Presentation is loading. Please wait.

Presentation is loading. Please wait.

Security of Things Kelly Jagers op Akkerhuis

Similar presentations


Presentation on theme: "Security of Things Kelly Jagers op Akkerhuis"— Presentation transcript:

1 Security of Things Kelly Jagers op Akkerhuis
Wibu-Systems sssss

2 Headquarters in Germany (Karlsruhe)
Wibu-Systems Founded in 1989 Headquarters in Germany (Karlsruhe) Focus on Protection, Licensing and Security Top 2 in hardware based protection Top 3 in software licensing sssss

3 Internet of Things CODE_n15_internet_of_things_infographic

4 Scalable and flexible Advantages of the IoT
Reducing costs  Efficient, flexible, safe Improve patient safety Share resources and knowledge Effective and proactive maintenance

5 Sharing knowledge Reverse engineering unauthorized use Manipulation
Risks 4.0 Sharing knowledge Reverse engineering unauthorized use Manipulation

6 Internet of Medical Things
Patient Safety Privacy Interoperability Security

7 More and more medical systems are cross-linked
Current situation More and more medical systems are cross-linked 50 billion “Things” connnected by 2020 New attack vectors for Cyber Physical Systems (CPS) IoT = Mobile Phone, PLC, IP-CAM, etc…, every system with small processor linked to Internet (Wifi / Ethernet) CPS = networked embedded systems sssss

8 Challenges Piracy Reduction Know how Protection Production Data Features on Demand Access Control Integrity Protection

9 Safely stored in a License
Security of Things 4.0 Encryption of IP Secure bootloader Safely stored in a License

10 Encryption I Feature Code Release Date Firm Code Product Code
Feature Map Maintenance Period SHA 256 AES Black Key 128 bit Firm Key Encryption Code Enc. Code Options

11 Symmetric Encryption –> standard
Encryption II Symmetric Encryption –> standard 128-Bit AES (Advanced Encryption Standard) Used for encryption of executable code and data Asymmetric Encryption –> more advanced and sophisticated 224-Bit ECC (Elliptic Curve Cryptography) 2048-Bit RSA (Rivest Shamir Adleman) Used for Signatures and Authentication (Certificates) Required today for security in Cloud, SaaS, Server, Desktop, PLC, Embedded & IoT

12 Integrity Protection starts at boot Integration into boot loader
Secure Boot Integrity Protection starts at boot Integration into boot loader Signature and encryption of complete operating system Forward check and backward check (state engine) of integrity Anchor of Trust sssss

13 Secure Boot Loader Application / Runtime / PLC
Check Check Load Start Operating System (Windows, Linux, …) Check Check Load Start Boot Loader (UEFI, U-Boot, …) Check Check Load Start Hardware / Pre-Boot Loader

14 Safely stored in a License
Different solutions for different cases sssss

15 Sirona: CAD/CAM dental solutions
CodeMeter Dongles for licensing Activate machine features Distribute production rights (only original composites can be used) AxProtector for: Protection of Intellectual Property Prevention of Reverse Engineering Integrity Protection to avoid manipulation

16 Agfa-Healthcare: NX for Digital Radiography
Tool for technologist Image Identification Radiography workflow & Quality Control Different protection schemes WibuBox for licensing of features AxProtector for: IP Protection Integrity check Data Protection 16

17 More than 7000 Customers

18 Kelly Jagers op Akkerhuis kelly.jagers@wibu-systems.nl www.wibu.com
Thank you Kelly Jagers op Akkerhuis sssss


Download ppt "Security of Things Kelly Jagers op Akkerhuis"

Similar presentations


Ads by Google