SlideShare une entreprise Scribd logo
1  sur  36
Télécharger pour lire hors ligne
How to protect and license
your CODESYS applications
Stefan Bamberg
Senior Key Account & Partner Manager, Wibu-Systems
Roland Wagner
Head of Product Marketing, CODESYS
CODESYS applications
protected and licensed
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 1
Where to find the accompanying audio
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 2
To access the on-demand replay of this masterclass, please visit
www.wibu.com/resources/webinars/2021/your-codesys-applications-
protected-and-licensed/access
Challenges and Opportunities in the IoT
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 3
Security
Monetization
Industrial Security - Threats (Source VDMA, 2019)
 Human misconduct and sabotage
 Introducing malware
 Social engineering and phishing
 Infection with malware via the Internet/Intranet
 Technical mishaps and force majeure
 (D)DoS attacks
 Compromising extranet and cloud components
 Break-ins via remote maintenance accesses
 Internet-connected control components
 Compromised smartphones in the production environment …
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 4
Guidelines for security assistance
 IEC 62443 standard (International Electrotechnical Commission, Geneva)
 A family of standards focused on the security of “Industrial Automation and Control
Systems” (IACS) that covers all the necessary topics, from protection to technical
configurations and compliance
 Structured in four levels:
 General principles
 Security requirements for operators and service providers (also connected to ISO 27000)
 Security requirements for automated systems (production and process automation)
 Security requirements for automated components (product development processes)
 Guidelines published by VDMA: Guide IEC 62443 for mechanical and plant engineering [Link]
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 5
Monetization Opportunities
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 6
 Software-based features of devices
 Features-on-demand
 Pay-per-Use
 Subscription plans
 Services and (predictive) maintenance
 Monetization of device or customer
specific control parameters / output
values
 Cloud connected functionalities
Solution
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 7
Long-lasting partnership
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 8
 CodeMeter technology
integrated with CODESYS
V3.51 and higher
 Project protection
 Application protection
 CodeMeter library
included for customer
specific implementations
 Access authentication and
monetization available
Security Monetization
IEC 61131-3 automation software
CodeMeter®
Protection & Licensing
Technical Background
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 9
Delivery to the endpoints
The Embedded World: Integrate Once – Deliver Many
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed
Integrate Once Deliver Many
Entitlement
Server
L
L L L
10
Online Offline
Integration into software
Software Software
CodeMeter
Protection Suite
Integration into processes
ERP / CRM
E-commerce
CodeMeter
License
Central
Software
License Portal
…Integrate Once – Deliver Many (Examples)
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 11
License
• Feature-on-Demand
License
• Subscription plan
License
• Network licenses
License
• Pay-per-Use
Software Software Software Software
Security with CodeMeter Protection Suite
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 12
CodeMeter: One Technology Fits All
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 13
Supported Platforms
License Containers
Form Factors
Entitlement Management
Integration in backoffice systems
End User
Vendor
CodeMeter License Central – Licenses across the Product Lifecycle
25.08.2021 14
Ticket + Fingerprint
4
License
5
Ticket
2
Purchase Order
1
E-Commerce
ERP/CRM Software
License Portal
Ticket:
ABCDE-FGHIJ-KLMNO-PQRST-UVWXY
3
© WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed
https://www.wibu.com
info@wibu.com
Europe: +49-721-931720
USA: +1-425-7756900
China: +86-21-55661790
Japan: +81-45-5659710
Thank you very much!
25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 15
SECURITY and MONETIZATION
How to benefit from CodeMeter® Technology
in CODESYS
Wibu Webinars 25/08/2021
Roland Wagner, Head of Product Marketing CODESYS Group
1
•Security and monetization in automation
2
3
•CodeMeter® technology in CODESYS
•How to benefit
4
•Outlook and conclusion
AGENDA
1
From control cabinets to Industry 4.0
Security and monetization in automation
Security: Assets / protection targets
Security and monetization in automation
Engineering
Runtime
Application
(binary
code)
Availability
Confidentiality Integrity
Legal usage
Application
(source
code)
Availability
Confidentiality Integrity
Legal usage
Security: Responsibilities
