SlideShare a Scribd company logo
1 of 36
Download to read offline
CmReady
Facts and Use Cases
Marco Blume
Product Manager
marco.blume@wibu.com
Christian Ullrich
Head of Product Management Security
christian.ullrich@swissbit.com
2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
To access the on-demand replay of this masterclass,
please visit
https://www.wibu.com/wibu-systems-
webinars/unlocking-the-future-empowering-industrial-
security/access.html
2024-03-13 2
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
www.swissbit.com
About Swissbit
3
Swissbit NA
Silicon Valley, CA
Sales
Swissbit Germany
Berlin
R&D + Production
Swissbit Japan
Tokyo
FAE support + Sales
Swissbit NA
Central Region, IL
Sales
Swissbit Taiwan
Taipei City
FAE support, Sales
Swissbit NA
Westford, MA
R&D + FAE support
Swissbit Embedded IoT Solutions
Munich
R&D, FAE support, Sales & Marketing
Swissbit AG
Bronschhofen Switzerland
Headquarters, R&D,
FAE support, Sales & Marketing
Swissbit China
Dongguan City
FAE support
HEADQUARTER
Switzerland, Bronschhofen
EMPLOYEES
> 450 worldwide
SWISSBIT AG
Hyperstone GmbH
Konstanz, Germany
Headquarters, R&D
Hyperstone Inc
Mission Viejo, CA
Sales & Support
Hyperstone Taiwan
Taipei City
Sales & Support
Swissbit – Company Overview
www.swissbit.com
Products and Solutions for securing a digitally connected world
4 Swissbit – Company Overview
Reliably Storing Data
NAND Flash Memory Module &
Components
Protecting Data & Devices
Hardware & Software-based
security solutions
Storing & Protecting Data
NAND Controller for Industrial &
Security applications
Services
Memory Embedded IoT Hyperstone
www.swissbit.com
Production “Made in Germany”
Production Site Berlin
Production and office area: 10,000m²
Production capacity: 2-3 Mio units / month
IATF 16949 – ISO 9001 - ISO 14001 – ISO 27001 – ISO 50001
5 Swissbit – Company Overview
www.swissbit.com
DP Product Features - Overview
6
• Hardware & Security features
- Industrial grade robust memory, longevity, fixed BOM
- AES 256-bit encryption, fast crypto-wipe option
- Implicit and replay-safe secure authentication
- Authenticity and integrity check
- User PIN and administrator login
- Hidden Storage / OTP (One Time Programmable) memory
• Secure Memory
- CD-ROM function protects read-only data such as boot media, software installers, or any data
that must not be overwritten.
- Private partitions encrypt and protect any type of data. After secure PIN login, this type of
partition is unlocked and available for unrestricted read-write access.
- Hidden storage serves to store WORM data (Write Once, Read Multiple) or random
accessible special data that can be controlled in every detail.
• Supported operating systems: Linux, Windows
• Supported platforms: X86/X64 and ARM
Swissbit – Features of Swissbit Data Protection SD and microSD cards
www.swissbit.com
CARD MEMORY
Data Protection features – How can they be used?
Exemplary Use Case: Manufacturing
Physical
storage
Visible
storage
Boot partition
Read only
Boot partition is write protected.
• content fully controlled by card issuer
OS partition
Read only
Pin protected
OS partition
• cannot be modified
• only visible after authentication of system
• content controlled by card issuer
Private Data
read/write
Pin protected
User data or dynamic part of OS
• only accessible after authentication by system or user
• content controlled by the system
NVRAM
configurable access
Hidden memory
NVRAM partition
• hidden, cannot be formatted
• Audit trails, “flight data recorder”
7 Swissbit – Features of Swissbit Data Protection SD and microSD cards
www.swissbit.com
Swissbit (micro)SD Memory Cards
What makes them different
8 Swissbit – Difference between commercial and industrial SD cards
Support for Life Time
Monitoring
Dedicated industrial
grade controller
Longevity
components
and locked BOM
Manufactured in IATF
16949 certified
Swissbit fab
NAND flash pretested for
industrial temperature
Top grade
