Download PDF

CodeMeter is the universal technology for software publishers and intelligent device manufacturers, upon which all solutions from Wibu-Systems are built.
CodeMeter combines the following applications:

You want to protect the software you have developed against piracy and reverse engineering.
You want to license your software as safely and easily as possible, which includes crucial aspects like the creation of flexible licensing models, the integration of their delivery, and the management of their complete lifecycle with your existing backoffice systems.
You want to safeguard your users against tampering and attacks from third parties.

CodeMeter combines the following applications:
• Protection
You want to protect the software you have developed against piracy and reverse engineering.

• Licensing
You want to license your software as safely and easily as possible, which includes crucial aspects like the creation of flexible licensing models, the integration of their delivery, and the management of their complete lifecycle with your existing backoffice systems.

• Security
You want to safeguard your users against tampering and attacks from third parties.
CodeMeter requires your attention only once: its integration in your software and your business workflow is necessary at one point in time only. Protection Suite is the tool that automatically encrypts your applications and libraries. In addition, CodeMeter offers an API for custom integration with your software.

CodeMeter License Central can be connected to your ERP, CRM, and e-commerce systems. Once integrated, you can:
• deliver your software as many times as you wish
• create licenses from these systems automatically
• transfer licenses to your customers using your backoffice systems or a separate license portal.

Essentially, each user receives the same software, but a different license that entitles him to use your protected software to the extent allowed by you.

CodeMeter offers maximum flexibility. You have total freedom to define the license models and the repository where licenses are stored, and have the opportunity to mix and match the wide array of options available:
• CmDongle: The license is stored securely in a CmDongle. The device embeds a smart card chip, which offers additional security to CodeMeter’s technology. Once saved, the secret keys never leave the unit. CmDongles are available in several form factors, such as USB, SD card, microSD card, CF card, CFast Card, and ASIC.
• CmActLicense: The license is saved in a special file that is bound to the hardware of the target computer. You define the degree of tolerance to changes in the computer. When using virtual machines, you can specify whether the license remains valid if it is moved or copied to a virtual machine. Alternatively, you can employ unbound CmActLicenses via the CodeMeter Protection Only or the CodeMeter Trial License options.
• CmCloudLicense: The license is located on a server in the cloud (CmWAN). This server can be either your own or Wibu-Systems‘ or a server at a trusted user.
License-Server: The license is stored in a CmDongle or a
• CmActLicense on a license server in the LAN of the user. The user can also reserve licenses for network users, Active Directory groups, or specific computers and create usage reports.

CodeMeter supports the complete range of controllers, devices, and computers: from simple microcontrollers or mobile devices and software programmable logic controllers (PLCs) to personal computers and servers.

To cover all possible scenarios, CodeMeter is available in three variants:
• CodeMeter Runtime (
• CodeMeter Embedded (
• CodeMeter µEmbedded (