Security and monetization in automation
 Native possibilities
Whitepaper “Security” at
https://www.codesys.com/fileadmin/data/custom ers/security/CODESYS-Security-Whitepaper.pdf
 Use CodeMeter® technology – seamlessly integrated
Security: Measures in CODESYS
Security and monetization in automation
 Independent from open source activities
 Possible assets:
 Generic software algorithms available as libraries
 Special software services / functions only necessary in special use cases
 Special corporate competence / know-how (Intellectual Property)
 Realization of Pay-per-use models
 Realization of Software-as-a-Service (SaaS) products directly within the PLC application
Monetization: Your know-how / intellectual property is worth it
Security and monetization in automation
1
•Security and monetization in automation
2
3
•CodeMeter® technology in CODESYS
•How to benefit
4
•Outlook and conclusion
AGENDA
2
 In the IDE (CODESYS Development System)
Protection of source code
License management
 In the runtime system (CODESYS Control) of
 devices from CODESYS customers
 native SoftPLCs
Protection of application code
License management
Integration
CodeMeter® Technology in CODESYS
 Container used for storing unique access code
 CODESYS Key ( USB dongle)
 CmActContainer ( Software container)
firmly connected to the specific device
 Universal Firm Code (UFC) container
(so far for latest SoftPLC CODESYS Control for ARM Linux SL only)
 Comparison of software and hardware container
https://www.codesys.com/the-system/licensing.html
Integration
CodeMeter ® Technology in CODESYS
1
•Security and monetization in automation
2
3
•CodeMeter® technology in CODESYS
•How to benefit
4
•Outlook and conclusion
AGENDA
3
 Encryption of source code
 Open CODESYS project file
only with previously registered dongle
plugged into the workstation PC
Recommendation:
Use more than 1 dongle!
 Backup in case of damage/loss
Use case: Protection of source code know-how
How to benefit
 Binding of a discrete application to authorized dongle(s)
 Application download and execution: only possible with authorized dongle plugged in
 No unauthorized copies of applications possible
 Additionally: Signing of applications
 Protection of application integrity
Use case: Protection against unauthorized application usage
How to benefit
+
+ +
 Licensing option for CODESYS libraries
 Sale of licenses via the CODESYS Store (via CODESYS Firm code)
with CODESYS Activation URL / mail
 Purchase of licenses via own Firm code
requires CodeMeter® Toolkit
and self-provided Activation URL / mail
Use case: Authorization / monetization of libraries
How to benefit
 Library for accessing license information
 Dongle with additional functionality, e. g. to calibrate a machine
 Resell library functions to 3rd parties, e.g. via the CODESYS Store
Use case: Authorization / monetization of functions / services
How to benefit
+ =
+ =
+ =
 Interface for encryption/decryption of concrete source code in a project
 Source data protected against unauthorized access
 Decryption by means of license / product code
Use case: Protect concrete parameters/data in the source code
How to benefit
 Licensing directly in the IDE
See https://youtu.be/-5t4kN1Gn9Y
 Licensing via special website
http://license.codesys.com
 Cloud-based licensing for bulk operation
within the CODESYS Automation Server
Use case: Easy licensing of product options from software vendor
How to benefit
1
•Security and monetization in automation
2
3
•CodeMeter® technology in CODESYS
•How to benefit
4
•Outlook and conclusion
AGENDA
4
 Pay-per-use monetization with license counter
 Extension of the library possibilities (SP18)
 Network licenses for SoftPLCs add-ons (e.g. for fieldbus, visualization, OPC UA)
 Network licenses for workstation add-ons (e.g. Static Analysis, Profiler, UML, Git)
 Cloud licenses
 SoftContainer on virtual machines respectively Server with dongles
 Network licenses
 Scalable licenses (e.g. depending on IEC 61131-3 code size, number of tasks)
 Encryption of SoftPLCs via AxProtector
 Execution depending CodeMeter® runtime
 Guaranteed integrity of SoftPLCs
Future use cases (Roadmap)
Outlook and Conclusion
 Proven technology at your fingertips
 Flexible application in different common use cases
 Easy handling due to
 seamless integration
 pre-programmed licenses
 One platform for different targets and functions
 Added value for the security and monetization of your know-how
CodeMeter® in CODESYS
Outlook and Conclusion
Thank you for your attention!
CODESYS® is a registered trademark. Technical specifications are subject to change.
Errors and omissions excepted. No reproduction or distribution, in whole or in part, without prior permission.
Note: Not all CODESYS features are available in all territories. For more information on geographic restrictions, please contact sales@codesys.com.