NAND quality
Firmware optimized for
industrial requirements
Best-in class power
interrupt stability
(verified >10’000
cycles)
www.swissbit.com
Swissbit (micro)SD Memory Cards
What makes them different than commercial cards – exemplary snippets
9 Swissbit – Difference between commercial and industrial SD cards
Stress test PASS –
11‘400 power
interrupts
Although tested
temperature range 165°C
was well outside of the
card’s
specification (-40°C to
85°C), all of the original
data remained fully
intact.
www.swissbit.com
Swissbit CmReady Product portfolio
10
Available form factors
SD Memory card (PS-66 DP)
microSD Memory card (PS-66u DP)
Data transfer Speed class 10, UHS-I Class 3, A1, V30
Temperature range -40°C to 85°C
FLASH technology pSLC
Density 16 - 64 GB (& 4-8 GB ext. OP variants)
Swissbit – Product portfolio of CmReady SD and microSD cards
www.swissbit.com
Customer & Distribution Network
Over 25 Blue-Chip rated customers world wide
More than 4000 customers worldwide, covering wide
range of embedded applications
Global Distribution Network
Webshop Partners
11 Swissbit – Product portfolio of CmReady SD and microSD cards
WIBU-SYSTEMS AG in Short
2024-03-13 12
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
• Founded in 1989, staff >150 people
• Headquarter Karlsruhe, Germany
• Global subsidiaries:
• USA, China, Japan & Europa
• Financially Independent
• Global market leader
• Comprehensive Solution
• Technology Leadership
• Our Vision: Digital Sovereignty via
security and strong collaboration
Customers and Partners
2024-03-13 13
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
The Overall Picture of Protection and Licensing
2024-03-13 14
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
• CodeMeter
• License Models
• CodeMeter Container Variants:
• CmActLicense (file based)
• CmDongle (secure hardware)
• CmCloud (storage and exec in the cloud)
• Software Integration
• Automatic Encryption
• API Calls
• Back Office Integration
• ERP / e-commerce / MES / CRM
• Software Activation
Software Integration
CodeMeter Protection Suite
Back-Office Integration
CodeMeter License Central
CodeMeter
Runtime
Embedded
µEmbedded
2024-03-13 15
The License needs a Secure Anchor
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CodeMeter Anchors
2024-03-13 16
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CodeMeter Universe
2024-03-13 17
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
• CodeMeter License Container
• Software Integration with Protection Suite
• Native Code, Managed Code, Script Languages, Compile Time Protection
• Back Office Integration with CodeMeter License Central
CodeMeter Solution – Interoperability
2024-03-13 18
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
• Operating Systems:
• Windows, Linux, macOS, RTOS, VxWorks, QNX
• Architectures:
• x86, x64, ARM, PPC, MIPS
• Environment support
• MicroEmbedded for micro controllers (C source)
• Embedded (C source and tested libraries)
• Standard (all features incl. license server)
• Certificate Vault (PKCS#11)
• Target groups
• ISVs – Independent Software Vendors
• IDMs – Intelligent Device Manufacturers
CmReady
Brief Introduction
2024-03-13 19
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CmReady Concept in a Nutshell
Industrial SD card
+
CmActLicense
=
CmReady License
Container
2024-03-13 20
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CmReady Technology in a Nutshell
• Looks like a new container type in addition to
• CmDongle
• CmActLicense
• CmCloudContainer
However,
• It is: a CmActLicense with a ready-to-use binding to CmReady-certified SD cards
• Works with: CmRuntime > v8.00 and CmEmbedded > v3.00
2024-03-13 21
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
Comparing CmReady with CmDongles and CmActLicenses
22
2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CmReady
Different Points of View
2024-03-13 23
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CmReady – The Software Vendor’s Perspective
