6
Security
6.1 The Use of Encryption
The security of CodeMeter / CodeMeterAct is based on encryption. The software to be protected or modules or
data in the software are encrypted by the developer before shipping. The key for decryption is part of the license
the developer generates for the end-user. On the user’s side, parts of the software are decrypted only when
needed. After use, these parts can be re-encrypted.
Figure 12: Security by Encryption
CodeMeter and CodeMeterAct are based on the same principles and map the same license models. In
CodeMeterAct (which completely runs in PC memory) different secret keys are used than those used by
CodeMeter, i.e. analyzing CodeMeterAct does not help a hacker draw any conclusions for the CodeMeter keys
safely stored in the smartcard chip.
6.2 Hardware Advantages
CodeMeter proved its field-tested security in several hackers’ contests. A music software manufacturer who
decided to use CodeMeter said, “6 months of security life was our objective, and now, after more than 3 years
there are no cracks to our software. This exceeded our expectations by far”.
25 | 44