Contenu connexe

Tendances

Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
Himanshu Arora
 
Digital Transformation with FDT 3.0 Webinar
Digital Transformation with FDT 3.0 WebinarDigital Transformation with FDT 3.0 Webinar
Digital Transformation with FDT 3.0 Webinar
Sadatulla Zishan
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
sflynn073
 

Tendances (18)

Privileged Access Manager Product Q&A
Privileged Access Manager Product Q&APrivileged Access Manager Product Q&A
Privileged Access Manager Product Q&A
 
IBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - PortfolioIBM Security Identity and Access Management - Portfolio
IBM Security Identity and Access Management - Portfolio
 
Wibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotectionWibu systems-code metersoftwareprotection
Wibu systems-code metersoftwareprotection
 
Forceis-profile_Updated (1)
Forceis-profile_Updated (1)Forceis-profile_Updated (1)
Forceis-profile_Updated (1)
 
FDT/DTM Introduction Webinar
FDT/DTM Introduction WebinarFDT/DTM Introduction Webinar
FDT/DTM Introduction Webinar
 
Microsoft Volume Licensing Basics
Microsoft Volume Licensing BasicsMicrosoft Volume Licensing Basics
Microsoft Volume Licensing Basics
 
Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...Using IBM DataPower for rapid security and application integration with an op...
Using IBM DataPower for rapid security and application integration with an op...
 
Gateway deepdive
Gateway deepdiveGateway deepdive
Gateway deepdive
 
Open Banking via APIc 2018
Open Banking via APIc 2018Open Banking via APIc 2018
Open Banking via APIc 2018
 
FIDO in Action: Real World Development Case Studies
FIDO in Action: Real World Development Case StudiesFIDO in Action: Real World Development Case Studies
FIDO in Action: Real World Development Case Studies
 
What's new in IBM MQ
What's new in IBM MQWhat's new in IBM MQ
What's new in IBM MQ
 
Digital Transformation with FDT 3.0 Webinar
Digital Transformation with FDT 3.0 WebinarDigital Transformation with FDT 3.0 Webinar
Digital Transformation with FDT 3.0 Webinar
 
IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2IBM DataPower Gateways - What's new in 2016 v7.5.2
IBM DataPower Gateways - What's new in 2016 v7.5.2
 
Microsoft Product Licensing Basics
Microsoft Product Licensing BasicsMicrosoft Product Licensing Basics
Microsoft Product Licensing Basics
 
Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing Microsoft Cloud Services Licensing
Microsoft Cloud Services Licensing
 
The Impact of M2M. Use Case Example High-Impact Sports
The Impact of M2M. Use Case Example High-Impact SportsThe Impact of M2M. Use Case Example High-Impact Sports
The Impact of M2M. Use Case Example High-Impact Sports
 
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco VenutiCrossIdeas Roadshow IAM Governance IBM Marco Venuti
CrossIdeas Roadshow IAM Governance IBM Marco Venuti
 
Enterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtualEnterprise grade cloud services with data power virtual
Enterprise grade cloud services with data power virtual
 

Similaire à Your CODESYS Applications, Protected and Licensed

Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
team-WIBU
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
team-WIBU
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
team-WIBU
 
Your Migration Map to a Comprehensive Protection and Licensing System
Your Migration Map to a Comprehensive Protection and Licensing SystemYour Migration Map to a Comprehensive Protection and Licensing System
Your Migration Map to a Comprehensive Protection and Licensing System
team-WIBU
 
Software License Models - Spicing up the Mix
Software License Models - Spicing up the MixSoftware License Models - Spicing up the Mix
Software License Models - Spicing up the Mix
team-WIBU
 
