Shenzhen ZTRON Microelectronics Co., Ltd
Telephone
0755-8299 4126

Software

Computer software development protection


Today, computers have become an essential item in people's daily lives. With the continuous development of computer technology, people's requirements for software are becoming more and more stringent, and people pay more and more attention to software development and security. This article summarizes computer software development and protection technology, hoping to arouse the public's attention to computer development and software security applications.


1. Security design of computer software development


As the level of technology improves, many security products with mature designs appear on the market that can be directly applied to programs. Security function products can not only improve the unity and integrity of the entire computer system, but also build application program modules, improve the functions of original security products, and enhance security. For example, under normal circumstances, security products do not provide the function of digital signature, but this function can be realized by installing related applications. The security program development process is the process in which programmers install effective security service modules together. In the process of software development, the technical department must first investigate the development-related requirements, and then construct the internal control process of security engineering through the internal construction of the computer, and summarize the particularity of the process and the corresponding operating parameters, thereby reducing development costs and improving development efficiency. This development scheme can not only strengthen the security of each link of the software, but also improve the stability and reliability of the system. The key to the confidentiality work of application program and document management is whether the input and output and processing control can be effectively carried out to ensure the integrity, accuracy and security of the input and output data. When conducting transactions, in order to avoid errors, program control of data transmission and processing is required. Once an error is found in the program, the program will issue an error prompt and a modification opinion. At the same time, the tracking and auditing of the completeness and correctness of system corrections should be strengthened, and the development program must meet the requirements of business needs. If there are contradictions between modules or insufficient password modes during the design, resulting in the inability to fully realize the security requirements, it is necessary to make trade-offs or choose other security operation mechanisms to try to meet the feasibility of the security requirements.


2. Analysis of computer software protection technology


The primary purpose of computer software protection technology development is to prevent and prevent illegal vendors from copying and spreading genuine software, which mainly includes the following two aspects: one is to develop software protection technology for the purpose of protecting hardware; the other is to develop software for the purpose of software development protection technology. At present, software protection technology is widely used, including application software, operating system, driver, network and other fields. Judging the security of software protection technology and its products requires a comprehensive evaluation, and it is not advisable to evaluate security only through a single aspect.


2.1 Hardware level


(1) Dongle: Dongle is a hardware device that looks like a USB flash drive. It was renamed as dongle, and later developed into a popular industry term for software protection. It is a combination of software and hardware inserted into the parallel port of a computer. Encrypted products generally have tens or hundreds of bytes of non-volatile storage space for reading and writing, and now newer dongles also include a single-chip microcomputer. Software developers can exchange data with the dongle through interface functions, that is, read and write the dongle to check whether the dongle is plugged into the interface; or directly encrypt their own EXE files with tools attached to the dongle. In this way, software developers can set multiple software locks in the software, and use the dongle as a key to open these locks; if no dongle is inserted or the dongle does not correspond, the software will not be able to execute normally. Although the dongle has many advantages, it has the disadvantages of low convenience and high cost, and cannot be widely promoted.


(2) CD, floppy disk. Both floppy disks and optical disks can protect stored electronic information by hiding keys in their storage space. In addition, floppy disks are write-protected, which can prevent accidental writing operations and prevent viruses from invading them. When in use, it is best to make some important floppy disks (such as program installation disks and data backup disks) write-protected. Push the write-protect button inward to cover the hole in the left rear corner of the floppy disk, exposing the square hole of the write-protect button, the floppy disk is in writing state, and the floppy disk can accept input records. A floppy disk can record and store multiple files, and it can be reused like an audio tape. However, the protection of optical discs and floppy disks has two disadvantages: first, if the optical discs or floppy disks are damaged, the electronic information stored therein cannot be repaired. Secondly, hackers with strong professional skills can easily judge the location of the key, and then pirate it after cracking it.


2.2 Software level


(1) Serial number: Serial number protection is the most popular software protection method today. The software ensures the legitimacy of the serial number by verifying the conversion relationship between the user name and the serial number. When the user purchases the software and downloads it to the computer, if he wants to install and use it normally, he needs to register the software. The user sends personal information to the software company, registers his own unique private account, and the software company will provide the customer with a unique serial number. Customers must enter the serial number accurately and pass the verification to use all the functions of the software. The advantage of this method is simple operation, low cost and easy promotion.


(2) Nag window: The software is not registered or the trial version of the software often pops up some windows prompting for registration. These windows are called Nag windows. After the software trial period, the Nag window is likely to block the official window of the software or some windows with important functions, so that the software cannot be used normally. At the same time, the software can control the pop-up time and pop-up times of the Nag window, but because the pop-up window will give users a bad impression, it is used less and less.


(3) Time and function restrictions: Time-limited protection methods for software are now more common, including two types: one is to limit the time of a single operation, and the software will automatically stop running if the data exceeds the limited time; the other is to limit the number of uses or the time limit limits. Restricting software functions is to process the module functions in the software, so that users cannot use them normally. At present, the effect of this restriction has been well reported.


(4) Anti-disassembly: anti-disassembly is a relatively comprehensive software protection technology, and the effect of protection is ideal by combining the characteristics of various protection technologies mentioned in this article. This technology is now mainly used to prevent the dynamic tracking and analysis of crackers.


Summarize


At present, with the rapid development of computer technology and network, software and system programs are gradually penetrated into our work and study, and may even affect our basic necessities of life in the future, so we should attach great importance to the development of computer software. Relatively, computer information security will also affect our normal work and life, so the research on computer software protection technology is urgent.


The above is the computer software development and protection technology research introduced by Shenzhen Zuchuang Microelectronics Co., Ltd. for you. If you have software and hardware function development needs for smart electronic products, you can rest assured to entrust them to us. We have rich experience in customized development of electronic products, and can evaluate the development cycle and IC price as soon as possible, and can also calculate PCBA quotations. We are a number of chip agents at home and abroad: Songhan, Yingguang, Jieli, Ankai, Quanzhi, realtek, with MCU, voice IC, Bluetooth IC and module, wifi module. We have hardware design and software development capabilities. Covering circuit design, PCB design, single-chip microcomputer development, software custom development, APP custom development, WeChat official account development, voice recognition technology, Bluetooth wifi development, etc. It can also undertake the research and development of smart electronic products, the design of household appliances, the development of beauty equipment, the development of Internet of Things applications, the design of smart home solutions, the development of TWS earphones, the development of Bluetooth earphone speakers, the development of children's toys, and the research and development of electronic education products.


  • TOP