• CmActLicense bound to individual
Swissbit Data Protection (DP) cards
• Ready-to-use plugin for binding
• Boot medium, data storage, and
licensing system on one card
• License programming independent of
the device
• Works with CodeMeter Runtime and
CodeMeter Embedded
2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security 24
CmReady – Your Customer’s Perspective
• The handling of a dongle with the
flexibility of different SD card
configurations
• Customers can use CmReady device
for their own licensing purposes
• License programming independent of
the device
• Works with CodeMeter Runtime and
CodeMeter Embedded
2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security 25
CmReady – The SD Card Manufacturer’s Perspective
• CmReady certification for industrial SD
cards
• Product portfolio extended
• The power of synergies
• Leveraging SD cards security features
to access CodeMeter‘s world
2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security 26
CmReady
All the technological aspects
2024-03-13 27
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CmReady Architecture
2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CmReady Swissbit DP card
CmReady Runtime Extension (cmready.so)
CodeMeter Embedded CodeMeter Runtime
Application
OS function
e.g. file system Abstracts WIBU API functions from Swissbit specific API functions
(Delivered and signed by Swissbit)
CmReady binding to CmActLicense
(Part of CmRuntime 8.0 & CmE 3.0)
Vendor-Plugin
(cmready-vendor-swissbit.so)
Swissbit Card Management Library
28
Security and Safety
• Binding
• The binding is anchored inside the CmReady card firmware
• Reliability
• The libraries are signed by Wibu-Systems and Swissbit
• Counters against replay of images
• Monotone counters inside the CmReady card firmware
• Operational Safety
• Automatic backup of the license container in the non-volatile RAM of the CmReady card
• Automatic backup restore when a CmReady card is detected and the license container file is
missing
2024-03-13 29
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
Technical Data and Prerequisites
• Operating Systems: Linux, Windows
• Processor platform: x86, x64, ARM 32, ARM 64
• At least, one read-write partition for CodeMeter process.
• Compatible with boot mediums or partition encryption.
• Can hold up to 4 license containers.
2024-03-13 30
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
CmReady
First Steps
2024-03-13 31
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
ISV’s First Steps with CmReady
• Preparation
• Obtain an FSB with your unique Firm Code
• Install CodeMeter SDK and Runtime (provided by Wibu-Systems)
• Install the vendor‘s specific library (provided by Swissbit)
• Use CmReady device plug&play just like you would with CmDongle or CmActLicense
• Usage and Delivery
• Protect your software with CodeMeter Protection Suite and the assigned Firm Code
• Distribute software, including the card vendor‘s specific library
2024-03-13 32
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
Customers’ First Steps with CmReady
• Preparation
• Install the protected software package
• Usually this comes with the CodeMeter installer or integrated CmEmbedded
• Get the license from the portal, if not already installed on the delivered CmReady card
• Usage
• Plug the CmReady SD card into device
• Run the software
2024-03-13 33
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
&
Type your questions in the chatbox
2024-03-13 34
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
Let’s meet at Embedded World
Wibu-Systems
Hall 4
Booth 168
2024-03-13 35
© WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
Swissbit
Hall 1
Booth 534
Europe: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
Japan: +81-45-5659710
https://www.wibu.com
info@wibu.com
Thank You!
Let’s keep in touch
2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security

