首页 | 本学科首页   官方微博 | 高级检索  
     检索      

基于HMAC的加密狗设计
引用本文:于广威,何文才.基于HMAC的加密狗设计[J].信息安全与通信保密,2011,9(11):68-69,72.
作者姓名:于广威  何文才
作者单位:1. 中国科学院研究生院,北京,100049
2. 北京电子科技学院,北京,100070
摘    要:软件的盗版问题对软件公司而言是一个需要重点面对的问题,因为一个随意的盗版行为将会给软件公司带来严重的后果。很多"盗版者"只是些随意复制者,他们虽然只购买了一份授权,但认为将软件复制到多台机器是可以接受的做法。为了防止软件盗版,一个比较好的办法就是使用软件加密狗,只有在计算机上插有合法的加密狗,软件才能正常使用。通过这种做法可以避免软件被任意复制,从而保证软件厂商的合法利益。文中把加密狗与密码学相结合,使用密码学中的HMAC技术来保证软件的安全性。

关 键 词:软件加密狗  HMAC  加密

SoftDog Design based on HMAC
YU Guang-wei ,HE Wen-cai.SoftDog Design based on HMAC[J].China Information Security,2011,9(11):68-69,72.
Authors:YU Guang-wei    HE Wen-cai
Institution:YU Guang-wei 1,2,HE Wen-cai 2(1 Graduate University of Chinese Academy of Sciences,Beijing 100049,China,2 Beijing Electronic Science and Technology Institute,Beijing 100070,China)
Abstract:Software piracy is a severe problem for a software company,and optional piracy usually brings a software company serious consequence.Many pirates are simply duplicators,and they purchase only one authorization,and think acceptable the duplication of the software on many other computers.In order to avoid software piracy,soft dog is a good choice.The software could not be used unless an authorized softDog is inserted in the computer.This method could prevent random duplication of the software,so that the legal profit of software companies can be guaranteed.In combination of softDog with cryptography,a softDog is designed,and the HMAC technology is employed to ensure the security of the software.
Keywords:softDog  HMAC  Encrypt
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号