首页 | 本学科首页   官方微博 | 高级检索  
     

一种面向软件生命周期的授权保护系统设计与实现
引用本文:欧阳雪,周寰,邓锦洲,任江春.一种面向软件生命周期的授权保护系统设计与实现[J].计算机工程与科学,2013,35(4):59-64.
作者姓名:欧阳雪  周寰  邓锦洲  任江春
作者单位:国防科学技术大学计算机学院
摘    要:当今软件行业开发模式由独立开发转向协同开发,销售形式由软件整体销售转向权限控制销售,原有的加密狗、注册码等单项软件保护技术已很难适应当前软件在开发、销售及使用等过程中各环节对产权保护所提出的新需求,软件侵权问题日益严重。针对以上情况,设计了一种面向软件生命周期的新型软件授权保护系统,该系统综合使用U-Key技术、身份认证及数字签名技术、证书链和硬件加密技术,并采用了可由开发商自填写的组件功能模板和以组件为基本授权实体的许可证文件技术加以实现。实现表明,系统结构合理,各项功能正确,可以满足软件在开发、销售和使用环节上对安全性的需求。

关 键 词:软件生命周期保护  授权模板  U-Key技术  证书信任链  租赁销售

Design and implementation of a software life cycle oriented authorization and protection system
OUYANG Xue,ZHOU Huan,DENG Jin-zhou,REN Jiang-chun.Design and implementation of a software life cycle oriented authorization and protection system[J].Computer Engineering & Science,2013,35(4):59-64.
Authors:OUYANG Xue  ZHOU Huan  DENG Jin-zhou  REN Jiang-chun
Affiliation:(School of Computer Science,National University of Defense Technology,Changsha 410073,China)
Abstract:Nowadays, the software development model has transformed from independent development to collaborative development, while the selling pattern of software industry has turned into module based way from traditional whole software selling. The existing software protection techniques such as soft-dog and registration code can no longer meet these new requirements, and the problem of infringement has become more and more severe. Based on this, a software life cycle oriented authorization and protection system was designed. This system synthetically applied the U-Key technology, authentication technology, digital signature technology, certificate chain technology and hardware-based encryption technology. And especially, an authorization model which is customizable to software developers and the license file which takes modules as the basic authorization unit were adopted. The prototype system shows our design is functionally well and reasonable, the security requirements of software in all stages, from developing stage to sale and using, are provided.
Keywords:software life cycle protection  authorization model  U-Key technology  certificate chain  lease sale model
本文献已被 CNKI 等数据库收录!
点击此处可从《计算机工程与科学》浏览原始摘要信息
点击此处可从《计算机工程与科学》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号