More Related Content

Similar to Unlocking the Future: Empowering Industrial Security

Demystifying Industrial Security
Demystifying Industrial SecurityDemystifying Industrial Security
Demystifying Industrial Security
team-WIBU
 
Ww1.microchip.com downloads en_device_doc_39662b
Ww1.microchip.com downloads en_device_doc_39662bWw1.microchip.com downloads en_device_doc_39662b
Ww1.microchip.com downloads en_device_doc_39662b
Oai Vu Quoc
 
Smart Guard Systems Corporate
Smart Guard Systems CorporateSmart Guard Systems Corporate
Smart Guard Systems Corporate
GURUDAS
 
Presentation VigilSiteSafe_2015_Final_v1
Presentation VigilSiteSafe_2015_Final_v1Presentation VigilSiteSafe_2015_Final_v1
Presentation VigilSiteSafe_2015_Final_v1
Nabeel Khan
 

Similar to Unlocking the Future: Empowering Industrial Security (20)

Enterprise Grade Cloud Computing
Enterprise Grade Cloud ComputingEnterprise Grade Cloud Computing
Enterprise Grade Cloud Computing
 
Demystifying Industrial Security
Demystifying Industrial SecurityDemystifying Industrial Security
Demystifying Industrial Security
 
secure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdfsecure-manager-introduction-v1.pdf
secure-manager-introduction-v1.pdf
 
Confidential Computing overview
Confidential Computing overviewConfidential Computing overview
Confidential Computing overview
 
Ww1.microchip.com downloads en_device_doc_39662b
Ww1.microchip.com downloads en_device_doc_39662bWw1.microchip.com downloads en_device_doc_39662b
Ww1.microchip.com downloads en_device_doc_39662b
 
BASS Company profile
BASS Company profileBASS Company profile
BASS Company profile
 
Smart Guard Systems Corporate
Smart Guard Systems CorporateSmart Guard Systems Corporate
Smart Guard Systems Corporate
 
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIOHigh Performance Object Storage in 30 Minutes with Supermicro and MinIO
High Performance Object Storage in 30 Minutes with Supermicro and MinIO
 
Phytec_Intro_092018
Phytec_Intro_092018Phytec_Intro_092018
Phytec_Intro_092018
 
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
IBM Bluemix Paris Meetup #21-20170131 Meetup @Ingima - MangOH to AirVantage t...
 
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media GroupCASBs: 8 Critical Capabilities in partnership with ISMG Media Group
CASBs: 8 Critical Capabilities in partnership with ISMG Media Group
 
Marv Wexler - Transform Your with AI.pdf
Marv Wexler - Transform Your with AI.pdfMarv Wexler - Transform Your with AI.pdf
Marv Wexler - Transform Your with AI.pdf
 
Cisco connect montreal 2018 compute v final
Cisco connect montreal 2018   compute v finalCisco connect montreal 2018   compute v final
Cisco connect montreal 2018 compute v final
 
Creating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek LabsCreating a successful IoT product with MediaTek Labs
Creating a successful IoT product with MediaTek Labs
 
Modernizing the Manufacturing Industry with Kafka and MQTT
Modernizing the Manufacturing Industry with Kafka and MQTT Modernizing the Manufacturing Industry with Kafka and MQTT
Modernizing the Manufacturing Industry with Kafka and MQTT
 
Presentation VigilSiteSafe_2015_Final_v1
Presentation VigilSiteSafe_2015_Final_v1Presentation VigilSiteSafe_2015_Final_v1
Presentation VigilSiteSafe_2015_Final_v1
 
XMOS Company Overview
XMOS Company OverviewXMOS Company Overview
XMOS Company Overview
 
Surveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product IntroductionSurveon Enterprise SMR8300 Product Introduction
Surveon Enterprise SMR8300 Product Introduction
 
What's New in Security for IBM i?
What's New in Security for IBM i?What's New in Security for IBM i?
What's New in Security for IBM i?
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to Cloud
 

More from team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
team-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
team-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
team-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
team-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
team-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
team-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
team-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
team-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
team-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
team-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
team-WIBU
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
team-WIBU
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
team-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
team-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
team-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
team-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
team-WIBU
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
team-WIBU
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integrated
team-WIBU
 

More from team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integrated
 

Recently uploaded

JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)
Max Lee
 

Recently uploaded (20)

How to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabberHow to install and activate eGrabber JobGrabber
How to install and activate eGrabber JobGrabber
 
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdfMicrosoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
Microsoft 365 Copilot; An AI tool changing the world of work _PDF.pdf
 
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
COMPUTER AND ITS COMPONENTS PPT.by naitik sharma Class 9th A mittal internati...
 
