Wibu-Systems White Paper | Page 25

6 Security 6.1 The Use of Encryption The security of CodeMeter / CodeMeterAct is based on encryption. The software to be protected or modules or data in the software are encrypted by the developer before shipping. The key for decryption is part of the license the developer generates for the end-user. On the user’s side, parts of the software are decrypted only when needed. After use, these parts can be re-encrypted. Figure 12: Security by Encryption CodeMeter and CodeMeterAct are based on the same principles and map the same license models. In CodeMeterAct (which completely runs in PC memory) different secret keys are used than those used by CodeMeter, i.e. analyzing CodeMeterAct does not help a hacker draw any conclusions for the CodeMeter keys safely stored in the smartcard chip. 6.2 Hardware Advantages CodeMeter proved its field-tested security in several hackers’ contests. A music software manufacturer who decided to use CodeMeter said, “6 months of security life was our objective, and now, after more than 3 years there are no cracks to our software. This exceeded our expectations by far”. 25 | 44