A researching of the process of binding software to hardware
| Parent link: | Язык и мировая культура: взгляд молодых исследователей: сборник материалов XV Всероссийской научно-практической конференции, г. Томск, 24-27 апреля 2015 г./ Национальный исследовательский Томский политехнический университет (ТПУ) ; под ред. Н. А. Качалова [и др.].— , 2016 Ч. 3.— 2016.— [С. 52-56] |
|---|---|
| 第一著者: | |
| 団体著者: | |
| その他の著者: | |
| 要約: | Заглавие с титульного экрана Information security is one of the most important sphere in Cybernetics. And for Russia this problem is state-of-the-art because of the wide-spread internet piracy and a huge number of hackers. This article explores the commonest ways to protect software using binding to hardware, with a focus on the main approaches to a collection of data from hardware and ways of data processing. As a possible method of solution it is accepted to collect data from main parts of hardware using .Net Framework and further process it using hash-function. The preliminary results reveal that standard facilities of .Net Framework and programming language C# allows gathering information from hardware in simple way. Thus, as a result of research the special software for getting protection code was developed. |
| 出版事項: |
2016
|
| 主題: | |
| オンライン・アクセス: | http://earchive.tpu.ru/handle/11683/32397 |
| フォーマット: | 電子媒体 図書の章 |
| KOHA link: | https://koha.lib.tpu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=620320 |
MARC
| LEADER | 00000naa2a2200000 4500 | ||
|---|---|---|---|
| 001 | 620320 | ||
| 005 | 20250522152606.0 | ||
| 035 | |a (RuTPU)RU\TPU\conf\18794 | ||
| 035 | |a RU\TPU\conf\18793 | ||
| 090 | |a 620320 | ||
| 100 | |a 20160923d2016 k y0rusy50 ba | ||
| 101 | 0 | |a eng | |
| 102 | |a RU | ||
| 105 | |a y z 101zy | ||
| 135 | |a drgn ---uucaa | ||
| 181 | 0 | |a i | |
| 182 | 0 | |a b | |
| 200 | 1 | |a A researching of the process of binding software to hardware |f A. Yu. Piletskaia, Yu. V. Kobenko | |
| 203 | |a Текст |c электронный | ||
| 300 | |a Заглавие с титульного экрана | ||
| 320 | |a [Библиогр.: с. 56 (4 назв.)] | ||
| 330 | |a Information security is one of the most important sphere in Cybernetics. And for Russia this problem is state-of-the-art because of the wide-spread internet piracy and a huge number of hackers. This article explores the commonest ways to protect software using binding to hardware, with a focus on the main approaches to a collection of data from hardware and ways of data processing. As a possible method of solution it is accepted to collect data from main parts of hardware using .Net Framework and further process it using hash-function. The preliminary results reveal that standard facilities of .Net Framework and programming language C# allows gathering information from hardware in simple way. Thus, as a result of research the special software for getting protection code was developed. | ||
| 461 | 1 | |0 (RuTPU)RU\TPU\conf\18617 |t Язык и мировая культура: взгляд молодых исследователей |o сборник материалов XV Всероссийской научно-практической конференции, г. Томск, 24-27 апреля 2015 г. |o в 3 ч. |f Национальный исследовательский Томский политехнический университет (ТПУ) ; под ред. Н. А. Качалова [и др.] |d 2016 | |
| 463 | 1 | |0 (RuTPU)RU\TPU\conf\18634 |t Ч. 3 |v [С. 52-56] |d 2016 | |
| 610 | 1 | |a труды учёных ТПУ | |
| 610 | 1 | |a электронные ресурсы | |
| 610 | 1 | |a программное обеспечение | |
| 610 | 1 | |a оборудование | |
| 610 | 1 | |a информационная безопасность | |
| 610 | 1 | |a кибернетика | |
| 610 | 1 | |a программирование | |
| 700 | 1 | |a Piletskaia |b A. Yu. | |
| 701 | 1 | |a Kobenko |b Yu. V. |c linguist |c Professor of Tomsk Polytechnic University, doctor of Philology |f 1977- |g Yury Viktorovich |3 (RuTPU)RU\TPU\pers\34000 | |
| 712 | 0 | 2 | |a Национальный исследовательский Томский политехнический университет |c (2009- ) |9 26305 |
| 801 | 2 | |a RU |b 63413507 |c 20160929 |g RCR | |
| 850 | |a 63413507 | ||
| 856 | 4 | |u http://earchive.tpu.ru/handle/11683/32397 | |
| 942 | |c BK | ||