Dominating Industrie 4.0 with Secure Software Licensing
Dominating Industrie 4.0 with Secure Software LicensingDominating Industrie 4.0 with Secure Software Licensing
Dominating Industrie 4.0 with Secure Software Licensing
team-WIBU
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
team-WIBU
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
team-WIBU
 
Datasheet_Embedded_Security_Shield
Datasheet_Embedded_Security_ShieldDatasheet_Embedded_Security_Shield
Datasheet_Embedded_Security_Shield
David Cozens
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
team-WIBU
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5
digiflak
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
team-WIBU
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
team-WIBU
 

Similaire à Your CODESYS Applications, Protected and Licensed (20)

Embedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packagesEmbedded devices - Big opportunities in tiny packages
Embedded devices - Big opportunities in tiny packages
 
Running code in secure hardware or cloud environments
Running code in secure hardware or cloud environmentsRunning code in secure hardware or cloud environments
Running code in secure hardware or cloud environments
 
Workshop 16 october 2015 paris
Workshop 16 october 2015 parisWorkshop 16 october 2015 paris
Workshop 16 october 2015 paris
 
Unleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter BasicsUnleash the Power of CodeMeter - CodeMeter Basics
Unleash the Power of CodeMeter - CodeMeter Basics
 
Your Migration Map to a Comprehensive Protection and Licensing System
Your Migration Map to a Comprehensive Protection and Licensing SystemYour Migration Map to a Comprehensive Protection and Licensing System
Your Migration Map to a Comprehensive Protection and Licensing System
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Software License Models - Spicing up the Mix
Software License Models - Spicing up the MixSoftware License Models - Spicing up the Mix
Software License Models - Spicing up the Mix
 
Dominating Industrie 4.0 with Secure Software Licensing
Dominating Industrie 4.0 with Secure Software LicensingDominating Industrie 4.0 with Secure Software Licensing
Dominating Industrie 4.0 with Secure Software Licensing
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 
Unlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial SecurityUnlocking the Future: Empowering Industrial Security
Unlocking the Future: Empowering Industrial Security
 
Volkswagen | ECU Software Development with codeBeamer ALM: IT Aspects
Volkswagen | ECU Software Development with codeBeamer ALM: IT AspectsVolkswagen | ECU Software Development with codeBeamer ALM: IT Aspects
Volkswagen | ECU Software Development with codeBeamer ALM: IT Aspects
 
How Endpoint Security works ?
How Endpoint Security works ?How Endpoint Security works ?
How Endpoint Security works ?
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
 
Datasheet_Embedded_Security_Shield
Datasheet_Embedded_Security_ShieldDatasheet_Embedded_Security_Shield
Datasheet_Embedded_Security_Shield
 
How and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based LicensesHow and Why to Create and Sell Consumption-Based Licenses
How and Why to Create and Sell Consumption-Based Licenses
 
Flak general v2 5
Flak general v2 5Flak general v2 5
Flak general v2 5
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Authenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevicesAuthenticate and authorize your IIoTdevices
Authenticate and authorize your IIoTdevices
 
Protecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript ApplicationsProtecting Node.js-based JavaScript Applications
Protecting Node.js-based JavaScript Applications
 
In-Vehicle Infotainment and Driver Information Systems: Security and Safety I...
In-Vehicle Infotainment and Driver Information Systems: Security and Safety I...In-Vehicle Infotainment and Driver Information Systems: Security and Safety I...
In-Vehicle Infotainment and Driver Information Systems: Security and Safety I...
 

