developers of field programmable gate arrays and microcontrollers can protect their application code and intellectual property against reverse engineering and implement a license control system. The technology represents a practical answer to common security needs: How to protect intellectual property that is shared with a contractor from cloning, how to provide secure firmware upgrades in the field, how to make sure that only authorized devices are built in factory machines, or how to enable additional functionality in a microcontroller that is already operational in the field.

The tools for the protection of the application code are fully integrated in the development platform DAVE™. The user-friendly dialogue frontend of CodeMeter µEmbedded created for the DAVE plugin is a great help also to those developers who have little cryptography skills in their arsenal. In one single dialogue, they are able to input all required security settings to guarantee the effective and thorough integrity protection of their machine code.

Note:Product branding was updated since the webcast took place; please note that:

  • µCodeMeter has become CodeMeter µEmbedded
  • μCmE has become CmµE
  • μExEngine has become ExEngine
  • μCmActLicense has become CmActLicense
  • μExProtector has become ExProtector
]]>
CodeMeter µEmbedded extends the security features to Programmable Logic Controllers and microcontrollers. The integration with the XMC4000 microcontroller from Infineon Technologies offers software developers the ability to protect and license their code http://podcast.wibu.com/?name=2015-08-19_infineon.mp4 http://podcast.wibu.com/?name=2015-08-19_infineon.mp4 26:12 team@wibu.com (Wibu-Systems) Wibu-Systems Embedded, microcontroller, Infineon, Secure Boot, no Tue, 24 Feb 2015 16:00:00 +0100
A guided protection system for Java applications AxProtector Java is an essential encryption component of CodeMeter. Unlike the traditional AxProtector, AxProtector Java makes use of special techniques tailored for this language that encrypt the intermediate code. Currently Java is installed on 97% of enterprise desktops: this is an impressive rate that makes Java the number one choice for software developers. This exponential success is due not only to its development simplicity and fast execution, but mainly to the heterogeneous computing platforms supported, which results in its extreme portability. In a server environment, Java has no rival. Java application servers handle connections to the database on one side, and, often, connections to the Web client on the other.

All these factors, however, make Java a preferred target for hacking. In particular, reverse engineering is the primary source of attack. Unlike native applications, Java does not generate machine code, but rather an intermediate code, which is executed in a Java Runtime. This intermediate code is simple enough to be reconverted back to source code. Since existing copy protection and licensing mechanisms are quickly removable, implementation details and trade secrets become an easy prey for unauthorized third parties.

AxProtector Java protects and licenses desktop applications, application servers and Eclipse Plugins. Just like Java, AxProtector Java is available for multiple platforms: Windows, Linux, OS X and Android.

This presentation introduces some of the basic protection technologies for Java, and compares them to the superior qualities of AxProtector Java. Once the application is secure, licensing suffers from no risk either, and CodeMeter seamlessly provides a flexible licensing system as well.

During this hour together, we will specifically go through:

  • An overview of protection technologies for Java applications
  • AProtector Java fundamentals
  • Options for AxProtetcor Java
  • Protection at class and method levels
  • A quick introduction to licensing Java applications

AxProtector Java is your guided protection system that will lead your way to prosperous licensing revenues for your Java application.

]]>
AxProtector Java is an essential encryption component of CodeMeter. Unlike the traditional AxProtector, AxProtector Java makes use of special techniques tailored for this language that encrypt the intermediate code. http://podcast.wibu.com/?name=2015-02-18_13_a-guided-protection-system-for-java-applications.m4v http://podcast.wibu.com/?name=2015-02-18_13_a-guided-protection-system-for-java-applications.m4v 51:57 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Thu, 25 Sep 2014 16:00:00 +0200
Your driving license to expert cryptography AxProtector is definitely your primary choice: it provides automatic protection tools, it is extremely secure, and the fastest encryption solution. Few successful software applications don't use cryptographic methods as they protect code and data from predatory attacks.By analogy, applying cryptography is like driving a car. Just as you first have to learn what all the controls are for before you can go zipping down the interstate, first you must become familiar with basic cryptographic methods. And just like yesterday's trendy car is no longer in vogue today, obsolescence in security is accelerating.

There isn't much you can do to slow down technological evolution, but as a software developer, you can ensure that a primary responsibility is to use cryptography properly and safely.CodeMeter offers a wide range of cryptographic methods and harnesses Wibu-Systems' vast experience and knowledge. Nevertheless, even great technologies like CodeMeter may fail  if they have been implemented poorly or without the necessary safety precautions.

Ready to enroll for a new driving license in cryptography?

The presentation provides an overview of the available cryptographic methods in CodeMeter API.

