White Paper
Protecting the Runtime Environment
Should an intelligent hacker try to interfere with the runtime environment, he would again come up against CodeMeter protections. Reliable protection needs the runtime environment to be booted securely. CodeMeter is available for many operating systems and runtime environments.
Foundations
The operating system, runtime environment, development environment, and actual application need to use CodeMeter and the AxProtector technology as a protection layer to enable all parties in this chain to benefit from the effective protection of their assets. The advantage of CodeMeter is evident: a single secure licensing solutions is enough to shield everybody. All licenses( even from multiple vendors) can be secured on a single dongle.
The Threats and Our Response:
Copycats by Reverse Engineering
CC, called Copy Cat, was the first cloned cat. Even though the clone had used the original genome, Copy Cat’ s fur differed from its clone mum. In global markets, the number of commercial copycats is on the rise. No sector of industry is immune: The producers of industrial equipment are suffering just as much as luxury goods or fashion brands. Counterfeiters benefit from saving the steep costs of R & D and using cheaper materials. They can operate at much lower costs. They undermine and upset established markets. Many copycats offer their products under the original brand, with their often poor quality damaging the image of the victim’ s brand. Flawless protection is impossible, but the rise of copycats can be checked. How do copycats operate? They read documents that are in the public domain. They scan product brochures, specifications, and manuals. They visit trade fairs and take pictures of their prey. They might simply buy the product to tear it down and measure its designs. None of this can be prevented. When it comes to reverse-engineering software, the copycats will encounter a formidable opponent in the form of CodeMeter and the AxProtector encryption technology. This is where reverse engineering fails – as long as CodeMeter and the AxProtector technology is used at all phases in the software’ s protection chain. As a closed chain, the protection covers the boot loader, operating system, runtime environment, the application, its parameters, settings, and even user’ s data. CodeMeter is available for many operating systems and runtime environments.
Functions, classes, and methods encrypted using AxProtector become unreadable for the hacker
6