Plus de team-WIBU

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
team-WIBU
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
team-WIBU
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
team-WIBU
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
team-WIBU
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
team-WIBU
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
team-WIBU
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
team-WIBU
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
team-WIBU
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
team-WIBU
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
team-WIBU
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
team-WIBU
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
team-WIBU
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
team-WIBU
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
team-WIBU
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
team-WIBU
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integrated
team-WIBU
 
Everything You Always Wanted to Know About CodeMeter FSBs
Everything You Always Wanted to Know About CodeMeter FSBsEverything You Always Wanted to Know About CodeMeter FSBs
Everything You Always Wanted to Know About CodeMeter FSBs
team-WIBU
 
Protecting Python applications the simpler way
Protecting Python applications the simpler wayProtecting Python applications the simpler way
Protecting Python applications the simpler way
team-WIBU
 
Licensing in virtual environments
Licensing in virtual environmentsLicensing in virtual environments
Licensing in virtual environments
team-WIBU
 

Plus de team-WIBU (20)

Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
The Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success TogetherThe Power of Partnership: Enabling Success Together
The Power of Partnership: Enabling Success Together
 
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für GeschäftskontinuitätKeine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
Keine Zeit für Leerlauf – Lizenzverfügbarkeit für Geschäftskontinuität
 
No Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuityNo Time to Idle – License availability for business continuity
No Time to Idle – License availability for business continuity
 
Cloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline ScenariosCloud-Based Licensing in Offline Scenarios
Cloud-Based Licensing in Offline Scenarios
 
Optimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best PracticesOptimizing Cloud Licensing: Strategies and Best Practices
Optimizing Cloud Licensing: Strategies and Best Practices
 
For a Few Licenses More
For a Few Licenses MoreFor a Few Licenses More
For a Few Licenses More
 
App Management on the Edge
App Management on the EdgeApp Management on the Edge
App Management on the Edge
 
Protecting and Licensing .NET Applications
Protecting and Licensing .NET ApplicationsProtecting and Licensing .NET Applications
Protecting and Licensing .NET Applications
 
A Bit of License Management Magic
A Bit of License Management MagicA Bit of License Management Magic
A Bit of License Management Magic
 
The first step is always the most decisive
The first step is always the most decisiveThe first step is always the most decisive
The first step is always the most decisive
 
Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...Protection and monetization of 3D printed objects in the spare parts business...
Protection and monetization of 3D printed objects in the spare parts business...
 
Serving Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every AppetiteServing Up Features-on-Demand for Every Appetite
Serving Up Features-on-Demand for Every Appetite
 
Security and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptxSecurity and Protection for Machine Learning.pptx
Security and Protection for Machine Learning.pptx
 
License Portal - The DIY Solution
License Portal - The DIY SolutionLicense Portal - The DIY Solution
License Portal - The DIY Solution
 
Subscriptions - Relationships built to last
Subscriptions - Relationships built to lastSubscriptions - Relationships built to last
Subscriptions - Relationships built to last
 
Safer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integratedSafer to market: Licensing and e-commerce integrated
Safer to market: Licensing and e-commerce integrated
 
Everything You Always Wanted to Know About CodeMeter FSBs
Everything You Always Wanted to Know About CodeMeter FSBsEverything You Always Wanted to Know About CodeMeter FSBs
Everything You Always Wanted to Know About CodeMeter FSBs
 
Protecting Python applications the simpler way
Protecting Python applications the simpler wayProtecting Python applications the simpler way
Protecting Python applications the simpler way
 
Licensing in virtual environments
Licensing in virtual environmentsLicensing in virtual environments
Licensing in virtual environments
 

Dernier

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Dernier (20)

Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Ramesh Nagar Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
(INDIRA) Call Girl Meerut Call Now 8617697112 Meerut Escorts 24x7
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects2016EF22_0 solar project report rooftop projects
2016EF22_0 solar project report rooftop projects
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Hostel management system project report..pdf
Hostel management system project report..pdfHostel management system project report..pdf
Hostel management system project report..pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Palanpur 7001035870 Whatsapp Number, 24/07 Booking
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Netaji Nagar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 

