Font Size: a A A

The Software Protection Research Based On SMBIOS

Posted on:2009-04-02Degree:MasterType:Thesis
Country:ChinaCandidate:M G LiFull Text:PDF
GTID:2178360245981605Subject:Computational Mathematics
Abstract/Summary:PDF Full Text Request
Software is the soul of computer system, is the extract of wisdom from software developers' collective work, is also a kind of product concentrated with knowledge. It's program process is complex, the development cycle is long, however the illegal clone of software is actually easy. Provided the public using the software without authorization, software developers are unable to obtain the reasonable income and the repayment, their survival and the development will come under serious influence, Thus it's important and valuable to strengthen software protection and serious work is required to prevent piracy.The SMBIOS standard is studied and the composition of SMBIOS data is also analyzed in the article. SMBIOS does exist in the BIOS, which includes the data message of several kinds of hardware module such as computer motherboard, BIOS, CPU and so on rather than rely on any software systems.The article proposes a kind of new computer signature code -- the code generated based on SMBOIS and does research on its relatively unique characteristic; It also proposes some methods on how to improve SMBIOS to strengthen the relative unique property of the code, which widens the way for the related research. when the end users transmit this code to certain area's manager in anonymous state, it is advantageous to carry on the user management, with very strong security, authority and non-repudiation. This code may be applied to digital signature, software protection, network management, network certification, e-commerce and so on.One kind of new software protection program proposed in the article, and the beneficial exploration on a practical implementation is done. It's substantive characteristics lies in using the SMBIOS information to generate the relatively unique computer signature code, this code actually one machine one yard, enables the program to achieve the goal that any unauthorised use must register; This highly-enhanced encryption software protection program at the same time relying on the RSA encryption technology and the counter-track technology protects effectively the benefit of software developers with good socio-economic value.
Keywords/Search Tags:Computer, Signature code, Software protection, SMBIOS, non-repudiation
PDF Full Text Request
Related items