首页 | 本学科首页   官方微博 | 高级检索  
     

软件保护的分析与思考
引用本文:袁淑丹,黎成,任子亭. 软件保护的分析与思考[J]. 数字社区&智能家居, 2014, 0(12): 8180-8181
作者姓名:袁淑丹  黎成  任子亭
作者单位:贺州学院计算机科学与信息工程学院,广西贺州542800
摘    要:该文在分析了以往的软件加密方法和对比研究之后,得出将软硬件结合进行软件保护的方案,于是提出了基于硬盘序列号进行软件加密保护的研究。将软硬件加密技术结合使用,硬件方面通过对比分析得出要使用硬盘序列号进行加密依据,基于计算机硬盘序列号具有唯一性特点,可以更好的实现一码一机制,并且在软件加密技术上进一步改进,使用对称加密算法与非对称加密算法结合,让软件的保护强度进一步提高。

关 键 词:软件保护  加密技术  注册机

Analysis and Reflection Software Protection
YUAN Shu-dan,LI Cheng,REN Zi-ting. Analysis and Reflection Software Protection[J]. Digital Community & Smart Home, 2014, 0(12): 8180-8181
Authors:YUAN Shu-dan  LI Cheng  REN Zi-ting
Affiliation:(Computer Science and Information Engineering,Hezhou University, Hezhou 542800,China)
Abstract:Based on the analysis of the past after a software encryption method and comparative study ,the combination of hardware and software obtained protection scheme, So put the research-based encryption software to protect the hard drive serial number. The combination of hardware and software encryption technology used by comparative analysis of results of hardware to be used to encrypt the hard drive serial number basis, based on the computer's hard drive serial number of unique characteristics that can better achieve one yard a mechanism, and software encryption technology further improvements, combined with the use of a symmetric encryption algorithm asymmetric encryption algorithm, allowing the software to further enhance the strength of protection.
Keywords:Software Protection  Encryption Techniques  Cryptography
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号