To top
Company Company

Wibu-Systems' Patente

Teilen:

Patente stehen für einzigartige Innovationen, basierend auf der Idee eines Genies. Patente als solches sind das elementare Kapital eines erfolgreichen Unternehmens. International registrierte Patente unterstützen eine stabile Marktposition. Kunden können sich einfacher mit Unternehmen identifizieren, die in Entwicklung investieren und ihr wertvolles Kapital zum Wohle der Kunden einsetzen.

Genau dies verfolgt Wibu-Systems, ein Unternehmen, das stark auf seine hochqualifizierten Mitarbeiter baut. Im Laufe der Jahre hat der Erfinderreichtum der Gründer von Wibu-Systems und den Mitarbeiter viele gegenwärtige und zukünftige Technologien erschaffen. Die Meilensteine des geistigen Eigentums werden durch Patente, die in vielen Ländern gültig sind, geschützt.

Wibu-Systems hält die folgende Patente:

Verfahren zum Autorisieren neu angeschlossener Geräte beim Anschließen an einen Computer über eine Schnittstelle

Verfahren zum Schutz eines Computersystems gegen die Übertragung von nicht autorisierten Daten eines an die Schnittstelle des Computersystems angeschlossenen Geräts, insbesondere eines USB-Geräts, wobei das Computersystem einen Bildschirm und eine Schnittstelle umfasst. Es weist ein Betriebssystem sowie einen für das angeschlossene Gerät passenden, bevorzugt spezifischen Treiber auf. Das Verfahren umfasst zunächst das Erkennen eines Gerätes an der Schnittstelle und ein optionales Klassifizieren des Gerätes. Die vom Gerät gesendeten Daten werden empfangen, wobei nicht autorisierte Daten erkannt werden. In einem weiteren Schritt wird ein Testformular auf dem Bildschirm angezeigt, das bevorzugt mit einer Eingabeaufforderung verknüpft ist. Das Ausführen eines Tests zur Autorisierung, insbesondere eines Turing Tests, stellt einen weiteren Schritt dar, ebenso das Auswerten der empfangenen Daten und das Prüfen, ob der Test erfolgreich war. Bei bestandenem Test wird das Gerät freigegeben und vom Gerät gesendete Daten an das Computersystem weitergeleitet. Bei nicht bestandenem Test wird das Gerät blockiert und weitere Daten gesperrt. Mehr

Method and computer system for protecting a computer program against influence

Method for protecting a computer program against the influence of an intrusive program or manipulation software used to manipulate computer programs on a computer system with a processor unit, main memory, and a storage medium. The method relies on Kerckhoffs’ principle. Parts of the computer program are encrypted to prevent its static analysis without execution of the program by the processor. A key required for decrypting the encrypted parts of the computer program is stored in a secure container that communicates with the computer. More

Method and device for protection of computer software and/or computer-readable data

Method comprises encoding of the software by a license provider using license parameters, recording of software, encoded license parameter transfer from provider to license taker and automatic encoding of the software using the license parameters while the software is being used by the license taker. More

Method for controlling data processing device

The invention relates to a method for controlling a data processing device that is connected to a computer via an interface. Said method comprises the following steps: a device-specific command is generated on the computer by means of an application program; the command is stored in a special file and is then transmitted by the computer to the device with the aid of the write instruction of the computer's operating system; the special file is received by the device; the device-specific command is read out from the special file; the device processor finally executes the command. More

Authorization code recovering method

The invention relates to a method for recovering an authorization code which is assigned to a licensee by a licensor and is stored in an access-protected data processing device that is connected to a computer of said licensee via an interface. A backup file which is part of the authorization code and contains the license parameters is stored on the licensee's computer. More

Method for intrusion detection

Method for protecting computer software by detecting an attack of an intruding program interfering with the execution of said protected software on a computer system with a processor and at least a processor memory, wherein the computer software to be protected communicates with a license container containing a license for using and executing the protected computer software and containing at least one cryptographic key, wherein the license container provides licenses and cryptographic keys for the protected software to protect its usage and its integrity, and wherein the protected computer software is at least partly encrypted and uses the associated cryptographic keys to decrypt said protected software for executing comprises the following steps. More

Method for protecting an application program against reverse engineering and related computer program product

Method for protecting an application program executable on a computer against reverse engineering, said application is created to run with at least one selected dynamic link library (DLL) on said computer, comprises the steps of: removing the references from the application to the used dynamic link library to be run with; adding a specific library loader to the executable application program, said loader either contains or has access to said dynamic link library; setting modified references to said dynamic link library in the correct places of the application; and, upon loading said application program and said loader into the main memory of said computer, initializing said dynamic link library by said library loader; thereby linking said library to the application program like a static link library. More

Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer

Method for generating a cryptographic key on the basis of current components of a computer for decryption of an encrypted, computer-specific authorization code for activating a protected digital data object e.g. executable file such as executable program, application, application program and programs in machine language or in script languages, non-executable files such as programs in source code, text file, database file, audio file, image file and video file and general binary files used by proprietary programs for storing data, on the computer. More