To obtain access to full text of journal and articles you must register!
- Article name
- Develop and implement a method authorized by the launch and operation of the protected software product in a potentially hostile software and hardware environment
- Authors
- Tyulkin M. V., , info@learn-about.me, State National Research Politechnical University of Perm, Perm, Russia
Kapger I. V., , kapger@mail.ru, Moscow Power Engineering Institute (MPEI); State National Research Politechnical University of Perm, Moscow, Russia
Krotova E. L., , lenkakrotova@yandex.ru, State National Research Politechnical University of Perm, Perm, Russia
Krotov L. N., , levkrotov@yandex.ru, State National Research Politechnical University of Perm, Perm, Russia
- Keywords
- protection programs / unauthorized copying / cryptography / hash function / the client-server application
- Year
- 2012 Issue 4 Pages 16 - 20
- Code EDN
- Code DOI
- Abstract
- In this paper we propose a method called the method of "time window" that allows to remotely monitor the launch and operation of the protected software product in a potentially hostile environment of the software and hardware with no changes in this environment in order to prevent unauthorized use of this software, as well as to counter changes into executable code of the product. The proposed method is based on the properties of asymmetric and symmetric cryptographic algorithms and is based on a client-server interaction.
- Text
- To obtain access to full text of journal and articles you must register!
- Buy