Scientific journal
European Journal of Natural History
ISSN 2073-4972
ИФ РИНЦ = 0,301

APPLICATION OF COMPLEX METHODS TO SOFTWARE PRODUCT PROTECTION FOR ILLEGAL COPYING

Romanenko D.A., Gritsuk V.A.
The problem of illegal usage of software products cropped up in 80 of XX century simultaneously with the appearance of personal computers, due to some specific features of this type of computers. It has happened as a result of hardware standardization and mass distribution of personal computers without any software.

Software-technical method is the most efficient method used nowadays. At the stage of development a program includes a fragment of code that checks conditions of the program usage and blocks it´s execution in case of inconformity to the determinate terms of agreement.

Nowadays there are several types of software-technical protection, but each of them has its own disadvantages. For example one serial number could be used on some computers.

There´re sufficient reasons for using a combination of several methods to achieve the most efficient software product protection. One of the most secure combinations is consolidation of cryptographic protection of executable code and external hardware acting as electronic key and external computation module that execute necessary computations for the software. Given method doesn´t run the danger of such software attacks as disassembling, debugging and analysis of the memory dumps by reason of the protection of executable code by resistant cryptographic algorithms. Electronic key fulfills just computational functions therefore interception of passing information between the computer and the electronic key won´t give desirable result for an intruder.

The work is submitted to Scientific Conference "The Problems of International Integration of Educational Standards", England (London) - France (Paris),
April 23 - May 1, 2010. Came to the editorial office on 05.03.2010.