Your CODESYS Applications, Protected and Licensed

  • 1. How to protect and license your CODESYS applications Stefan Bamberg Senior Key Account & Partner Manager, Wibu-Systems Roland Wagner Head of Product Marketing, CODESYS CODESYS applications protected and licensed 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 1
  • 2. Where to find the accompanying audio 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 2 To access the on-demand replay of this masterclass, please visit www.wibu.com/resources/webinars/2021/your-codesys-applications- protected-and-licensed/access
  • 3. Challenges and Opportunities in the IoT 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 3 Security Monetization
  • 4. Industrial Security - Threats (Source VDMA, 2019)  Human misconduct and sabotage  Introducing malware  Social engineering and phishing  Infection with malware via the Internet/Intranet  Technical mishaps and force majeure  (D)DoS attacks  Compromising extranet and cloud components  Break-ins via remote maintenance accesses  Internet-connected control components  Compromised smartphones in the production environment … 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 4
  • 5. Guidelines for security assistance  IEC 62443 standard (International Electrotechnical Commission, Geneva)  A family of standards focused on the security of “Industrial Automation and Control Systems” (IACS) that covers all the necessary topics, from protection to technical configurations and compliance  Structured in four levels:  General principles  Security requirements for operators and service providers (also connected to ISO 27000)  Security requirements for automated systems (production and process automation)  Security requirements for automated components (product development processes)  Guidelines published by VDMA: Guide IEC 62443 for mechanical and plant engineering [Link] 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 5
  • 6. Monetization Opportunities 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 6  Software-based features of devices  Features-on-demand  Pay-per-Use  Subscription plans  Services and (predictive) maintenance  Monetization of device or customer specific control parameters / output values  Cloud connected functionalities
  • 7. Solution 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 7
  • 8. Long-lasting partnership 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 8  CodeMeter technology integrated with CODESYS V3.51 and higher  Project protection  Application protection  CodeMeter library included for customer specific implementations  Access authentication and monetization available Security Monetization IEC 61131-3 automation software
  • 9. CodeMeter® Protection & Licensing Technical Background 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 9
  • 10. Delivery to the endpoints The Embedded World: Integrate Once – Deliver Many 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed Integrate Once Deliver Many Entitlement Server L L L L 10 Online Offline Integration into software Software Software CodeMeter Protection Suite Integration into processes ERP / CRM E-commerce CodeMeter License Central Software License Portal
  • 11. …Integrate Once – Deliver Many (Examples) 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 11 License • Feature-on-Demand License • Subscription plan License • Network licenses License • Pay-per-Use Software Software Software Software
  • 12. Security with CodeMeter Protection Suite 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 12
  • 13. CodeMeter: One Technology Fits All 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 13 Supported Platforms License Containers Form Factors Entitlement Management Integration in backoffice systems
  • 14. End User Vendor CodeMeter License Central – Licenses across the Product Lifecycle 25.08.2021 14 Ticket + Fingerprint 4 License 5 Ticket 2 Purchase Order 1 E-Commerce ERP/CRM Software License Portal Ticket: ABCDE-FGHIJ-KLMNO-PQRST-UVWXY 3 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed
  • 15. https://www.wibu.com info@wibu.com Europe: +49-721-931720 USA: +1-425-7756900 China: +86-21-55661790 Japan: +81-45-5659710 Thank you very much! 25.08.2021 © WIBU-SYSTEMS AG 2021 - CODESYS applications protected and licensed 15
  • 16. SECURITY and MONETIZATION How to benefit from CodeMeter® Technology in CODESYS Wibu Webinars 25/08/2021 Roland Wagner, Head of Product Marketing CODESYS Group
  • 17. 1 •Security and monetization in automation 2 3 •CodeMeter® technology in CODESYS •How to benefit 4 •Outlook and conclusion AGENDA 1
  • 18. From control cabinets to Industry 4.0 Security and monetization in automation
  • 19. Security: Assets / protection targets Security and monetization in automation Engineering Runtime Application (binary code) Availability Confidentiality Integrity Legal usage Application (source code) Availability Confidentiality Integrity Legal usage