An essential key point is the secure storage of private and secret keys; the first question you should ask yourself is where you should be storing your licenses. CmDongle, the hardware-based protection vessel, offers an impenetrable fortress. CmActLicense, the software-based container, is available with a unique and proprietary technology, SmartBind. The private and secret keys are stored in an encrypted license file whose key is the fingerprint of the specific PC to which the license file is bound.

How to operate encryption is your second important decision; that should depend on the kind of application you have developed and the threat scenario you are going to face in your business model.Finally, there are many cool facts: did you know that in Counter Mode (CTR), encryption with AES is really just about XOR? For example, consider a database field with a Boolean value. A simple encryption with AES returns exactly two possible encrypted values. This means that an attacker would actually be able to derive the unencrypted value for all records by knowing just one record

During this presentation, we will discuss:

  • HASH functions
    • SHA 256
  • Symmetric encryption
    • AES 128
    • Direct encryption in CmContainer
    • Indirect encryption
    • Encryption without CmContainer
    • Selection of the most appropriate operating mode
  • Asymmetric encryption
    • ECC 224
    • RSA 2048

This is where our journey begins: we’ll show you practical examples about how to implement CodeMeter in ways that allow it to protect your software today and tomorrow.

]]>
AxProtector is definitely your primary choice: it provides automatic protection tools, it is extremely secure, and the fastest encryption solution. http://podcast.wibu.com/?name=2015-02-18_12_your-driving-license-to-expert-cryptography.m4v http://podcast.wibu.com/?name=2015-02-18_12_your-driving-license-to-expert-cryptography.m4v 1:13:58 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Thu, 04 Sep 2014 16:00:00 +0200
AxProtector exposed - Integrity protection of a modular application With AxProtector, the Wibu-Systems CodeMeter module for program code encryption, ISVs can protect their modular applications meeting both security and convenience requirements. Convenience is the natural enemy of security. How to calibrate the two factors? Who is involved in the process? What is the optimal ratio for your specific scenario? Let's discover this critical aspect together.Pretty frequently, protection and licensing of a complete software modular application are handled via a central component (“license.dll”). This is especially true for articulated applications, consisting of several modules (.exe and .dll). In this case, the emphasis is usually on ease, convenience and cost containment for the whole process. The downside though is in terms of security: the hacker will also commonly have an easy way in his attempt to bypass protection and licensing: He will just have to replace the central license.dll with his own implementation. On the other side, the security maniacs will care of all the details, oftentimes missing the scope of application performance and cost sustainability.AxProtector, the core engine of Wibu-Systems CodeMeter, shows that convenience and security are not fully incompatible.

  • AxProtector protects all that is required: each module (.exe or .dll) that needs copy protection from IP infringements and individual licensing is encrypted, so that the central license.dll is no longer called for
  • AxProtector is attentive to the economy of your enterprise: it is fully automatized

But AxProtector can do even more. It does ensure the integrity of the complete application. Each .dll can be loaded only from the designated application. The intrusion of a foreign .dll in your application is just as impossible as the misuse of your .dll in a foreign product. And even the individual modules are protected with a self-check against manipulation.During this presentation we will explore the following main topics:

  • Requirements of integrity protection
  • Analysis of the preventive aspects
  • The chicken and egg problem in verification: .exe or .dll
  • Detection and response to tampering
  • Basics of asymmetric cryptography
  • Hardware vs Software based protection
  • Live demonstration of AxProtector: what it performs automatically and what you should be attentive to

No need to sacrifice or compromise: Convenience and security can definitely be best friends. It's just a matter of accurate balance.

]]>
With AxProtector, the Wibu-Systems CodeMeter module for program code encryption, ISVs can protect their modular applications meeting both security and convenience requirements. http://podcast.wibu.com/?name=2015-02-18_10_axprotector_exposed_integrity_protection_of_a_modular_application.m4v http://podcast.wibu.com/?name=2015-02-18_10_axprotector_exposed_integrity_protection_of_a_modular_application.m4v 1:21:19 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Thu, 24 Apr 2014 16:00:00 +0200
CodeMeter secures CODESYS applications The partnership between 3S-Smart Software Solutions and Wibu-Systems was born out of the market need for IP protection against reverse engineering, and copy protection against counterfeiting attempts. CODESYS from 3S-Smart Software Solutions is the most widely used manufacturer independent IEC 61131-3 Development System on the market. By including an integrated visualization with different clients, integrated connection to all standard fieldbus systems, motion functionality, safety solutions and communication interfaces, it covers the complete software side of automation.CodeMeter from Wibu-Systems is a world leading technology that streamlines software monetization strategies. With the same unique platform customers can enjoy the most sophisticated software protection techniques and a highly flexible licensing management system. It finds optimal application in both the ISV and the industry automation worlds.The partnership between 3S-Smart Software Solutions and Wibu-Systems was born out of the market need for IP protection against reverse engineering and copy protection against counterfeiting attempts. The integration of CodeMeter with CODESYS has involved different technological levels:

  • the protection of the source code in the development tool
  • the protection of the boot application
  • the protection of the usage through application functions and libraries
  • the creation of protected code for PLC target systems

During this presentation you will learn

  • how you can easily implement software protection when developing with CODESYS
  • how you can add plugins for license management to your CODESYS-based application
  • how you can get your entry level development kit
  • about recent development undertaken by the two companies over the last few months

Your moment of truth is now: don't let your CODESYS application be the prey of hackers, and start licensing it in a professional and convenient way.

