J4 ›› 2013, Vol. 35 ›› Issue (4): 59-64.
• 论文 • Previous Articles Next Articles
OUYANG Xue,ZHOU Huan,DENG Jinzhou,REN Jiangchun
Received:
Revised:
Online:
Published:
Abstract:
Nowadays, the software development model has transformed from independent development to collaborative development, while the selling pattern of software industry has turned into module based way from traditional whole software selling. The existing software protection techniques such as softdog and registration code can no longer meet these new requirements, and the problem of infringement has become more and more severe. Based on this, a software life cycle oriented authorization and protection system was designed. This system synthetically applied the UKey technology, authentication technology, digital signature technology, certificate chain technology and hardwarebased encryption technology. And especially, an authorization model which is customizable to software developers and the license file which takes modules as the basic authorization unit were adopted. The prototype system shows our design is functionally well and reasonable, the security requirements of software in all stages, from developing stage to sale and using, are provided.
Key words: software life cycle protection;authorization model;UKey technology;certificate chain;lease sale model
OUYANG Xue,ZHOU Huan,DENG Jinzhou,REN Jiangchun. Design and implementation of a software life cycle oriented authorization and protection system [J]. J4, 2013, 35(4): 59-64.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://joces.nudt.edu.cn/EN/
http://joces.nudt.edu.cn/EN/Y2013/V35/I4/59