  • 20. Security: Responsibilities Security and monetization in automation
  • 21.  Native possibilities Whitepaper “Security” at https://www.codesys.com/fileadmin/data/custom ers/security/CODESYS-Security-Whitepaper.pdf  Use CodeMeter® technology – seamlessly integrated Security: Measures in CODESYS Security and monetization in automation
  • 22.  Independent from open source activities  Possible assets:  Generic software algorithms available as libraries  Special software services / functions only necessary in special use cases  Special corporate competence / know-how (Intellectual Property)  Realization of Pay-per-use models  Realization of Software-as-a-Service (SaaS) products directly within the PLC application Monetization: Your know-how / intellectual property is worth it Security and monetization in automation
  • 23. 1 •Security and monetization in automation 2 3 •CodeMeter® technology in CODESYS •How to benefit 4 •Outlook and conclusion AGENDA 2
  • 24.  In the IDE (CODESYS Development System) Protection of source code License management  In the runtime system (CODESYS Control) of  devices from CODESYS customers  native SoftPLCs Protection of application code License management Integration CodeMeter® Technology in CODESYS
  • 25.  Container used for storing unique access code  CODESYS Key ( USB dongle)  CmActContainer ( Software container) firmly connected to the specific device  Universal Firm Code (UFC) container (so far for latest SoftPLC CODESYS Control for ARM Linux SL only)  Comparison of software and hardware container https://www.codesys.com/the-system/licensing.html Integration CodeMeter ® Technology in CODESYS
  • 26. 1 •Security and monetization in automation 2 3 •CodeMeter® technology in CODESYS •How to benefit 4 •Outlook and conclusion AGENDA 3
  • 27.  Encryption of source code  Open CODESYS project file only with previously registered dongle plugged into the workstation PC Recommendation: Use more than 1 dongle!  Backup in case of damage/loss Use case: Protection of source code know-how How to benefit
  • 28.  Binding of a discrete application to authorized dongle(s)  Application download and execution: only possible with authorized dongle plugged in  No unauthorized copies of applications possible  Additionally: Signing of applications  Protection of application integrity Use case: Protection against unauthorized application usage How to benefit + + +
  • 29.  Licensing option for CODESYS libraries  Sale of licenses via the CODESYS Store (via CODESYS Firm code) with CODESYS Activation URL / mail  Purchase of licenses via own Firm code requires CodeMeter® Toolkit and self-provided Activation URL / mail Use case: Authorization / monetization of libraries How to benefit
  • 30.  Library for accessing license information  Dongle with additional functionality, e. g. to calibrate a machine  Resell library functions to 3rd parties, e.g. via the CODESYS Store Use case: Authorization / monetization of functions / services How to benefit + = + = + =
  • 31.  Interface for encryption/decryption of concrete source code in a project  Source data protected against unauthorized access  Decryption by means of license / product code Use case: Protect concrete parameters/data in the source code How to benefit
  • 32.  Licensing directly in the IDE See https://youtu.be/-5t4kN1Gn9Y  Licensing via special website http://license.codesys.com  Cloud-based licensing for bulk operation within the CODESYS Automation Server Use case: Easy licensing of product options from software vendor How to benefit
  • 33. 1 •Security and monetization in automation 2 3 •CodeMeter® technology in CODESYS •How to benefit 4 •Outlook and conclusion AGENDA 4
  • 34.  Pay-per-use monetization with license counter  Extension of the library possibilities (SP18)  Network licenses for SoftPLCs add-ons (e.g. for fieldbus, visualization, OPC UA)  Network licenses for workstation add-ons (e.g. Static Analysis, Profiler, UML, Git)  Cloud licenses  SoftContainer on virtual machines respectively Server with dongles  Network licenses  Scalable licenses (e.g. depending on IEC 61131-3 code size, number of tasks)  Encryption of SoftPLCs via AxProtector  Execution depending CodeMeter® runtime  Guaranteed integrity of SoftPLCs Future use cases (Roadmap) Outlook and Conclusion
  • 35.  Proven technology at your fingertips  Flexible application in different common use cases  Easy handling due to  seamless integration  pre-programmed licenses  One platform for different targets and functions  Added value for the security and monetization of your know-how CodeMeter® in CODESYS Outlook and Conclusion
  • 36. Thank you for your attention! CODESYS® is a registered trademark. Technical specifications are subject to change. Errors and omissions excepted. No reproduction or distribution, in whole or in part, without prior permission. Note: Not all CODESYS features are available in all territories. For more information on geographic restrictions, please contact sales@codesys.com.