A researching of the process of binding software to hardware

Bibliographic Details
Parent link:Язык и мировая культура: взгляд молодых исследователей: сборник материалов XV Всероссийской научно-практической конференции, г. Томск, 24-27 апреля 2015 г./ Национальный исследовательский Томский политехнический университет (ТПУ) ; под ред. Н. А. Качалова [и др.].— , 2016
Ч. 3.— 2016.— [С. 52-56]
Main Author: Piletskaia A. Yu.
Corporate Author: Национальный исследовательский Томский политехнический университет
Other Authors: Kobenko Yu. V. Yury Viktorovich
Summary:Заглавие с титульного экрана
Information security is one of the most important sphere in Cybernetics. And for Russia this problem is state-of-the-art because of the wide-spread internet piracy and a huge number of hackers. This article explores the commonest ways to protect software using binding to hardware, with a focus on the main approaches to a collection of data from hardware and ways of data processing. As a possible method of solution it is accepted to collect data from main parts of hardware using .Net Framework and further process it using hash-function. The preliminary results reveal that standard facilities of .Net Framework and programming language C# allows gathering information from hardware in simple way. Thus, as a result of research the special software for getting protection code was developed.
Published: 2016
Subjects:
Online Access:http://earchive.tpu.ru/handle/11683/32397
Format: Electronic Book Chapter
KOHA link:https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=620320