To top
Resources Resources

How secure do you want your application to be?

Share:
Access the Recordings 
German access
English access

Just like the hacking scene has its script kiddies, leisure-time hackers, professional hackers, and all-stars, the software protection world allows you to opt for a homegrown solution, implement a cheap product, select a fully dedicated technology that has been leading the global market since decades, or even go the extra mile. It’s easy to agree that protecting is better than having your head in the sand, but in essence, there is no absolute right or wrong approach: The means of protection need to be appropriate for the value and appeal of your software.

With CodeMeter AxProtector and its variants, you already have a set of tools that allows you to easily safeguard your compiled applications. No automatic hacking would work, as the overall goal of AxProtector is to automatically encrypt your application code and insert countermeasures against standard hacking techniques. To increase security even more, you can additionally encrypt individual functions with IxProtector and implement customized checks with CodeMeter Core API.

Now, with CodeMoving, we make a leap into optimal protection: CodeMoving lets you move essential code into a CmDongle for execution far away from the prying eyes of would-be hackers. Once you move fragments of code into the CmDongle, you make the mischievous exploit simply impossible to achieve.

Join us for a discovery journey to the ultimate frontier of software protection:

With CodeMoving, you can create as many code fragments as you want for execution in the CmDongle. To move the code, the application is encrypted with AxProtector; all functions to be moved are compiled by AxProtector and kept fully encrypted within the application like an IxProtector protected function. While IxProtector decrypts and executes the block in question in the memory of the computer during runtime, CodeMoving first moves it into the CmDongle to be decrypted and executed with the right input parameters. The output parameters are then returned to the application. The architecture of CmDongles also plays a significant role in keeping your code safe. CodeMoving is more secure than IxProtector, while IxProtector offers a better performance of the protected code. To get the optimal solution for your application a combination of CodeMoving and IxProtector is possible.

However, before you start applying CodeMoving, there are some prerequisites and recommendations that you should be aware of. Register now to learn all the technical details and best practices our experts will share during this session.

They are ancrypted by AxProtector and stored / placed within the application. When I read this sentence it sounds like they get encrypted from the application (so it is executed within the application). We should make this more clear.

In our new masterclass, we are going to zero in on:

  • Introduction - The view of the hacker
    • Available hacking tools
    • Types of cyber attacks
  • Foundations of CmDongle
    • Encryption via Product Code
    • Key change with Encryption Code
    • CodeMoving
    • Maximum Encryption Rate
  • A scalable perspective
    • CodeMeter API – Simple API calls
    • AxProtector – Encrypting the complete application
    • IxProtector – Encrypting individual functions
    • CodeMoving – Transferring functions into the CmDongle
  • Implementation examples
    • Simple CodeMoving function
    • Using cryptography in CmDongles
    • State memory in CmDongles
    • Locking CmDongles

Scalability is as crucial in software licensing as it is in protection. Seize the opportunity to build up the technological know-how to apply the tools and techniques required in the markets you serve.