Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | 余新平 | en_US |
dc.contributor.author | Hsin-Ping Yu | en_US |
dc.contributor.author | 羅濟群 | en_US |
dc.contributor.author | Chi-Chun Lo | en_US |
dc.date.accessioned | 2014-12-12T01:17:13Z | - |
dc.date.available | 2014-12-12T01:17:13Z | - |
dc.date.issued | 2004 | en_US |
dc.identifier.uri | http://140.113.39.130/cdrfb3/record/nctu/#GT009034532 | en_US |
dc.identifier.uri | http://hdl.handle.net/11536/38946 | - |
dc.description.abstract | 軟體的使用權控管對軟體產業及組織是一個重要的議題,未經授權的使用會造成軟體公司的投資無法回收,對組織則可能洩漏原先已嚴密保護的軟體功能或資料。過去為軟體保護所發展的研究與技術,較不易破解的方法多依賴網路伺服器做線上的使用權檢查,可能造成正常的軟體因為不正常的網路而無法使用。加上近年來軟體系統朝元件化發展,過去針對整個軟體系統考量而設計的研究及技術便無法真正達到使用權控管的目的。 本文將發展上述問題的解決方法視為軟體系統開發的專案,因此遵循RUP(Rational Unified Process)的流程,逐步探討元件保護方法的需求、解決方案。所提出的方法以非對稱加密法限制元件僅能在單一已申請的電腦上使用,以智慧卡保護私密金鑰不被複製,即使元件被不當複製到其他電腦上亦無法使用;在檢查使用權時不需要依賴網路,建立一套元件自我檢查的機制,讓使用者或應用程式在使用此類受保護元件時,不需要改變既有習慣。這個方法若是回過頭應用在整個軟體系統上,亦能保護軟體系統的使用權。 | zh_TW |
dc.description.abstract | The protection of software usage privileges is an important issue to software market and organizations. Illegal usage of software will cause the investment of a software company to be nothing, and cause a organization to reveal the secret software functions. There are a few of research papers and techniques to solve these problems, but some of them which are not easy to crack depend on a server to check the usage privileges. If the network crashes, the software or components can’t work any more. In recent years, a system is decomposed to many components, and then the existing approaches that target on whole system can’t indeed provide the control of usage privilege. This thesis treats the developing of above problems as a software project. So we follow the RUP processes to discuss the requirements and the solution of component protection. This approach limits the components only running on registered computers by adopting the asymmetric encryption algorithm and protects the private key from copying by storing it in a smart card. The designed checking process of usage privilege will not depend on network, and users or applications need not to be aware of the extra protection of components by developing the self-checking mechanism. | en_US |
dc.language.iso | zh_TW | en_US |
dc.subject | 元件保護 | zh_TW |
dc.subject | 軟體保護 | zh_TW |
dc.subject | 軟體盜版 | zh_TW |
dc.subject | 統一流程 | zh_TW |
dc.subject | component protection | en_US |
dc.subject | software protection | en_US |
dc.subject | software piracy | en_US |
dc.subject | RUP | en_US |
dc.title | 軟體元件保護方法之研究 | zh_TW |
dc.title | A Study on the Protection Approach of Software Components | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | 資訊管理研究所 | zh_TW |
Appears in Collections: | Thesis |
Files in This Item:
If it is a zip file, please download the file and unzip it, then open index.html in a browser to view the full text content.