Font Size: a A A

The Design And Implementation Of A Software Copyright Protection System Base On PKI

Posted on:2005-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:S ZhaoFull Text:PDF
GTID:2168360125450901Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
Since it has come into being, the development of computer technology may be said that it changes with each passing day. Various new technologies and theory come forth continually. Today, the size of application software has increased from several bytes to Several CDs. Thousands upon thousands of shareware and Business software are huger and huger, and its technology is more complicated with each passing day. As excellent software, the secret of its technology may become the emphases that others steal.PKI (Public Key Infrastructure) system is used extensively at present to solve the security of Network Information Services. It is a certificate and key management system, which provides cipher service for all kinds of network application, such as encrypt and digital signature. It provides a extensible and policy-based method to solve identification and non-reputation.Although the long-time research of software protection has been done, and PKI system is used more and more widely in Network Information Security, there are not ripe theory and products for software protection base on PKI. Because of the predominance of PKI system in identification,and users' legal identity must be discriminated for software protection, it is possible to combine software protection and PKI system. In view of this situation, the thesis design and implement a Software Copyright Protection system base on PKI. The system is composed of licence server, client-side tools and licence-identify API. Licence server provides the external interface by a mode of services, and get request for service through the socket communications. It connects with the third-party PKI systems through the connection interface, and provides licence apply and download service for user. At the same time, it also provides system management and config services for system administrator. Client-side tools provide the interface to get hardware feature code and import licence certificate for users. Licence-identify API provides necessary functions for client-side tools, and provides licence verification functions for software being protected.Using the system in protecting the software copyright, the software being protected will validate the user's licence. If the user wants to run the software being protected, he should make use of client-side tools in getting hardware feature firstly, and then, apply to licence server for licence certificate through network. If it is succeeded in validating user's legal identity, licence server will connect with the third-party PKI systems through the connection interface and apply for the licence certificate. Before running the software being protected, the user must download the certificate and import it with using client-side tools. When it is running, the software being protected will verify user's certificate, and it would not run normally unless it is succeeded in verification.The core of software copyright protection is preventing the software product from proliferate, namely, preventing disabled user holding the software copy or being not able to run the software normally in despite of holding the copy. The system ensures the software copyright protection by notarizing user's legal identity, controlling the issuance of the licence certificate and preventing user holding the copy unlawfully. In addition, the system can restrict the life of the software by checking the period of validity of licence if necessary.When it is running, the software being protected validates user's licence by checking whether the certificate is signed by appointed CA. The applicant is the only one who holds the private key, thus verifying whether the private key match the certificate can provide the much stricter authentication. By doing so, the one without the corresponding private key can't run the software normally in despite of he embezzles the legal licence certificate.If there is no limit to the amount of certificate requisition that legal user can apply in the course of licence certificate issuance, the legal user can apply l...
Keywords/Search Tags:Implementation
PDF Full Text Request
Related items