Font Size: a A A

Study And Realization On Software License Authentication

Posted on:2005-12-29Degree:MasterType:Thesis
Country:ChinaCandidate:J Q ZhuFull Text:PDF
GTID:2168360125450472Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Besides providing numeric and network services, DRM(Digital Rights Management)can utilize the latest information technology to prevent those lawless uses and copies in order to protect knowledge property of those numeric knowledge products. DRM primarily deals with multimedia numeric products and application software. Techniques such as Numeric watermark, security container and security protocol which process the multimedia numeric right protection are primarily studied by people all along. For example, numeric watermark technique can realize multimedia right control and network business right protection problems in which the cipher technique especially the public cipher technique that process multimedia right protection security protocols takes on favorable performance. However, it is a pity that numeric products contents right protection in allusion to the application software yet did not arose the interests so that the pirates are rampant. How to protect the numeric products right is significant both to the software developer and the consumers.Therefore, after analyzing the current software right protection mechanism and its principle especially lucubrated the DRM technique and its development, this paper put forward a novel software security admission protocol SRMP that solved software purview management effectively. This protocol takes software contents and its running environment into account all together; it makes use of the mechanism "character association, atom authorization and compulsive taking it back" so that it solved the atom sending and callback of software usufruct, the software arbitrary transfer and the software contents holding.SRMP achieves the basic requests of EULA(end user license agreement):(1) Controllable usufruct. The software must be run within the quantitative range of admission agreement. The simplest case is one suit of software can only be allowed to run on one machine. While the server software can only allow the number of clients that support admission agreement, which protect the software from lawless copy and diffusion.(2) Environment transfer. The same copy can transfer from one machine to another without difference, in this process its functions and contents can be hold.(3) Controllable resources. In the process of transfer, we guarantee the integrity of software or share callback and hold the functions of original software and its contents.(4) Running security of software entity. Software entity must guarantee its running security in order to prevent the outer analyses and attacks for example disassembly in order to improve self-protection ability.Validity, security, data integrity and contents undeniableness of SRMP not only rely on cipher technique but also the resource admission and logout realization are based on the software realization feasibility of ACID. Therefore, this protocol is not only safe from theory but also feasible from realization.This paper also put forward SRM module based on SRMP. We modified SRM module to make it more accord with practice, so it has much more business value and operable performance. SRM is not only suited for the multi-user environment but also for solo computer environment. It realizes comprehensive admission right management measures. Recurring to SRM, the developers confine their software to one machine or one network with given users number. SRM provides three admission right management ways: drift admission right management, solo machine node locked admission right management and demo admission right management. At the same time, SRM provides two admission management strategies: maturity of choice admission right and the user number simultaneously. SRM solved the problem of supporting multi-client admission right management effectively. This paper studied the encryption and authentication algorithms in management pattern deeply especially MD5 algorithm, RSA unsymmetrical algorithm, DES symmetrical algorithm and OpenSSL protocol.Finally, we designed and realized SRM module and developed SoftLM system. T...
Keywords/Search Tags:DRM, Knowledge Property, SRMP, Character Association, Atom Authorization, Compulsive taking back, ACID, SRM, Drift License Right Management, EULA, MD5 Algorithm, OpenSSL, SoftLM, SoftAgent, SoftPortal
PDF Full Text Request
Related items