跳到主要內容

臺灣博碩士論文加值系統

(44.210.151.5) 您好!臺灣時間:2024/07/13 10:23
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:吳俊霆
研究生(外文):Jiun-Ting Wu
論文名稱:以嵌入式系統實作軟體元件/服務載具之研究
論文名稱(外文):The Implementation of Software Component/Service Carriers Using Embedded System
指導教授:林志敏林志敏引用關係
指導教授(外文):Jim-Min Lin
學位類別:碩士
校院名稱:逢甲大學
系所名稱:資訊工程所
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2004
畢業學年度:92
語文別:中文
論文頁數:91
中文關鍵詞:防盜拷軟體載具網路服務SOAP嵌入式系統軟體保護
外文關鍵詞:Software ProtectionSOAPWeb ServiceEmbedded SystemSoftware
相關次數:
  • 被引用被引用:1
  • 點閱點閱:181
  • 評分評分:
  • 下載下載:29
  • 收藏至我的研究室書目清單書目收藏:1
台灣資訊產業的發展向來以硬體相關產業為主,並在國際上佔有一席之地,但軟體產業的發展,卻顯得積弱不振,因為軟體產品容易被盜拷與重製,造成軟體業者重大的損失,故為克服軟體拷貝的問題,本文提出將軟體硬體化的概念,透過硬體裝置不易被複製的特性,將軟體建置安裝於以嵌入式系統為基礎的軟體載具,並以系統機制保護軟體,以達到保護軟體不被盜拷的目的,並希望能藉由台灣在硬體產業上的優勢來帶動軟體產業的發展。
我們所提出的架構中,軟體系統的關鍵功能將建置安裝於嵌入式系統內,嵌入式系統將會搭配軟體共同販售,又因為嵌入式系統是屬於封閉性的系統,可以規劃成只提供特定介面供外界使用,故使用者將無法直接碰觸到軟體本身,使得將軟體系統拷貝的困難度上升,故能達到更好的軟體保護。
我們以限制嵌入式系統只能透過網路與使用者的電腦連接,使用者必須以遠端程序呼叫的方式才能使用存在於嵌入式系統中的軟體,為了讓軟體系統容易被使用與整合,本文採用SOAP做為軟體系統的介面。除此之外,也在嵌入式系統中規劃了額外的功能,以增加防盜拷軟體載具系統的附加價值,包括自動線上軟體更新服務與支援多樣化彈性收費機制。最後,本文將以一個簡易的資料庫系統,以及將wget套用在本文的架構中作為實驗系統,用來驗證設計的正確性與可行性。
Computer hardware plays an important role in Taiwan’s Information Technology (IT) industry. On the contrary, software industry in Taiwan is recessionary. Because of the software could be easily duplicated by copying software files. Software companies would get much loses due to the inefficiency of software protection mechanisms. In order to cope with the unauthorized software copy problem, we propose the concepts of making software into hardware device and protecting software through a whole computer system, so that the hardware devices would be hardly duplicated. We hope our proposed approach could be helpful to Taiwan’s software industry.
In the proposed architecture, the critical functions of a software system are executed in an embedded system. The software companies sell the software system together with the embedded system. Because embedded systems are of close system, users couldn’t directly touch software systems that embedded in it. Copying software system could thus be prohibited. So a software carrier using the embedded system could protect software well.
We could limit an embedded system to be connected to personal computers via Ethernet. Users utilize remote procedure calls to invoke a software system stored in the embedded system. To make the use and integration of software systems conveniently, the SOAP is provided as the interface of the embedded software systems. We also designed some value-added functions in the embedded system to facilitate proposed architecture the applicability. Additional functions, like the online automatic update service and diverse software billing mechanisms are also provided in the proposed architecture.
In this thesis, we also implement a copy-prohibit database system and applying a UNIX application – wget on a target embedded system to demonstrate the feasibility of our proposed approach.
