Font Size: a A A

The Application Research On Software Protection Technology

Posted on:2010-08-15Degree:MasterType:Thesis
Country:ChinaCandidate:K XuFull Text:PDF
GTID:2178360275977400Subject:Computer technology
Abstract/Summary:PDF Full Text Request
With the fast development of software industry and the Internet Technology, more and more professional software application has been widespread, and they make our life and work more efficient and effective. But driven by the interest,the software copy and decode also spread wildly.Therefore, the question of software copyright protection has drawn more and more attention. In order to keep the software industry developing quickly and increasingly,technique support is needed emergently as well as the Intellectual Property Protection laws or the related rules. On the other hand,the software protection,including plenty of advanced knowledge,has become the hot topic of the computer technology field.Considering the practical requirements of security in the testing and training platform of Computerized Accounting,based on some often-used encryption skills and the Encryption algorithm, and aiming at the characteristics of the software protection,this dissertation offers a new software-protection program combining the explicit-pin calibrating method and ET99 encryption dog,with the analysis of the shortcomings of protection technology used in the testing and training platform of Computerized Accounting. It is supposed to be applied in the testing and training platform of Computerized Accounting,and then use the static analyzing tool to stimulate the attack on the testing and training platform of Computerized Accounting which is protected by the program. The results of the experiment prove that with the improved protective program the security of the software would be strengthened a lot.The thought and the programs about Encryption in the dissertation is practical,and it is valuable to spread in reality.
Keywords/Search Tags:software protection, Decryption, encryption dog
PDF Full Text Request
Related items