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdfImplementing KPIs and Right Metrics for Agile Delivery Teams.pdf
Implementing KPIs and Right Metrics for Agile Delivery Teams.pdf
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Crafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM IntegrationCrafting the Perfect Measurement Sheet with PLM Integration
Crafting the Perfect Measurement Sheet with PLM Integration
 
JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)JustNaik Solution Deck (stage bus sector)
JustNaik Solution Deck (stage bus sector)
 
What need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java DevelopersWhat need to be mastered as AI-Powered Java Developers
What need to be mastered as AI-Powered Java Developers
 
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product UpdatesGraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
GraphSummit Stockholm - Neo4j - Knowledge Graphs and Product Updates
 
The Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test AutomationThe Strategic Impact of Buying vs Building in Test Automation
The Strategic Impact of Buying vs Building in Test Automation
 
A Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data MigrationA Guideline to Zendesk to Re:amaze Data Migration
A Guideline to Zendesk to Re:amaze Data Migration
 
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
Anypoint Code Builder - Munich MuleSoft Meetup - 16th May 2024
 
AI Hackathon.pptx
AI                        Hackathon.pptxAI                        Hackathon.pptx
AI Hackathon.pptx
 
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
KLARNA -  Language Models and Knowledge Graphs: A Systems ApproachKLARNA -  Language Models and Knowledge Graphs: A Systems Approach
KLARNA - Language Models and Knowledge Graphs: A Systems Approach
 
A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024OpenChain @ LF Japan Executive Briefing - May 2024
OpenChain @ LF Japan Executive Briefing - May 2024
 
Lessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdfLessons Learned from Building a Serverless Notifications System.pdf
Lessons Learned from Building a Serverless Notifications System.pdf
 
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdfStrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
StrimziCon 2024 - Transition to Apache Kafka on Kubernetes with Strimzi.pdf
 
SQL Injection Introduction and Prevention
SQL Injection Introduction and PreventionSQL Injection Introduction and Prevention
SQL Injection Introduction and Prevention
 
