Electronic keys as a method of software protection from unauthorized use
Автор: Vasilenko Konstantin Alexandrovich, Zolkin Alexander Leonidovich, Lyapunov Vitaliy Nikolaevich, Semeykin Vladislav Andreevich
Журнал: Инфокоммуникационные технологии @ikt-psuti
Рубрика: Технологии компьютерных систем и сетей
Статья в выпуске: 2 т.19, 2021 года.
Бесплатный доступ
The article describes the principles of operation, types of technical implementation and methods of use of electronic keys. The main Russian manufacturers of electronic keys have been considered and the features of their products have been identified. It is necessary to take into account the correct configuration and support of hardware and software for protection of information while ensuring proper information security of the company, in order to avoid losses, in order to eliminate the risks of obtaining an electronic key by an intruder. Taking into account the fact that electronic keys are mostly referred to hardware methods of software protection from hacking, there are improved crossplatform hardware and software solutions. Their existence is driven by the fact that the developers who design electronic keys also provide a software development kit (SDK) for them. Companies have the ability to implement all means of protecting electronic keys in their own software products using the SDK (such as development tools, protection of software code fragments, development of automatic protection tools, and more).
Electronic keys, smart cards, information protection methods, software, unauthorized access, intruder, server, encrypted code, activation keys, identification Share:
Короткий адрес: https://sciup.org/140255605
IDR: 140255605