Software-technical method is the most efficient method used nowadays. At the stage of development a program includes a fragment of code that checks conditions of the program usage and blocks it´s execution in case of inconformity to the determinate terms of agreement.
Nowadays there are several types of software-technical protection, but each of them has its own disadvantages. For example one serial number could be used on some computers.
There´re sufficient reasons for using a combination of several methods to achieve the most efficient software product protection. One of the most secure combinations is consolidation of cryptographic protection of executable code and external hardware acting as electronic key and external computation module that execute necessary computations for the software. Given method doesn´t run the danger of such software attacks as disassembling, debugging and analysis of the memory dumps by reason of the protection of executable code by resistant cryptographic algorithms. Electronic key fulfills just computational functions therefore interception of passing information between the computer and the electronic key won´t give desirable result for an intruder.
The work is submitted to Scientific Conference "The Problems of International Integration of Educational Standards", England (London) - France (Paris),
April 23 - May 1, 2010. Came to the editorial office on 05.03.2010.