The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 

Unlocking the Future: Empowering Industrial Security

  • 1. CmReady Facts and Use Cases Marco Blume Product Manager marco.blume@wibu.com Christian Ullrich Head of Product Management Security christian.ullrich@swissbit.com 2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 2. To access the on-demand replay of this masterclass, please visit https://www.wibu.com/wibu-systems- webinars/unlocking-the-future-empowering-industrial- security/access.html 2024-03-13 2 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 3. www.swissbit.com About Swissbit 3 Swissbit NA Silicon Valley, CA Sales Swissbit Germany Berlin R&D + Production Swissbit Japan Tokyo FAE support + Sales Swissbit NA Central Region, IL Sales Swissbit Taiwan Taipei City FAE support, Sales Swissbit NA Westford, MA R&D + FAE support Swissbit Embedded IoT Solutions Munich R&D, FAE support, Sales & Marketing Swissbit AG Bronschhofen Switzerland Headquarters, R&D, FAE support, Sales & Marketing Swissbit China Dongguan City FAE support HEADQUARTER Switzerland, Bronschhofen EMPLOYEES > 450 worldwide SWISSBIT AG Hyperstone GmbH Konstanz, Germany Headquarters, R&D Hyperstone Inc Mission Viejo, CA Sales & Support Hyperstone Taiwan Taipei City Sales & Support Swissbit – Company Overview
  • 4. www.swissbit.com Products and Solutions for securing a digitally connected world 4 Swissbit – Company Overview Reliably Storing Data NAND Flash Memory Module & Components Protecting Data & Devices Hardware & Software-based security solutions Storing & Protecting Data NAND Controller for Industrial & Security applications Services Memory Embedded IoT Hyperstone
  • 5. www.swissbit.com Production “Made in Germany” Production Site Berlin Production and office area: 10,000m² Production capacity: 2-3 Mio units / month IATF 16949 – ISO 9001 - ISO 14001 – ISO 27001 – ISO 50001 5 Swissbit – Company Overview
  • 6. www.swissbit.com DP Product Features - Overview 6 • Hardware & Security features - Industrial grade robust memory, longevity, fixed BOM - AES 256-bit encryption, fast crypto-wipe option - Implicit and replay-safe secure authentication - Authenticity and integrity check - User PIN and administrator login - Hidden Storage / OTP (One Time Programmable) memory • Secure Memory - CD-ROM function protects read-only data such as boot media, software installers, or any data that must not be overwritten. - Private partitions encrypt and protect any type of data. After secure PIN login, this type of partition is unlocked and available for unrestricted read-write access. - Hidden storage serves to store WORM data (Write Once, Read Multiple) or random accessible special data that can be controlled in every detail. • Supported operating systems: Linux, Windows • Supported platforms: X86/X64 and ARM Swissbit – Features of Swissbit Data Protection SD and microSD cards
  • 7. www.swissbit.com CARD MEMORY Data Protection features – How can they be used? Exemplary Use Case: Manufacturing Physical storage Visible storage Boot partition Read only Boot partition is write protected. • content fully controlled by card issuer OS partition Read only Pin protected OS partition • cannot be modified • only visible after authentication of system • content controlled by card issuer Private Data read/write Pin protected User data or dynamic part of OS • only accessible after authentication by system or user • content controlled by the system NVRAM configurable access Hidden memory NVRAM partition • hidden, cannot be formatted • Audit trails, “flight data recorder” 7 Swissbit – Features of Swissbit Data Protection SD and microSD cards
  • 8. www.swissbit.com Swissbit (micro)SD Memory Cards What makes them different 8 Swissbit – Difference between commercial and industrial SD cards Support for Life Time Monitoring Dedicated industrial grade controller Longevity components and locked BOM Manufactured in IATF 16949 certified Swissbit fab NAND flash pretested for industrial temperature Top grade NAND quality Firmware optimized for industrial requirements Best-in class power interrupt stability (verified >10’000 cycles)
  • 9. www.swissbit.com Swissbit (micro)SD Memory Cards What makes them different than commercial cards – exemplary snippets 9 Swissbit – Difference between commercial and industrial SD cards Stress test PASS – 11‘400 power interrupts Although tested temperature range 165°C was well outside of the card’s specification (-40°C to 85°C), all of the original data remained fully intact.
  • 10. www.swissbit.com Swissbit CmReady Product portfolio 10 Available form factors SD Memory card (PS-66 DP) microSD Memory card (PS-66u DP) Data transfer Speed class 10, UHS-I Class 3, A1, V30 Temperature range -40°C to 85°C FLASH technology pSLC Density 16 - 64 GB (& 4-8 GB ext. OP variants) Swissbit – Product portfolio of CmReady SD and microSD cards
  • 11. www.swissbit.com Customer & Distribution Network Over 25 Blue-Chip rated customers world wide More than 4000 customers worldwide, covering wide range of embedded applications Global Distribution Network Webshop Partners 11 Swissbit – Product portfolio of CmReady SD and microSD cards
  • 12. WIBU-SYSTEMS AG in Short 2024-03-13 12 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security • Founded in 1989, staff >150 people • Headquarter Karlsruhe, Germany • Global subsidiaries: • USA, China, Japan & Europa • Financially Independent • Global market leader • Comprehensive Solution • Technology Leadership • Our Vision: Digital Sovereignty via security and strong collaboration
  • 13. Customers and Partners 2024-03-13 13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 14. The Overall Picture of Protection and Licensing 2024-03-13 14 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security • CodeMeter • License Models • CodeMeter Container Variants: • CmActLicense (file based) • CmDongle (secure hardware) • CmCloud (storage and exec in the cloud) • Software Integration • Automatic Encryption • API Calls • Back Office Integration • ERP / e-commerce / MES / CRM • Software Activation Software Integration CodeMeter Protection Suite Back-Office Integration CodeMeter License Central CodeMeter Runtime Embedded µEmbedded
