Dynamic Matrices from Hardware Fingerprint and Its Application in Software Copyright Protection

نویسنده

  • Ning Huang
چکیده

This paper presents a scheme of software copyright protection based on dynamic matrices from hardware fingerprint and user’s information. It is mainly as follows. (1)Introduces the basic idea of software copyright protection; (2)Introduces the alphabetic operation of field F37; (3)Uses hardware fingerprint and user’s information to create dynamic matrices to design an affine mapping of F37 to generate a registration code; (4) Uses the invert mapping to verify a registration code. (5)Gives concrete examples. Data and keys are used in a way to prevent sharing registration code with any other computer. The text submitted to the vendor by the user is not the source plaintext for the registration code. Real plaintext is hidden in the software, unknown to the outsiders. It is deceptive to possible adversaries. Attacks for a legal registration code from the submitted text will not success. Experimental results and analysis illustrate the algorithm viable and secure.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

جایگاه و چالش‌های ایران در حمایت بین‌المللی از حقوق مالکیت آثار ادبی و هنری

One of the main problems of the creators of literary, scientific, artistic and cultural works in the country is the lack of observance of the related ethical rules and laws to the protection of copyright in connection with the public rights. Regarding to recent advances and developments, meanwhile explanation of the global sphere of the copyright, present study explores the current situation of...

متن کامل

Lightweight 4x4 MDS Matrices for Hardware-Oriented Cryptographic Primitives

Linear diffusion layer is an important part of lightweight block ciphers and hash functions. This paper presents an efficient class of lightweight 4x4 MDS matrices such that the implementation cost of them and their corresponding inverses are equal. The main target of the paper is hardware oriented cryptographic primitives and the implementation cost is measured in terms of the required number ...

متن کامل

Implementing a Standards-based Distributed Measurement and Control Application on the Internet

ii iii Abstract The distributed measurement and control (DMC) industry is migrating away from proprietary hardware and software platforms in favor of open and standardized approaches. High-level programming languages, object-oriented platforms, Internet technology, and standardized transducer interfaces are serving to shape the next-generation DMC landscape. This paper describes a framework for...

متن کامل

An Enhanced Hill Cipher and Its Application in Software Copy Protection

To protect software from unauthorized use, registration key is frequently used in the field of permission control. For the security of such a system, the key issue is to design a robust algorithm. We propose an enhanced scheme of Hill cipher based on variable modulus and algebraic alphabet to protect software copy, which uses tridiagonal matrix. Since the modulus is not a fixed number and the a...

متن کامل

Eliminate Evading Analysis Tricks in Malware using Dynamic Slicing

In order to be a long time alive, modern malware often make anti-emulation check after launched for evading dynamic analysis. Malware authors gain fingerprint information of target environment through several API to detect whether their creations are running in monitored state or not. If an emulated analysis environment is detected, the malware will change its running to avoid malicious behavio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013