Chapter 37. Licensing and Intellectual Property

IN BRIEF

When you are learning a new technology, such as .NET, there are many different approaches to absorbing the new material. You might seek out training and instruction from people who have more experience, you (obviously) read books, and you might check the Internet for newsgroups, communities, and samples. All of this gives you a wealth of knowledge and information to teach you how to write your code and create your applications.

But what do you do if you need to protect your applications and your investment in their development? We often spend so much time trying to figure out how to code our applications that we forget that we are indeed trying to make money. How do you make sure that only people who have paid for your applications or your controls can make use of them? How do you protect your application from prying eyes and curious hackers?

This chapter will show you how to create licensing schemes for your controls and how to protect your application's sensitive code.

WHAT YOU NEED

REQUIRED SOFTWARE.NET Framework SDK v1.1 Visual Studio .NET 2003 with C# installed
RECOMMENDED HARDWAREPC that meets .NET SDK minimum requirements
SKILLS REQUIREDC# and .NET familiarity

LICENSING AND INTELLECTUAL PROPERTY AT A GLANCE

Licensing Overview755  
 Licensing Defined755Types of Licensing and Verification756
 When to License and Protect755  
Implementing Custom Licensing757  
 Introduction to the License Provider and License Manager757Building Licensed Controls764
 Licensed Web Controls Versus Windows Forms Controls768
 Creating a License759
 Creating a License Provider760  
Licensing Implementation Strategies768  
 Deciding on a Licensing Deployment Method768Deciding on a License Purchase Method768
 Deciding on a Licensing Verification Method768Deciding on a Licensing Method769
Protecting Your Intellectual Property769  
 Protecting Intellectual Property by Hiding Your Licensing Algorithm769Protecting Intellectual Property with Alternative Back-Ends770
 Protecting Intellectual Property Through Obfuscation770  
Summary771  
Further Reading771  

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.129.249.194