透過您的圖書館登入
IP:3.14.15.223
  • 學位論文

軟體安全多重保護策略之研究與實現 - 以太陽能板最佳化安裝查詢系統為例

Research and Implementation of Protection Strategies for Software System Security – A Case Study of Optimal Solar Panel Installation Supporting System

指導教授 : 黃國鼎
共同指導教授 : 謝仕杰
若您是本文的作者,可授權文章由華藝線上圖書館中協助推廣。

摘要


目前市面上軟體保護方法眾多,舉凡程式碼混淆、軟體加殼、Keypro與硬體加密、註冊碼應用與網路啟用等,不勝枚舉,算是當今軟體保護與破解的攻防戰。軟體的每一種保護都擁有著其獨特技術與學問,但是軟體保護研究如果沒有正確的方向,研究人員將花費大量時間和精力走著忐忑軟體保護之路。 最近,資料隱藏技術的研究及探討相當熱門。不管是空間域或是頻率域的圖形、動態影像、音頻上,都是有相當多的研究人員在研究,相關的文獻更是有助實做於軟體安全的保護措施。 本論文將研究與實現資料隱藏技術應用於太陽能板最佳化安裝查詢系統軟體安全保護策略,並使用電腦硬體資訊與雜湊演算法來達到多重驗證保護。文中應用太陽能板最佳化安裝查詢系統軟體本身的商標或軟體影像圖片,藏入經過雜湊演算法處理的驗證訊息。當太陽能板最佳化安裝查詢系統軟體在要求驗證時,啟用資料隱藏演算法擷取商標或軟體影像圖片中的驗證訊息,並與授權過的使用者電腦硬體資訊以軟體隨機時間交互驗證。此外,將驗證結果將儲存於遠端資料庫備份記錄。軟體本身應用定期自動更新以利版本與授權追蹤,系統管理者方能有效管理軟體序號及更新演算法程式與太陽能板安裝方位、傾角之資料庫,來達到太陽能板最佳化安裝查詢系統軟體的多重保護方案。

並列摘要


Currently on the market the software protection method of many that whenever code confusion, software packers, Keypro and hardware encryption, License applications and network enabled, and many others, considered today's software protection and break the battle. Each door protection software have a unique technology and knowledge, but the protection of the software without the right direction, researchers will spend considerable time and effort to protect the road walk perturbed software.Today, data hiding techniques and research literature of a very popular, either spatial domain or frequency domain, graphics, video, audio, all are a considerable number of researchers in the study of relevant literature will also help to do in the real Software security protection measures. This article describes the data hiding technology to optimize the installation of solar panels, check system software security strategies, and use the computer hardware information and hash algorithms to achieve multiple authentication protection. Paper applications to install solar panels optimize the software's own trademark search system or software image picture, hiding the hash algorithm after processing the authentication message. When the solar panel installation queries optimized system software in the requirements validation, enable the interception of information hiding algorithm trademarks or software in the image verification message, and ever users and licensing information to software, computer hardware random time mutual authentication and to verify the results stored in the remote database, and software version will automatically be updated regularly, the system administrator to track software serial numbers and can only provide for the latest and efficient installation of solar panel orientation and inclination, to achieve optimal solar panels query system software installed on multiple protection programs.

參考文獻


[1] Chen-Wei Kuo, Si-Hao Du, Fuh-Shyang Juang, Yu-Yu Ho, “Solar Cell Module Installation Optimization and Evaluation of Power Conversion Simulation”, Power Electronics and Drive Systems, 2009. PEDS 2009. International Conference on.
[3] Andrew D. Birrell, “An Introduction to Programming with C# Threads,” May. 2005.
[4] Don Syem, “ILX: Extending the .NET Common IL for Functional Language Interoperability,” Computer Science, vol. 59, no. 6, pp. 53-72, Nov. 2001.
[7] Xiaoyun Wang, Hongbo Yu, “How to Break MD5 and Other Hash Functions,” EUROCRYPT. ISBN 3-540-25910-4, 2005.
[8] RONALD L. RIVEST, The MD4 Message Digest Algorithm, Laboratory for Computer Science, 1995.

延伸閱讀