Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
laboratory.doc
Скачиваний:
6
Добавлен:
01.07.2025
Размер:
5.68 Mб
Скачать

10.1 Software and hardware for generating key information. 10.2 Protecting programs from unauthorized use via usb-key and the software manufacturer.

The objective of the work: Read the HASP USB key device. The software supplied with the device. Learning to protect the program from unauthorized use by a software producer HASP keys.

Brief theoretical information. To effectively use the HASP protection system you should be familiar with the principles of its operation and the terminology set out in this chapter. If you intend to use the NetHASP key, you should also read Chapter 4 to review the principles of work and NetHASP terminology.

Keys HASP. HASP keys are of the following types: local key.

Local key - HASP keys is designed for stand-alone (not part of the network) computer. This category includes all the keys except for the NetHASP. Demo keys. Each HASP Developer Kit includes a demo HASP key (also demo key). Demo keys have all the capabilities of their class keys, but have a standard developer demo code (see. P. 38). Use the demo keys for software protection can not, because they are available to anyone. These options are best used for the HASP protection system evaluation. HASP Memory.

All the HASP keys, except HASP4 without memory are rewritable memory. Using the HASP memory, you can do the following: controlling access to various software modules and software packages. Assign each user a unique number of your programs. Donating Program for rent and distribute their demo version with a limited number of starts. Keep key passwords, fragments of program code, variables, and other important information.

Key Type Memory Size.

HASP4 without memory No HASP4 M1 HASP4 M4 112 bytes 496 bytes 512 bytes HASP4 Time All keys NetHASP 496 bytes

HASP Identifier.

Each HASP key memory has a unique identification number (ID- Number), or an identifier that is available for the control of protected applications. The identifiers allow you to distinguish between the application user. Checking the program HASP ID, you can take different actions depending on the availability of a specific key. You can not order HASP keys with predefined identifiers. They are appointed by the pseudo-random manner during the production of keys, which guarantees protection against replay.

Protection Methods HASP.

HASP system allows to protect software in two different ways: Utility HASP Envelope (envelope) HASP API (Application Programming Interface - an application program interface) HASP envelope Using the HASP Envelope is the main method of protection. The executable file is a protective soft shell, file encoding, and has properties such as the recognition of key and Anti debugging. The shell does not allow the file is executed without a HASP key.

Protection shell is made quickly and without too much effort. At the same time, it is sufficiently reliable, because it makes debugging and disassembly of your programs is almost impossible. To protect the shell source code does not require programming.

The software user interface HASP (API) If you have the source code of the program, which must be protected, you can dock it to the module HASP API - an object file or DLL. Since the API module itself is encrypted and protected, the method provides a high degree of protection. API allows you to access key

The order of execution of work

Installing the software HASP

  1. In the list of computer equipment to ensure that there are no devices of Aladdin (eToken, HASP). If these devices are present in the equipment list - to remove them.

  2. Remove, if present, the software eToken and HASP.

  3. Connect to Centurion computer, open the Resource Q and enter the setup directory.

  4. Run the setup.exe program.

  5. Follow the instructions of the setup program to install software on your computer HASP system. Install the components marked below.

6. Connect the HASP USB connector to the computer. a) In the case of correct installation of electronic key HASP must light indicator light. b) If the LED does not light up, the device driver update manually. 7. The computer equipment list to find a connected device.

Using the HASP software

  1. Run this program Aladdin DiagnostiX to test electronic HASP key.

2. Run the demo program - HASP Demo for Win16. Describe the operation of the program 3. Start the demonstration program - HASP Demo for Win32. Describe the operation of the program

The protection of applications using the HASP.

Using HASP Envelope tool to protect your favorite applications from unauthorized launch. Authorized run - if the HASP key in the system. Neanktsionirovanny start - in the absence of the HASP system.

1. Create a folder: Protected applications

2. Copy it 3 executable file, such as the calculator program - calc.exe

3. Use the HASP Envelope to protect the selected programs from unauthorized launch.

4. Run the program.

5. Close the program

6. Remove the USB connector from the HASP

7. Run the protected program.

Try several options to protect programs with a single key HASP

5. Test Questions

1. Share this utility HASP Envelope

2. Share this utility HASP test

3. Share this utility HASPEdit

4. With such an identifier HASP

5. How to encrypt and decrypt the data to detect the HASP

List of recommended references

  1. June J. Parsons and Dan Oja, New Perspectives on Computer Concepts 16th Edition - Comprehensive, Thomson Course Technology, a division of Thomson Learning, Inc Cambridge, MA, COPYRIGHT © 2014.

  2. Lorenzo Cantoni (University of Lugano, Switzerland) James A. Danowski (University of Illinois at Chicago, IL, USA) Communication and Technology, 576 pages.

  3. Craig Van Slyke Information Communication Technologies: Concepts, Methodologies, Tools, and Applications (6 Volumes). ISBN13: 9781599049496, 2008, Pages: 4288

  4. Brynjolfsson, E. and A. Saunders (2010). Wired for Innovation: How Information Technology Is Reshaping the Economy. Cambridge, MA: MIT Press

  5. Kretschmer, T. (2012), "Information and Communication Technologies and Productivity Growth: A Survey of the Literature", OECD Digital Economy Papers, No. 195, OECD Publishing.

Laboratory work 11

Protecting programs from unauthorized use via USB-key and developer tools.

  1. The objective of the work:

Read the HASP USB key device. The software supplied with the device. Learning to protect the program from unauthorized use by a developer tools

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]