Soft encryption and hard encryption

Source: Internet
Author: User

Soft encryption is a software protection method that does not require additional hardware. Generally, the serial number or license file is used for authorization. Generally, the soft encryption scheme is bound with computer software and hardware features, such as CPU, BIOS, hard disk, MAC, computer name, and user name. The concept of soft encryption is actually inaccurate. It is often bound to computer hardware features, but because no additional hardware device is used, it can be considered as a "soft encryption" solution.
Hard encryption refers to the software protection technology that requires additional hardware devices. Currently, the main hard encryption solution is the encryption lock technology. General encryption locks and Smart Card encryption locks are divided into general encryption locks Based on the CPU used for encryption locks.
 
I. Soft Encryption
There are three methods to implement soft encryption:
The first method of soft encryption is that software authorization is not bound to computer hardware features. There are two types of software authorization: one is to bind software information, such as a user name, it is generally used for individual user authorization. Second, it is not bound with any information. As long as the serial number or authorization file is verified, the software can be used on any machine and is usually used for batch authorization by major accounts. Authorization verification methods include direct comparison and algorithm transformation comparison.
The second method of soft encryption is software authorization and computer hardware feature binding. The bound computer hardware features include the CPU serial number, BIOS serial number, hard disk serial number, and nic MAC address. The license file for this protection method is generated after the computer hardware features are obtained, and the authorized server binds the hardware features with the authorized content. This encryption method bound to computer hardware is difficult to crack if the public/private key protection mechanism similar to the online banking digital certificate is used.
The third method of soft encryption is to bind software authorization to an authorized server on the Internet. It is also called cloud authorization. Cloud authorization has a high security intensity, or even higher than encryption locks. This is because the encryption lock cannot be tracked and monitored after the software is sold. Hackers can take any long time to crack it and copy it in large quantities once it is cracked. The authorized server has a firewall and sophisticated intrusion detection technology. Any illegal access and exceptions can be monitored, and the security is much higher. Server authorization also facilitates the tracking and management of authorization software, cracking remediation, and upgrade and update.
The advantages of soft encryption are:
Without hardware and logistics, software can be released electronically.
Ease of management and maintenance helps improve authorization efficiency and improve user experience
This allows you to easily implement "try-and-buy" and "purchase on demand" to create more profit models for developers.
Reduce the overall software protection, distribution and management costs of software developers and improve their competitiveness
 
Ii. Hard Encryption
Hard encryption means that the software to be protected is bound to the hardware encryption lock. Some important information, such as encryption keys, sensitive data, authorization files, and custom algorithms, is stored in the encryption lock. The encryption locks are classified by the interface type, including the parallel port and USB port. The CPU type is also divided into two types, one is the single chip microcomputer for CPU, and the other is the smart card chip for CPU. Single-Chip Microcomputer Hardware is prone to cracking and replication, so the high-end encryption locks are increasingly using smart card chips as CPUs to prevent hardware from being cracked. However, the number of smart card encryption locks is also increasing. First, the chip analysis technology and instruments are becoming more and more advanced. Second, the smart card program should be handed over to the chip factory for manufacturing, in this phase, the program may be leaked, resulting in mass replication.
Although hardware encryption has a high security intensity, it also has many disadvantages:
It is applicable to traditional one-time permanent authorization and cannot be used for trial and On-Demand Purchase.
Hardware brings about the cost of production, initialization, logistics, installation and maintenance.
Unable to implement Internet-based e-publishing
The installation of drivers and client components and additional hardware devices affect the user experience.
Difficult to upgrade, track, and manage after-sales
 

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.