Wibu-Systems' Patents

Udział:

Patents are the representation of genius expressed through unique innovations. As such, patents are a primary asset of any successful enterprise. When filed internationally, they strengthen market positioning. Customers identify themselves more easily with companies that invest in research and development and share their singular treasures with their loyal base.

This is exactly the story of Wibu-Systems, a company that strongly believes in its highly qualified staff. Over the years the bright minds of Wibu-Systems’ founders and employees have collaborated to create major components of present and future technology. These intellectual property milestones have been protected through patents valid in numerous countries.

In particular, Wibu-Systems holds the following patents:

License binding of an application license to a device

The present invention relates to a license agent apparatus for handling a license of an application of a licensor, comprising a device interface to communicate with a device having specific data; and a processing unit to generate a license container configured to maintain a license for the application. The invention further relates to a device having specific data characterizing the device and being configured to be bound to a license container, which is suitable to contain at least a license for an application, and being configured to communicate with a license agent or a license agent apparatus to provide the specific data for identifying the device and for creating device unique identity data, D-UID. The invention further relates to a corresponding system, a license container as well as to corresponding methods. More

Method and secure element for detecting a trusted electronic assembly

The invention relates to a method and a secure element for detecting the trustworthiness of an electronic assembly. The secure element comprises a control unit, a record storage device, and a secure storage device; the record storage device comprises a target state value of the assembly; the secure storage device comprises a private key of a proof of origin; the secure element has a public key of the proof of origin, said public key being output to a requesting processing unit; and the control unit is designed to carry out the method in order to detect the trustworthiness. The method has the steps of ascertaining an actual state value of the actual state of the assembly, reading the target state value from the record storage device, verifying the authenticity of the secure element, processing the actual state value and the target state value, and deciding whether the actual state is sufficiently similar to or compatible with or matches the target state such that a trust criterion is satisfied. More

Method for protecting an application program and related computer program product

A method for protecting an application program executable on a computer against reverse engineering where said application is created to run with at least one selected dynamic link library (DLL) on said computer; the method comprises the steps of: removing the references from the application to the used dynamic link library to be run with, adding a specific library loader to the executable application program where said loader either contains or has access to said dynamic link library, setting modified references to said dynamic link library in the correct places of the application, and, upon loading said application program and said loader into the main memory of said computer, initializing said dynamic link library by said library loader; thereby linking said library to the application program like a static link library. The library loader and the pseudo-statically linked library (PLL) could be embedded into the application program, thereby using unused space within the application. The protected application presents itself as a monolithic application without the vulnerable interface to a DLL. More

Method for authorizing newly connected devices when connecting to a computer via an interface

A method for protecting a computer system against the transmission of unauthorized data from a device connected to an interface, in particular a USB device, of a computer system, where the computer system comprises of a screen and an interface. The system has an operating system installed as well as preferably a specific driver, which is suitable for the connected device. The method consists first of recognizing a device via the interface and optionally classifying the device. The data sent by the device is received, and any unauthorized data is detected. In a further step, a test form is displayed on the screen, which is preferably associated with an input request. In the next step, an authorization test is executed, in particular a Turing test, the received data is evaluated, and it is verified whether the test was successful. If the test is passed, the device is authorized, and the data transmitted by the device is passed on to the computer system. If the test is not successful, the device is blocked, and no further data is transmitted. More

Method and computer system for protecting a computer program against influence

Method for protecting a computer program against the influence of an intrusive program or manipulation software used to manipulate computer programs on a computer system with a processor unit, main memory, and a storage medium. The method relies on Kerckhoffs’ principle. Parts of the computer program are encrypted to prevent its static analysis without execution of the program by the processor. A key required for decrypting the encrypted parts of the computer program is stored in a secure container that communicates with the computer. More

Method and device for protection of computer software and/or computer-readable data

Method comprises encoding of the software by a license provider using license parameters, recording of software, encoded license parameter transfer from provider to license taker and automatic encoding of the software using the license parameters while the software is being used by the license taker. Software encoding is initialized with a freely chosen secret Firm Key (FK). Encoding of the transmitted license parameters is undertaken using a Private Serial Key (SK). Decoding of the software or data is initiated using the selected Firm Key. An Independent claim is made for a device for producing a random secret private serial key for encoding the license parameters before they are transferred from the license provider to the license taker. Ideally the device is connected to the computer of the license taker. More

Method for intrusion detection

Method for protecting computer software by detecting an attack of an intruding program interfering with the execution of said protected software on a computer system with a processor and at least a processor memory, wherein the computer software to be protected communicates with a license container containing a license for using and executing the protected computer software and containing at least one cryptographic key, wherein the license container provides licenses and cryptographic keys for the protected software to protect its usage and its integrity, and wherein the protected computer software is at least partly encrypted and uses the associated cryptographic keys to decrypt said protected software for executing. More

Method for protecting an application program against reverse engineering and related computer program product

Method for protecting an application program executable on a computer against reverse engineering, said application is created to run with at least one selected dynamic link library (DLL) on said computer, comprises the steps of: removing the references from the application to the used dynamic link library to be run with; adding a specific library loader to the executable application program, said loader either contains or has access to said dynamic link library; setting modified references to said dynamic link library in the correct places of the application; and, upon loading said application program and said loader into the main memory of said computer, initializing said dynamic link library by said library loader; thereby linking said library to the application program like a static link library. More

Method for generating a cryptographic key for a secure digital data object on the basis of the current components of a computer

The method involves determining current feature values for features of a computer, and calculating current checksums from the current feature values. The current checksums are compared with original checksums, and the current feature values are stored in a current feature value vector when the original checksum and the current checksum are identical. Missing feature values in the value vector are determined by using redundancy data, and the value vector is completed with the determined feature values. A cryptographic key is generated from the value vector. More

Do góry