Abstract: As we know in today"s IT organization, there is a big problem make a house in the mind of big companies is to stop piracy of their softwares at any cost. But we don"t have a solution untill I have created a solution by creating this application. This application is a windows based application which was developed on .net platform by using visual studio 2008. It was created by using visual basic 2008 windows application on .net framework 2.0. By using some machine values it creates a unique machine generated code every time it installed on a machine. This suggest that this application create a unique machine code whether it was installed on same machine or different machine simultaneously. It uses three level encryption mode to encrypt the generated value, so that it is impossible to identify the original generated value for intruders.
TITLE
As the title of application 'Software Security Decrpter' suggest that it can be use to stop piracy.
FIELD OF INVENTION
This application relates to the computer or a computer program which can be used to create a pirated free software.
BACKGROUND OF THE INVENTION
In today's IT organization, there is a big problem of software piracy which was impossible to stop. Let us consider an example Microsoft Corporation which is a leader in software industry stii! facing the same problem of software piracy. Latest news regarding software piracy was that, there is no way untill I have found a solution by creating this application.
DESCRIPTION OF THE INVENTION
REQUIREMENTS-
1. It require administrator account to install.
2. It was designed to run on Win_2K or later especially.
3. It require 1 MB of free hard disk space(an additional 25 MB is needed during installation only to accommodate the initial setup files, if needed).
4. It require .Net Framework 2.0.
5. It require Intel Pentium or better processor.
6. It require Internet Explorer 5.0 or later.
Software Description-
AME ONS SJZE CLIENT PLATFORM LANG
SSD Win 2k or later 0.5 MB OWN .NET VB.NET
INTRODUCTION
SSD is an application which can be use to protect any software from piration. It displays a startup form which was use to display the unique machine generated value in form of numeric or alphabets which display on the textbox. This unique code has been generated using three steps -
The highlighted area shown in the figure display all the View Name present in the selected database of sql server.
FIGURE-8
The highlighted area shown in the figure display all the Structure Name present in the selected database of sql server.
FIGURE-9
The highlighted area shown in the figure display the code behind the selected View and Structure Name present in the selected database of sql server.
FIGURE-10
The highlighted area shown in the figure display all the total number of Tables, Procedures, Views & Structures present in the selected database of sql server.
1. In first step there is a random number generation occur in the application.
2. In the second step the generated number in alphabet or numeric was encrypted.
3. In the last step again the encypted value was joined with a unique machine value and encypted again.
After that the main form of the application will be shown which contains the all information about Sql Server. This application deals with the information regarding Server Name, Database Name, Table Name, Procedure Name, Structure Name, View Name. It also displays the code behind all the user defined or built-in procedures and views present in the database which was selected by the user. The no of all the tables, procedures, views and structures present in the selected database shown in separate textboxes display on the user interface. This application was developed on .net platform by using visual basic 2008 on .net framework 2.0. Due to that this application utilizes the features of .net like inheritance, reusability and interoperability. All the code behind the application has been tested under by applying all extreme conditions in such a manner there is no chance of exception will occur at runtime.
DESCRIPTION OF DRAWINGS
FIGURE-1
This figure use to display the information regarding trial period, activation key and registration information.
FIGURE-2
This figure displays all the information regarding Server Name, Database Name, Table Name, Procedure Name, View Name, Structure Name and their coding.
FIGURE -3
The highlighted area shown in the figure display the name of Server Name installed on the machine.
FIGURE-4
The highlighted area shown in the figure all name of the Database Name present in sql server.
FIGURE-5
The highlighted area shown in the figure display all the Table Name present in the selected database of sql server.
FIGURE -6
The highlighted area shown in the figure display all the Procedure Name present in the selected database of sql server.
FIGURE-7
WE CLAIM
1. This application is almost impossible to pirate.
2. This application has been created in such a manner that can be easily attached with other to make it pirate free.
3. This application generates a unique key on every installation.
4. This application displays a machine generated and encrypted code on the user interface
5. This application uses three level encryption to create a unique machine code.
6. This application also decodes this machine code by using a decrypter which in turn creates a unique product key for the user machine.
7. This application match the both encrypted and decrypted machine code using the same algorithm.
8. Last but not the least we can use this application procedure to make software which is impossible to pirate.
| # | Name | Date |
|---|---|---|
| 1 | 1103-del-2010-Form-9-(21-05-2010).pdf | 2010-05-21 |
| 1 | 1103-del-2010-Return FER-(08-03-2018).pdf | 2018-03-08 |
| 2 | 1103-del-2010-form-2.pdf | 2011-08-21 |
| 2 | 1103-DEL-2010-AbandonedLetter.pdf | 2018-02-15 |
| 3 | 1103-del-2010-form-18.pdf | 2011-08-21 |
| 3 | 1103-DEL-2010-FER.pdf | 2016-12-14 |
| 4 | 1103-del-2010-form-1.pdf | 2011-08-21 |
| 4 | 1103-del-2010-abstract.pdf | 2011-08-21 |
| 5 | 1103-del-2010-claims.pdf | 2011-08-21 |
| 5 | 1103-del-2010-drawings.pdf | 2011-08-21 |
| 6 | 1103-del-2010-correspondence-others.pdf | 2011-08-21 |
| 6 | 1103-del-2010-description (complete).pdf | 2011-08-21 |
| 7 | 1103-del-2010-correspondence-others.pdf | 2011-08-21 |
| 7 | 1103-del-2010-description (complete).pdf | 2011-08-21 |
| 8 | 1103-del-2010-claims.pdf | 2011-08-21 |
| 8 | 1103-del-2010-drawings.pdf | 2011-08-21 |
| 9 | 1103-del-2010-abstract.pdf | 2011-08-21 |
| 9 | 1103-del-2010-form-1.pdf | 2011-08-21 |
| 10 | 1103-del-2010-form-18.pdf | 2011-08-21 |
| 10 | 1103-DEL-2010-FER.pdf | 2016-12-14 |
| 11 | 1103-del-2010-form-2.pdf | 2011-08-21 |
| 11 | 1103-DEL-2010-AbandonedLetter.pdf | 2018-02-15 |
| 12 | 1103-del-2010-Return FER-(08-03-2018).pdf | 2018-03-08 |
| 12 | 1103-del-2010-Form-9-(21-05-2010).pdf | 2010-05-21 |