梦幻西游推广员升级:谁能帮我翻译一下,注明:最好不要用白痴的软件

来源:百度文库 编辑:高校问答 时间:2024/05/11 12:47:18
在信息技术迅猛发展的今天,出现了许多优秀的软件,但许多软件却别他人无偿盗用,严重的危害了软件开发商的利益。因此为了保护知识产权,给软件加密就非常必要。
目前市场上软件的加密方法主要有:软加密、钥匙盘加密、加密卡和软件狗加密。而在众多加密软件中,能取各家之长的就是软件狗。
软件加密狗是由一个插在计算机外部的并行接口上的小盒子和一套开发的工具软件组成的,它起到保护商品软件知识产权的作用。研究各种加密狗内部的电路及加密算法、程序是软件加密的一个分支。提出一种智能型软件加密狗的设计及制作。
本设计主要研究的是利用彩虹公司的“微狗”,针对多种应用需求,设计合理的软件加密方案与算法,对软件进行加密保。并简单介绍了软件加密的种类,进行比较分析,还有软件加密狗的几个发展阶段,具体说明了加密狗的软硬件原理。而且分析加解密技术,并据此提出了一系列反破解措施。
软件加密发展到现在,已经经历了四代。
第一代软件狗信号加密变换作用的器件,最多只简单采用一些电阻、二极管等,检查方法比较简单,很容易被人解密。
第二代软件狗采用了低功耗TTL、COMS等逻辑影元件,在电路上作了一些加密工作,检察时也要比第一代软件狗多一道手续,解密的难度自然也增加了。
第三代加密锁,即所谓”可编程”的加密锁。采用了PAL、PEEL、GAL等逻辑器件。
第四代软件够在第三代软件狗基础上,加入一个单片机芯片,如PIC16C5X。此芯片中存有特定的算法程序,可将读出的密钥数据进行加密变换,以对抗逻辑分析仪。
可以说,软件狗发展到第四代,已经非常成熟了。在此技术上,各软件狗研制公司又加入自己的电路设计,形成了各自的产品特色。

很难吧,因为专业性很强,所以翻译软件的错误很多,也可能是我没有找到好的,我英语差的可怜,软件翻译出来的我都不会修改,帮帮我吧
不是我不给分啊,是我穷啊,嘿嘿

你就给三十分还要别人不用软件翻译,谁也不干啊,你自己也知道要翻译这末长一篇计算机专业外语那还不得大半天啊!肯定是论文的摘要吧!~哈哈,我们都是用软件翻译了然后自己润下色就差不多了!你用软件翻译出来发给我我给你修改好了!我语文很好的,这次论文答辩我得了92,我也是写的计算机方面的!~

Rapid development in it today, a number of outstanding software, but many others charge of the software has other serious crimes against the interests of software developers. Thus in order to protect the intellectual property rights to encryption software is very necessary. Current market software encryption key : soft encryption, disk encryption keys, encryption cards and encryption software dog. In many encryption software, to get families is the long software dog. Jiamigou software is installed in the computer by a parallel interface on the outside and a small box of software development tools, which play a role in the protection of software intellectual property. Jiamigou internal circuits and the study of the various encryption algorithms, encryption software is a branch of the procedure. Make a intelligent software Jiamigou design and production. The major design study is the use of the company's Rainbow "- dog" against a variety of application needs, design programmes and reasonable software encryption algorithms for encryption software to protect. And a brief description of the types of encryption software, a comparative analysis, there are several software Jiamigou development stage, the Jiamigou specify the hardware and software principles. And analysis and decryption technology, and accordingly made a series of anti-bound measures. Encryption software development to the present, has experienced four generations. First generation signal encryption software dog role of the device used up simply adopting some resistance, diode, and relatively simple method of easily being declassified. Second generation software used dogs TTL low consumption, such as logic coms film components in circuit made some encryption, the prosecution also to more than one generation software dog procedures decryption difficulty naturally increased. 3G encryption locks, the so-called "programmable" encryption locks. Introduced Pal, Peel, Gal, and other logic devices. Fourth-generation software in the third-generation software dog enough basis to a Chanpianji chips, such as PIC16C5X. The chip, the algorithms are specific procedures may be read out key data encryption used to counter the logic analyser. It can be said that dogs to the fourth generation of software has been very mature. In this technology, the software development companies have also joined their dog circuit design, a feature of their products.

