期刊文献+

基于硬件特征信息嵌入认证的软件保护 被引量:6

Hardware feature information embedded certification based on software protection
下载PDF
导出
摘要 为了既方便软件开发、降低成本,又便于软件保护、维护权益人的利益,研究了软件保护的常用技术和方法,结合软件工程的具体实践,提出了基于硬件特征信息嵌入认证的软件保护方法。该方法的主要特点是利用用户计算机系统的硬件特征信息,采用特征信息嵌入法,通过对当前计算机特征信息与已认证特征信息表中的信息进行比对,实现基于认证的软件保护;同时使用有效的加密算法,进一步提高软件保护强度。实验结果表明,该方法设计简单、成本低、通用性强、保护强度高,是软件保护的有效方法。 For convenient software development, reduce costs, and easy software protection and safeguarding the interests of equity, the commonly used software protection techniques and methods are studied. Combined with the concrete practice of soft- ware engineering, the method of hardware feature information embedded certification based on the software protection is pro- posed. The main features of this method is the use of a user' s computer hardware feature information, and use feature informa tion embedding method, by comparing the feature information on current computer with that of in the certified feature informa- tion table, software protection based on certification is achieved. At the same time using a valid encryption algorithm, software protection strength is further improved. The result proves that the method is simple, low cost, versatility, protection of high strength and is an effective method of software protection.
作者 李志伟
出处 《计算机工程与设计》 CSCD 北大核心 2012年第7期2550-2554,共5页 Computer Engineering and Design
关键词 硬件 特征信息 嵌入认证 软件保护 加密 解密 hardware feature information embedded certification software protection encryptiom decryption
  • 相关文献

参考文献12

二级参考文献72

共引文献74

同被引文献41

  • 1李超,焦瑞莉,陈家田.基于LabVIEW的并行数据采集系统设计[J].辽宁工程技术大学学报(自然科学版),2012,31(1):89-92. 被引量:19
  • 2吴德会,王志毅.基于混沌保密的USB软件加密狗及其反解密研究[J].微计算机信息,2005,21(06X):15-17. 被引量:9
  • 3StytzM R,Whittaker JA.“Software protection:security’s last stand”[J].IEEE Magazine on Security&Privacy,2003,1(1):95-98.
  • 4ZambrenoJ,ChoudharyA,SimhaR,etal“.Flexible software protec-tion using hardware/software codesign techniques”[A].In:Proc of2004 Europe Conf and Exhibition on Design,Automation and Test[C].Paris:IEEE Press,2004,636-641.
  • 5Ireneusz J.Jozwiak,Krzysztof Marczak,A Hardware-Based Soft-ware Protection Systems-Analysisof Security Dongles with Time Meters,IEEE,2007.
  • 6Zambrenod,ChoudharyA,SimhaP,,etal. "Flexible software protection using hardware/software codesign techniques" [A] In: Proc of 2004 Europe Conf and Exhibition on Design Automation and Test[C]. Paris: IEEE Press, 2004 656 641.
  • 7Yandji Guy-Armand, Hao Lui Lian, Youssouf Amir-Eddine, et al. Research on a normal file encryption and decryption [C] //International Conference on Computer and Management, CAMAN, 2011: 1-4.
  • 8Hu Jianjun, Wen Qiaoyan, Tang Wen, et al. A key hiding based software encryption protection scheme [C] //Interna- tional Conference on Communication Technology Proceedings. IEEE Press, 2011: 719-722.
  • 9Jan Cappaert, Bart Preneel, Bertrand Anckaert, et al. To- wards tamper resistant code encryption [C] //Practice and ex- perience. Berlin.. Springer, 2008: 86-100.
  • 10Phillips GNL Interpolation and approximation by polynomials [M]. New York: Springer, 2003.

引证文献6

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部