致謝 i
摘要 ii
Abstract iii
目錄 v
圖目錄 vii
表目錄 viii
第一章 導論 1
第二章 相關研究 6
2.1 軟體產權保護之策略 6
2.2 軟體產權保護之方法 10
2.3 網路服務 (Web Services) 15
2.4 Jini Technology 20
2.5 軟體的計價機制 23
2.6 軟體更新的方式 26
2.7 智慧卡(Smart Card) 28
第三章 防盜拷軟體載具之設計考量 32
3.1 軟體服務介面標準 34
3.2 嵌入式系統之保護/安全機制 36
3.3 軟體使用之計價機制 39
3.4 自動線上更新機制 41
3.5 與嵌入式系統架構、實作技術有關的設計考量 42
3.6 成本討論 44
第四章 防盜拷軟體載具之設計 46
4.1 關鍵運算/資料 48
4.2 SOAP介面 53
4.3 計價功能 57
4.4 線上更新服務 59
4.5 軟體配置 62
第五章 系統實作 66
5.1完成軟體系統的開發與實作 67
5.2 將軟體系統配置安裝於防盜拷軟體載具 69
5.3 將嵌入式系統的功能與客戶端程式連結 72
5.4 範例一、資料庫系統 73
5.5 範例二、Wget序傳軟體 76
第六章 結論與未來研究 79
參考文獻 81
[1]附件1C與貿易有關之智慧財產權協定, 網址: http://www.moeaboft.gov.tw/global_org/wto/wto_1/WTO協定/025-附件1C與貿易有關之智慧財產權協定.doc
[2]J. Fleischmann, K. Buchenrieder, “Prototyping Network Embedded Systems,” IEEE Computer, Vol. 32, Issue 2, pp. 116-119, 1999
[3]W. Wolf, “Household Hints for Embedded Systems Designers,” IEEE Computer, Vol. 35, Issue 5, pp. 106-168, 2002
[4]經濟部智慧財產局, 網址: http://www.moeaipo.gov.tw/copyright/copyright_law/copyright_law.asp
[5]呂本富, 知識產權保護策略—信息經濟學原理之六, 網址: http://www.blogchina.com/new/display/4876.html
[6]R. Frederick, C. Kenneth, A. Glenn, ”Property Protection for Software: The Paper Role for Copyright,” ACM Standard View, Vol. 3, No. 2, 1995
[7]GNU General Public License, In Internet URL: http://www.gnu.org/copyleft/gpl.html
[8]N. Calvin, “Computer Software and Copyright,” ACM Computing Surveys, Vol. 7, No. 1, 1975
[9]H. Amir, S. Shlomit, “Public Protection of Software,” ACM Transactions on Computer System, Vol. 5, No. 4, 1987
[10]Steve Graham, Simeon Simeonov, Toufic Boubez, Doug Davis, Glen Daniels, Yuichi Nakamura, Ryo Neyama, Building Web Services With Java, Pearson Education, Jul. 2002
[11]Web Services Architecture, In Internet URL: http://www.w3.org/TR/ws-arch/
[12]C. S. Langdon, “The State of Web Services,” IEEE Computer, Vol. 36, Issue 7, pp. 93-94, 2003
[13]S. Staab, et al., ”Web Services: been there, done that?,” IEEE Intelligent Systems, Vol. 18, Issue 1, pp. 72-85, 2003
[14]XML Information Set, In Internet URL: http://www.w3.org/TR/2001/REC-xml-infoset-20011024/
[15]Extensible Markup Language (XML) 1.0, In Internet URL: http://www.w3.org/TR/2000/REC-xml-20001006
[16]SOAP Version 1.2 Part1: Messaging Framework, In Internet URL: http://www.w3.org/TR/2003/REC-soap12-part1-20030624/
[17]Web Services Description Language (WSDL) Version 2.0 Part 1: Core Language, In Internet URL: http://www.w3.org/TR/2003/WD-wsdl20-20031110/
[18]Sun Microsystems, Inc., “Jini Network Technology an Executive Overview,” In Internet URL: http://wwws.sun.com/software/jini/whitepapers/jini-execoverview.pdf
[19]R. Gupta, S. Talwar, D. P. Agrawal, “Jini Home Network: A Step toward Pervasive Computing,” IEEE Computer, Vol.35, Issue 8, pp.34-40, 2002
[20]A. Judith, K. Steven, “The Evolution of Jini Technology in Telematics,” In Internet URL : http://wwws.sun.com/software/jini/whitepapers/PsiNapticTelematics.pdf
[21]Sun Microsystems, Inc, “Jini Technology Architectural Overview,” In Internet URL: http://wwws.sun.com/software/jini/whitepapers/architecture.pdf
[22]M. Beveridge, P. Koopman, “Jini meets embedded control networking: a case study in portability failure,” Proceedings of Object-Oriented Real-Time Dependable Systems, pp. 11-18, 2001
[23]S. B. Guthery, “Java card: Internet computing on a smart card,” IEEE Internet Computing, Vol. 1, Issue 1, pp. 57-59, 1997
[24]S. Jean, D. Donsez, S. Lecomte, “Using some database principles to improve cooperation in multi-application smart cards,” Proceedings of Computer Science Society, pp. 154-160, 2001
[25]M. T. Smith, “Smart cards: integrating for portable complexity,” IEEE Computer, Vol. 31, Issue 8, pp. 110-112, 1998
[26]J. C. Cooke, R. L. Brewster, “The use of smart cards in personal communication systems security,” Proceedings of Telecommunication, pp. 246-251, 1993
[27]Frank Vahid, Tony Givargis, Embedded System Design, John Wiley & Sons, Jun. 2003
[28]“NET-Start! User’s Guide”, In Internet URL: http://www.wiscore.com/files/download/nsug.pdf
[29]“uClinux – Embedded Linux Microcontroller Project”, In Internet URL: http://www.uclinux.org/
[30]Ian Sommerville, Software Engineering 6th Edition, Addison-Wesley, 2001
[31]M. A. Olson, “Selecting and implementing an embedded database system,” IEEE Computer, Vol. 33, Issue 9, pp. 27-34, 2000
[32]S. J. Shepard, “Embedded databases can power emerging world of information to go,” IT Professional, Vol. 2, Issue 6, pp. 10-13, 2000
[33]S. Ortiz, “Embedded databases come out of hiding,” IEEE Computer, Vol. 33. Issue 3, 20
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top