Hi, I would like to know what are the best approaches for protecting apllication and DLL files in situations like this:
Example:
- Deploy the application (software) on the client
- This software have DLLs - direct injection used in Data Factories (MS SQL, MySQL, other).
Wanted Security:
- Requirement #1 - Main DLL (Core) requires some kind of "license" (for this user and for X duration and can not be used in other machines (copied).
- Requirement #2 - Data Factories DLLs can not be used by client custom code (he can't build his own code and use mine libraries. (EDITED - added new requirement)
- Requirement #3 - Using hardware or services from external companies is not an option for us. .
Solutions that I found:
Req #1 -
- Solution #1 - The software requires a custom "save data file" (full protection on it), this file will be used for control. The application will read it from times to times (or when it starts, or from 24h in 24h if the application is running continuously. It will stores the first execution date, last execution date, some ID of that machine, expiration date, etc. .
- Pros:
- Client can not delete it or the application will stop working, he can't change the system date (rewind it) because the app matches the dates.
- If the user wants to upgrade the expiration date, the software allow it (by offline or online way).
- Cons:
- Well, this file will be a hacking target. I do not know the best way to protect it.
- Pros:
- Solution #1 - The software requires a custom "save data file" (full protection on it), this file will be used for control. The application will read it from times to times (or when it starts, or from 24h in 24h if the application is running continuously. It will stores the first execution date, last execution date, some ID of that machine, expiration date, etc. .
Req #2 -
- Solution #1 - I do not have one :P
.
. - . - . - . - . - . - . - . - . - . - . - . - . - . - . - . - . - . -
Can anyone tell me the best practices on this subject?
Different solutions, pros and cons, etc...
. - . - . - . - . - . - . - . - . - . - . - . - . - . - . - . - . - . -