作者: Christian Bielefeldt Hicks , Peter Janssen Creath
DOI:
关键词: Software system 、 Software development 、 Software 、 User requirements document 、 Key generator 、 User modeling 、 Computer science 、 User interface design 、 Key (cryptography) 、 Database
摘要: Controlling unauthorized access to software distributed a user by vendor. A verification key is generated product generator and either embedded in the prior distribution or packaged with as self-installing package. The includes public key. combination of create distributable which user. installs on computer system protected software. To obtain key, inputs identifying information, may be for group, sent generator. converts information numeric representation then generates, signing private returned Using verifier verifies relationship between determine an level every time run ensure continued protection after installation.