]]>
The partnership between 3S-Smart Software Solutions and Wibu-Systems was born out of the market need for IP protection against reverse engineering, and copy protection against counterfeiting attempts. http://podcast.wibu.com/?name=2015-02-18_06_codemeter_secures_codesys_applications.m4v http://podcast.wibu.com/?name=2015-02-18_06_codemeter_secures_codesys_applications.m4v 53:58 team@wibu.com (WIBU-SYSTEMS AG + 3S-Smart Software Solutions) WIBU-SYSTEMS AG + 3S-Smart Software Solutions no Tue, 15 Oct 2013 08:49:00 +0200
Hackers Reverse Engineering Uncovered - Latest hacking strategies unveiled for best in class protection systems Given the multiplying hacking attempts, it is essential not just to implement code protection measures but also to execute optimally. We all know that in order to defend ourselves from burglars we need safety doors and alarm systems. But what happens if their installation is left to unskilled craftsmen? The same analogy can be extended to the world of software protection.Wibu-Systems has dedicated 25 years to refine the best practices that can allow Independent Software Vendors and Original Equipment Manufacturers to protect their intellectual and business assets.

Given the multiplying attempts of hacking, it is essential to implement software protection in an optimal way. This process is the key to make sure no duplicated copy of your licenses is ever used without your authorization, no manipulation of your code is ever made possible, no reverse-engineering is ever allowed.

During this presentation you will learn how to uncover reverse engineering attacks; we will specifically navigate you through:

  • Simple software protection API call in .NET
  • Implementation of critical parts as unmanaged code
  • Use of Authenticode signatures
  • Use of obfuscation techniques
  • How to hide function calls with reflection
  • Protection data with encryption API
  • Encryption of executable code

In the second part of the presentation we will focus on AxProtetcor .NET and IxProtector .NET from Wibu-Systems, and more specifically on:

  • Basic principles of code encryption with AxProtector and IxProtector
  • Performance vs. Paranoia: how to fine-tune your application
  • Integration of features-on-demand
  • Source code queries and selection with attributes
  • Examples of traps to lock the license
  • How to handle license error messages with routines of your own

Software protection is a particularly delicate process which requires an extended knowledge of all tools and technologies available, a strategic approach, and the fine tuning of the protective measures you have selected. Take the necessary time to go through the entire process with care and be ready to review it as the market space evolve and hackers becomes more canning.

]]>
Given the multiplying hacking attempts, it is essential not just to implement code protection measures but also to execute optimally. http://podcast.wibu.com/?name=2015-02-18_05_hackers-reverse-engineering.m4v http://podcast.wibu.com/?name=2015-02-18_05_hackers-reverse-engineering.m4v 1:59:44 team@wibu.com (WIBU-SYSTEMS AG) WIBU-SYSTEMS AG no Wed, 09 Oct 2013 16:00:00 +0200
Customer centric view of best practices in software monetization Software monetization is the key strategy to grow your top line revenues while controlling bottom line costs. The 3 S’s of Wibu-Systems unveiled: seamless, secure and scalable technology. Software Monetization is the capability to effectively maximize your software revenue by meeting market demands. As such, it is the combination of entitlement management and piracy prevention. The entitlement management is the foundation upon which license management is built. It includes in fact the definition of software SKUs, the definition and the enforcement of license policies, backoffice functions, like license generation, tracking and transaction management, as well as usability functions, like the transfer or the upgrade of licenses, usage auditing and more.

This webinar is loaded with new perspectives from Frost & Sullivan Industry Analysts for the growth of your business. Software monetization is the key strategy to grow your top line revenues while controlling bottom line costs. The 3 S’s of Wibu-Systems unveiled: seamless, secure and scalable technology. Real business usages you can apply to increase the strength of your application and multiply licensing models.

]]>
Software monetization is the key strategy to grow your top line revenues while controlling bottom line costs. The 3 S’s of Wibu-Systems unveiled: seamless, secure and scalable technology. http://podcast.wibu.com/?name=2015-02-18_01_customer_centric_view_in_software_monetisation.m4v http://podcast.wibu.com/?name=2015-02-18_01_customer_centric_view_in_software_monetisation.m4v 1:16:56 team@wibu.com (Wibu-Systems) Wibu-Systems no Wed, 05 Dec 2012 16:00:00 +0100