KEYnote 37 English - Spring 2019 | Page 7

specially authorized software can read. This shields the logs against accidental or deliberate deletion by the user or a virus. 2-Factor Authentication Highly sensitive use cases, such as ATMs, can demand two-factor authentication: possession and knowledge. The service technician would need to be in possession of a CmDongle and know the password for the CmDongle. Both are needed to start the software and provide the required services. Encryption As with its protections against unscrupulous competitors, CodeMeter again offers an opportunity to encrypt data and software. They could then only be used if the right license is present; decryption is only possible for a defined period of time. After that open period has passed, the data becomes worthless for whoever has access to it. By binding the license to a named employee’s workstation, it becomes even harder to pass on the license without authority. Unauthorized Modifications by the Client There can be use cases in which an incorrectly configured machine can have fatal conse- quences. OR room equipment or a dialysis machine are just two obvious examples, but even in less life-threatening cases, tampering with the settings can lead to waste or in- creased wear and tear. This could be a poorly calibrated dental milling machine or the incorrect maximum RPM of a wind turbine. To forestall any debates about warranties, CodeMeter allows the settings and calibration of equipment to be restricted to certified service technicians. Logging CodeMeter is also the solution of choice for cases in which the user or service technician must be able to configure the settings themselves. A CmDongle can be used to identify who changed any of the settings. A tamper-proof log is kept to record the changes and the person who authorized them. A CmDongle with flash memory can also be used to record the logs in an area that only One of the two factors making CodeMeter an effective choice for service software and service documents is the option to encrypt data with a key bound to the license. Only a service technician who has the right key can access the software and documents, decrypt them, and use them for his work. CodeMeter offers a granular selection of different rights and entitlement levels. CmDongles or CmActLicenses bound to a specified device provide solid and protected key storage for this purpose. Automatic License Renewals The second critical factor is the issuing of automatically renewals. These are created via CodeMeter License Central and collected by the service technician. As the issuer, you limit them to a specific period to reduce the risk of licenses falling into the wrong hands. Your software regularly checks back with CodeMeter License Central to renew the license automatically in the background. This would mean that a service technician who stays online will always have a fully usable license. If a license is lost in the field, it is locked in CodeMeter License Central and expires automatically. Changes like new rights for new documents or features can also be rolled out in the background in this manner – or withdrawn if need be. 7