Rapid development in it today, a number of outstanding software, but many others charge of the software has other serious crimes against the interests of software developers. Thus in order to protect the intellectual property rights to encryption software is very necessary. Current market software encryption key : soft encryption, disk encryption keys, encryption cards and encryption software dog. In many encryption software, to get families is the long software dog. Jiamigou software is installed in the computer by a parallel interface on the outside and a small box of software development tools, which play a role in the protection of software intellectual property. Jiamigou internal circuits and the study of the various encryption algorithms, encryption software is a branch of the procedure. Make a intelligent software Jiamigou design and production. The major design study is the use of the company's Rainbow "- dog" against a variety of application needs, design programmes and reasonable software encryption algorithms for encryption software to protect. And a brief description of the types of encryption software, a comparative analysis, there are several software Jiamigou development stage, the Jiamigou specify the hardware and software principles. And analysis and decryption technology, and accordingly made a series of anti-bound measures. Encryption software development to the present, has experienced four generations. First generation signal encryption software dog role of the device used up simply adopting some resistance, diode, and relatively simple method of easily being declassified. Second generation software used dogs TTL low consumption, such as logic coms film components in circuit made some encryption, the prosecution also to more than one generation software dog procedures decryption difficulty naturally increased. 3G encryption locks, the so-called "programmable" encryption locks. Introduced Pal, Peel, Gal, and other logic devices. Fourth-generation software in the third-generation software dog enough basis to a Chanpianji chips, such as PIC16C5X. The chip, the algorithms are specific procedures may be read out key data encryption used to counter the logic analyser. It can be said that dogs to the fourth generation of software has been very mature. In this technology, the software development companies have also joined their dog circuit design, a feature of their products.

Rapid development in it today, a number of outstanding software, but many others charge of the software has other serious crimes against the interests of software developers. Thus in order to protect the intellectual property rights to encryption software is very necessary. Current market software encryption key : soft encryption, disk encryption keys, encryption cards and encryption software dog. In many encryption software, to get families is the long software dog. Jiamigou software is installed in the computer by a parallel interface on the outside and a small box of software development tools, which play a role in the protection of software intellectual property. Jiamigou internal circuits and the study of the various encryption algorithms, encryption software is a branch of the procedure. Make a intelligent software Jiamigou design and production. The major design study is the use of the company's Rainbow "- dog" against a variety of application needs, design programmes and reasonable software encryption algorithms for encryption software to protect. And a brief description of the types of encryption software, a comparative analysis, there are several software Jiamigou development stage, the Jiamigou specify the hardware and software principles. And analysis and decryption technology, and accordingly made a series of anti-bound measures. Encryption software development to the present, has experienced four generations. First generation signal encryption software dog role of the device used up simply adopting some resistance, diode, and relatively simple method of easily being declassified. Second generation software used dogs TTL low consumption, such as logic coms film components in circuit made some encryption, the prosecution also to more than one generation software dog procedures decryption difficulty naturally increased. 3G encryption locks, the so-called "programmable" encryption locks. Introduced Pal, Peel, Gal, and other logic devices. Fourth-generation software in the third-generation software dog enough basis to a Chanpianji chips, such as PIC16C5X. The chip, the algorithms are specific procedures may be read out key data encryption used to counter the logic analyser. It can be said that dogs to the fourth generation of software has been very mature. In this technology, the software development companies have also joined their dog circuit design, a feature of their products.

俺绝对不是抄楼上的!!!!