  • 15. 2024-03-13 15 The License needs a Secure Anchor © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 16. CodeMeter Anchors 2024-03-13 16 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 17. CodeMeter Universe 2024-03-13 17 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security • CodeMeter License Container • Software Integration with Protection Suite • Native Code, Managed Code, Script Languages, Compile Time Protection • Back Office Integration with CodeMeter License Central
  • 18. CodeMeter Solution – Interoperability 2024-03-13 18 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security • Operating Systems: • Windows, Linux, macOS, RTOS, VxWorks, QNX • Architectures: • x86, x64, ARM, PPC, MIPS • Environment support • MicroEmbedded for micro controllers (C source) • Embedded (C source and tested libraries) • Standard (all features incl. license server) • Certificate Vault (PKCS#11) • Target groups • ISVs – Independent Software Vendors • IDMs – Intelligent Device Manufacturers
  • 19. CmReady Brief Introduction 2024-03-13 19 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 20. CmReady Concept in a Nutshell Industrial SD card + CmActLicense = CmReady License Container 2024-03-13 20 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 21. CmReady Technology in a Nutshell • Looks like a new container type in addition to • CmDongle • CmActLicense • CmCloudContainer However, • It is: a CmActLicense with a ready-to-use binding to CmReady-certified SD cards • Works with: CmRuntime > v8.00 and CmEmbedded > v3.00 2024-03-13 21 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 22. Comparing CmReady with CmDongles and CmActLicenses 22 2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 23. CmReady Different Points of View 2024-03-13 23 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 24. CmReady – The Software Vendor’s Perspective • CmActLicense bound to individual Swissbit Data Protection (DP) cards • Ready-to-use plugin for binding • Boot medium, data storage, and licensing system on one card • License programming independent of the device • Works with CodeMeter Runtime and CodeMeter Embedded 2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security 24
  • 25. CmReady – Your Customer’s Perspective • The handling of a dongle with the flexibility of different SD card configurations • Customers can use CmReady device for their own licensing purposes • License programming independent of the device • Works with CodeMeter Runtime and CodeMeter Embedded 2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security 25
  • 26. CmReady – The SD Card Manufacturer’s Perspective • CmReady certification for industrial SD cards • Product portfolio extended • The power of synergies • Leveraging SD cards security features to access CodeMeter‘s world 2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security 26
  • 27. CmReady All the technological aspects 2024-03-13 27 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 28. CmReady Architecture 2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security CmReady Swissbit DP card CmReady Runtime Extension (cmready.so) CodeMeter Embedded CodeMeter Runtime Application OS function e.g. file system Abstracts WIBU API functions from Swissbit specific API functions (Delivered and signed by Swissbit) CmReady binding to CmActLicense (Part of CmRuntime 8.0 & CmE 3.0) Vendor-Plugin (cmready-vendor-swissbit.so) Swissbit Card Management Library 28
  • 29. Security and Safety • Binding • The binding is anchored inside the CmReady card firmware • Reliability • The libraries are signed by Wibu-Systems and Swissbit • Counters against replay of images • Monotone counters inside the CmReady card firmware • Operational Safety • Automatic backup of the license container in the non-volatile RAM of the CmReady card • Automatic backup restore when a CmReady card is detected and the license container file is missing 2024-03-13 29 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 30. Technical Data and Prerequisites • Operating Systems: Linux, Windows • Processor platform: x86, x64, ARM 32, ARM 64 • At least, one read-write partition for CodeMeter process. • Compatible with boot mediums or partition encryption. • Can hold up to 4 license containers. 2024-03-13 30 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 31. CmReady First Steps 2024-03-13 31 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 32. ISV’s First Steps with CmReady • Preparation • Obtain an FSB with your unique Firm Code • Install CodeMeter SDK and Runtime (provided by Wibu-Systems) • Install the vendor‘s specific library (provided by Swissbit) • Use CmReady device plug&play just like you would with CmDongle or CmActLicense • Usage and Delivery • Protect your software with CodeMeter Protection Suite and the assigned Firm Code • Distribute software, including the card vendor‘s specific library 2024-03-13 32 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 33. Customers’ First Steps with CmReady • Preparation • Install the protected software package • Usually this comes with the CodeMeter installer or integrated CmEmbedded • Get the license from the portal, if not already installed on the delivered CmReady card • Usage • Plug the CmReady SD card into device • Run the software 2024-03-13 33 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 34. & Type your questions in the chatbox 2024-03-13 34 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security
  • 35. Let’s meet at Embedded World Wibu-Systems Hall 4 Booth 168 2024-03-13 35 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security Swissbit Hall 1 Booth 534
  • 36. Europe: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 Japan: +81-45-5659710 https://www.wibu.com info@wibu.com Thank You! Let’s keep in touch 2024-03-13 © WIBU-SYSTEMS AG 2024 | Unlocking the Future: Empowering Industrial Security