Contact at mumbai.academics@gmail.com or 8097636691
Responsive Ads Here

Tuesday, 13 February 2018

Enhanced License Maker For Software Protection(2011)

Enhanced License Maker For Software Protection(2011)

ABSTRACT:
The project aims at securing the software given to the customers such that the application runs only for particular count, up to a date, number of days starting from the installation date, runs in one machine. The application if copied to other system will not work.
During first run, a license key is generated based on the Network MAC address which is unique in nature and the disk drive’s serial number. The key is encrypted using Triple DES (Data Encrypted Standard) and stored in Windows Registry. In successive runs, the application looks up the value in the registry and may or may not continue.
Thus the application aims in protecting the software piracy from one customer to another.
Project Introduction
The main objective of this project is securing the software given to the customers such that the application runs only for particular count, up to a date, number of days starting from the installation date, runs in one machine. The application if copied to other system will not work.
Overview
The project “Enhanced License Maker for Software Protection” is designed using Microsoft Visual Studio.Net 2003 as front end and Microsoft SQL Server 2000 as back end which works in .Net framework version 1.1. The coding language used is Visual Basic .Net.
The project aims at securing the software given to the customers such that the application runs only for particular count, up to a date, number of days starting from the installation date, runs in one machine. The application if copied to other system will not work.
During first run, a license key is generated based on the Network MAC address which is unique in nature and the disk drive’s serial number. The key is encrypted using Triple DES (Data Encrypted Standard) and stored in Windows Registry. In successive runs, the application looks up the value in the registry and may or may not continue.
Thus the application aims in protecting the software piracy from one customer to another.
Existing System:
In Existing system, the software is not protected by giving proper security. Users can crack or hack the software and use the software unlimited no of times. Software Works by uninstalling the older or trial version or by editing the cleaning the registry
Proposed System:
In Proposed system, the software is fully protected by giving proper security permissions. Users can’t crack or hack the software and use the software unlimited no of times. This is don’t the editing values in registry and getting details about MAC Address, System Drive Information and etc. Software does not work by uninstalling the older or trial version or by editing and cleaning the registry
Modules and its Description
There are 4 modules in this project. They are
1.    Generate License
2.    Getting MAC & Other Addresses
3.    Reading & Writing Registry
4.    Verifying Settings
1.     Generate License
In the generate license module, we can give the installation date, number of days to be valid and end of day. The above details are to be stored in to database at the same time in database also. This information is checked at our protected software running.
2.    Getting MAC & Other Address
In the second module, we are checking the MAC Address and IP Addresses for verifying system registry.
The MAC address is a unique value associated with a network adapter. MAC addresses are also known as hardware addresses or physical addresses. They uniquely identify an adapter on a LAN. MAC addresses are 12-digit hexadecimal numbers (48 bits in length).
By convention, MAC addresses are usually written in one of the following two formats:     MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SSThe first half of a MAC address contains the ID number of the adapter manufacturer. These IDs are regulated by an Internet standards body (see sidebar). The second half of a MAC address represents the serial number assigned to the adapter by the manufacturer. In the example, 00:A0:C9:14:C8:29The prefix 00A0C9indicates the manufacturer is Intel Corporation.
3.    Reading & Writing Registry
In the 3rd module we are accessing the system registry for getting the protection information. This information is verified at the time software running.
4.    Verifying Setting
The Registry has a hierarchal structure, like the directories on your hard disk. Each branch (denoted by a folder icon in the Registry Editor, see below) is called a Key. Each key can contain other keys, as well as Values. Each value contains the actual information stored in the Registry. There are three types of values; String, Binary, and DWORD - the use of these depends upon the context. 
Hardware Requirements
•         SYSTEM                    : Pentium IV 2.4 GHz
•         HARD DISK              : 40 GB
•         RAM                           : 512 MB
Software Requirements
•         Operating system     : Windows XP Professional
•         Technology               : Microsoft Visual Studio .Net 2008
•         Coding Language   : VB.Net
•         Back End                   : SQL Server 2005

No comments:

Post a Comment