    WIBU-SYSTEMS AG, a privately held company founded by Oliver Winzenried and Marcellus Buchheit in 1989, is an innovative security technology leader in the global software licensing market. In its mission to offer the most secure, unique, and highly versatile technology, Wibu-Systems has developed CodeMeter, a comprehensive, award-winning suite of hardware and software-based solutions for computers, embedded systems, mobile devices, PLCs, and microcontrollers that incorporates internationally patented processes dedicated to protecting the integrity of digital assets. Through its motto “Perfection in Protection, Licensing and Security”, Wibu-Systems safeguards the intellectual property of software publishers and intelligent device manufacturers against illicit and fraudulent use, reverse engineering and tampering attacks, sabotage and espionage actions, while generating new digital business models fully integrated with ERP, CRM, and e-commerce platforms.
  • Platform as a Service
    Open website
  • Application Industries
  • Automotive
    Equipment & Machinery
  • Application Functions
  • Discrete Manufacturing
    Product Development
    Quality Assurance
  • Vehicle Telematics
    Vehicle telematics enables the monitoring of location, movement, status, and behavior of a vehicle within a fleet. This is achieved through a combination of a GPS receiver and an electronic GSM device that is installed in each vehicle, which then communicates with the user and cloud-based software. Additional sensors and actuators may be added to the system to enable additional functionality, such as vehicle remote control and driver status tracking. Telematics systems provide analytics to determine the optimal route based on location and traffic information, the vehicle's condition, and operational cost prediction.
    Intrusion Detection Systems
    Intrusion detection systems monitor network traffic and search for suspicious activity and known threats, sending alerts when suspicious activity is identified. The overall purpose of an intrusion detection system is to inform IT personnel that a network intrusion has or may be taking place. Alerts will generally include information about the source address of the intrusion, the target/victim address, and the type of attack that is suspected. Each IDS is programmed to analyze traffic and identify patterns in that traffic that may indicate a cyberattack of various sorts. ID systems are being developed in response to the increasing number of attacks on major infrastructure and commercial sites and networks, including those of the Pentagon, the White House, NATO, ports, and electrical grids. The safeguarding of security is becoming increasingly difficult because the possible technologies of attack are becoming ever more sophisticated; at the same time, less technical ability is required for the novice attacker, because proven past methods are easily accessed through the Web. The adoption of IoT technologies also provides new avenues of attack through end points, such as connected devices, that often have weak security features.
    Process Control & Optimization
    Process control and optimization (PCO) is the discipline of adjusting a process to maintain or optimize a specified set of parameters without violating process constraints. The PCO market is being driven by rising demand for energy-efficient production processes, safety and security concerns, and the development of IoT systems that can reliably predict process deviations. Fundamentally, there are three parameters that can be adjusted to affect optimal performance. - Equipment optimization: The first step is to verify that the existing equipment is being used to its fullest advantage by examining operating data to identify equipment bottlenecks. - Operating procedures: Operating procedures may vary widely from person-to-person or from shift-to-shift. Automation of the plant can help significantly. But automation will be of no help if the operators take control and run the plant in manual. - Control optimization: In a typical processing plant, such as a chemical plant or oil refinery, there are hundreds or even thousands of control loops. Each control loop is responsible for controlling one part of the process, such as maintaining a temperature, level, or flow. If the control loop is not properly designed and tuned, the process runs below its optimum. The process will be more expensive to operate, and equipment will wear out prematurely. For each control loop to run optimally, identification of sensor, valve, and tuning problems is important. It has been well documented that over 35% of control loops typically have problems. The process of continuously monitoring and optimizing the entire plant is sometimes called performance supervision.
    Mass Customization
    Mass customization is a manufacturing technique which combines the flexibility and personalization of custom-made products with the low unit costs associated with mass production. Mass customization can be viewed as collaborative efforts between customers and manufacturers, who have different sets of priorities and need to jointly search for solutions that best match customers' individual specific needs with manufacturers' customization capabilities. The objective is to enable customization based on customer requirements without a corresponding increase in production costs. At its limit, it is the mass production of individually customized goods. However, it is more commonly applied to small batch sizes that meet the requirements of specific market niches. A key premise of mass customization is the imperative to postpone the task of differentiating a product for a specific customer until the latest possible point in the supply network. However, process improvements must also be supported by investments in technology that enable the tracking of unique products or batches and flexible production processes.
    Factory Operations Visibility & Intelligence
    Visualizing factory operations data is a challenge for many manufacturers today. One of the IIoT initiatives some manufacturers are pursuing today is providing real-time visibility in factory operations and the health of machines. The goal is to improve manufacturing efficiency. The challenge is in combining and correlating diverse data sources that greatly vary in nature, origin, and life cycle. Factory Operations Visibility and Intelligence (FOVI) is designed to collect sensor data generated on the factory floor, production-equipment logs, production plans and statistics, operator information, and to integrate all this and other related information in the cloud. In this way, it can be used to bring visibility to production facilities, analyze and predict outcomes, and support better decisions for improvements.
    Security Claims Evaluation
    Security claims evaluation is an open and easily configurable cybersecurity platform for the evaluation of endpoint, gateway, and other networked components’ security capabilities. In an industrial environment setting, monitoring of sensors provides a window into the system and operational efficiencies. Specifically, monitoring key parameters such as temperature, vibration, currents, and voltage provide the operator with insights into whether operations are normal, within normal failure mode, or whether there is an indication of a cybersecurity/security breach. Security claims evaluation provides a platform for users to evaluate whether data from the sensors under test is indicative of normal operation or abnormal operation in a non-invasive and non-intrusive manner. Furthermore, using machine learning in combination with real-time analytics capabilities, the sensor operation can be monitored and analyzed 24/7. Logging of abnormal events can be performed for further assessment and future remediation actions. Through running a pre-defined security test suite that encompasses pen testing, known vulnerabilities, and other testing methodologies, testbed users’ security claims can be evaluated at a single or multiple connection points – encompassing an endpoint to a gateway to cloud assessment. A report based on the test results can be provided to users describing potential security weaknesses and proposed recommendations and remediation methods.
    Smart Contracts
    A smart contract is a computer protocol intended to digitally facilitate, verify, or enforce the negotiation or performance of an agreement. Smart contracts allow the performance of credible transactions without third parties. These transactions are trackable and irreversible. Proponents of smart contracts claim that many kinds of contractual clauses may be made partially or fully self-executing, self-enforcing, or both. The aim of smart contracts is to provide security that is superior to traditional contract law and to reduce other transaction costs associated with contracting. Various cryptocurrencies have implemented smart contract service models. A smart contract not only describes the rules and penalties related to an agreement in the same way that a traditional contract does, but it can also automatically enforce those responsibilities.
    Cybersecurity refers to the protection practice for the hardware, software, and data from being destroyed, altered or leaked by accidental or malicious reasons to ensure the system runs continuously and the network service is not interrupted. An effective cybersecurity methodology has multiple levels of protection spread across the computers, networks, programs, and data that one intends to remain secure. For an effective defense from cyber-attacks, the people, processes, and technology in any organization should complement one another.The cybersecurity can be divided into physical security and logical security. Physical safety refers to the physical protection of system equipment and related facilities from damage and loss. Logical security includes integrity, confidentiality, and availability of information.
© 2020 IoT ONE