In recent years, the protection of digital information is more and more important for the software security version. All developers face the same question: "What kind of protection plan is the ideal?" This problem shows that developers must face how to handle balance between security and friendly user interfaces. Many examples show that the use of complex technologies to protect software is easy to generate errors, and developers must provide more technical support, which is not conducive to software sales. Conversely, the unreliable protection software will be pirated, the interests of developers are lost. These two aspects have a threat to life and death for some small and medium-sized companies. For recent years, many software developers have used long registration codes to achieve software protection, up to 30 bits, is to prevent registration code from being easily guessing. This registration code can be used in unlimited time as long as the software is entered once in the software installation. No matter who, when he reinstall the computer, he will face the following questions: 1) Lost Registration Code 2) Registration Code Enter an error. This solution is apparently inconvenient, and it is not safe, and the registration code for all software in this protection method can be downloaded for free on the Internet. Because the Internet's appearance of the Internet, the protection method of the registration code (regardless of the password is long) so that the piracy of the software really begins to appear. It is common to buy expensive software for each CD in about 5 to 25 yuan. This information will be sent by the forged sender in the form of spam. Among them, there is a kind of practice is that it is shameless: the sender for falsifying well-known companies such as Amazon.com to send the email to deceive the recipient. Through the registration code, the upgrade protection is now, in the process of remotely upgrading the software, users often need to enter several registration code. The advantage of this approach is that it is possible to automatically analyze the legality of the registration code, for example, whether the number can be identified or whether the number is often used or has been stolen. On the other hand, if the user needs to fix or reinstall the software because the program is wrong, it will feel that the user must enter the registration code in the corresponding document. Time-consuming. Software Activates Since Windows XP launched, software activation has attracted extensive attention. Many consumers have expressed a strong dissatisfaction. This method is to bind the software on the unique PC, and the user specifies an ID for this PC, send it to the software, and then get the software activation code. To ensure that the hardware in this PC is replaced (such as memory upgrade), the software can still be used, and the user has replaced the computer, the software cannot run, the software developer must set up the latter program for his software to achieve activation. Therefore, this new technique is merely the starting phase and is only used in the newly produced PC. Using this protection method, when a user wants to replace a new computer, you cannot use the original software in the new computer. This is to improve the security of the software, but since the entire activation process is completed in memory, this process can be completely analyzed and recorded, and then regenerate. Technical issues are technically, software activation is more prone to any other solutions. To make this technology becomes safe, a part of tax and license information must be stored in a certain area that cannot be read on the hard disk. But not only seriously affects the stability of the computer, but after uninstalling the software, this part will not be deleted. Symante has used mandatory activation in its US and UK published in the 2004 series of products, this approach has also taken a lot of negative effects: activation is not 100% accurate. It will produce the consequences that the user who is just purchasing the software is not available. Other developers using activation methods must also face many problems. It is very likely that some legal users must wait for a long time after paying the money to get the activation code. The anti-re-researcher is very common as a method of protecting software as a protection software.