A Software Protection Method Based on Computer Fingerprint and Asymmetric Encryption

Article Preview

Abstract:

Software protection is an important research area in computer field. Combined with the traditional asymmetric encryption algorithm which provides the measures of protection, computer fingerprint was employed to identify the protection object. This novel software protection method is called AEA-CF, which means asymmetric encryption algorithm based on computer fingerprint. The computers used AEA-CF should be running on Internet so that the authentication information could be provided by server. The experiments show that this method could protect software effectively.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 756-759)

Pages:

1215-1219

Citation:

Online since:

September 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] SUN Yongqing, GU Yujie, ZHAO Ge. Software Encryption and Protection Based on Dynamic Register Code. Computer Engineering. June 2007, Vol. 33, No. 12, pp: 183-184. In Chinese.

Google Scholar

[2] Samuel Shu Kin Kwan, Jeevan Jaisingh, Kar Yan Tam. Risk of using pirated software and its impact on software protection strategies. Decision Support Systems, Volume 45, Issue 3, June 2008, pp: 504-516.

DOI: 10.1016/j.dss.2007.06.014

Google Scholar

[3] Olga Gelbart, Eugen Leontie, Bhagirath Narahari, et al. A compiler-hardware approach to software protection for embedded systems. Computers & Electrical Engineering, Volume 35, Issue 2, March 2009, pp: 315-328.

DOI: 10.1016/j.compeleceng.2008.06.010

Google Scholar

[4] Boneh D, Franklin M. Identity-based Encryption from the Weil Pairing. SIAM Journal of Computing, 2003, 32(3), pp: 586-615.

DOI: 10.1137/s0097539701398521

Google Scholar

[5] HAO Yao-hui, LIU Hong-bo, ZHENG Li, et al. Software Piracy-proof Method Based on USB Encryption Lock. Computer Engineering. December 2010. Vol. 36, No. 23, pp: 119-120, 123. In Chinese.

Google Scholar

[6] Matt Pietrek. An In-Depth Look into the Win32 Portable Executable File Format. MSDN Magazine, (2002).

Google Scholar