final13 software piracy controlling mechanism
TRANSCRIPT
Software Piracy Controlling Mechanism
Guided By• Prof. Tabassum Ara
• Dr. TC. Manjunath
Proposed By• J Sharon Beulah 1HK09CS022
• Kumar Gaurav1HK09CS028
• Rahul M Patil1HK09CS038
• Ravi Roshan1HK09CS043
1
Need For The System
• Software developing companies can integrate this piracy control module in their programs/product to control the software piracy and hence prevent unnecessary loss and increase their profit.
• To keep track of number of active users of the software and their details.
• To provide the users with official updates regularly.
2
Primary Objective
To control the piracy of the software by preventing the user to use the key that is not licensed to him. And hence help the companies to increase their revenue.
3
System Architecture
4
COMPUTER
OS SERIAL KEY MAC ADDRESS RAM SIZE
KEY GENERATOR ACTIVATION KEY
PID
Work Done So Far
5
• Problem has been Identified• Solution has been Proposed• Learnt about .NET platform• Learnt about developing windows applications using Visual
Studio 2012• Learnt about Windows Registry
Work To Be Done
6
Algorithms have to be developed to perform the following tasks:• To generate PID using of system parameters. • To generate the an activation key from the PID.• Store encrypt the activation key and store it in windows
registry.• Inform the developer if any user is trying to register the
software using duplicate activation key.
• It only runs on windows platform and cannot run on other Operating Systems(OS) like Linux, Mac OS.
• User needs administrator privileges to run this software.• The system should have .NET Framework version 3.5 or
above to run the software.• The piracy control module can only be integrated in
software that is built on the .NET platform.
Limitations
7
• Once the software is installed on a system the user can create an account with a username and password of his choice.
• The software will generate a PID which has to be sent to the developer/distributer.
• After completing payment for the software the user will receive an activation key which is generated using their system PID.
8
Expected Deliverables
Reference
9
• Business Software Alliance (BSA) Global Software Piracy Study• Software & Information Industry Association (SIIA)