KR20130094153A - Apparatus and method of program managing of computer and portable device - Google Patents
Apparatus and method of program managing of computer and portable device Download PDFInfo
- Publication number
- KR20130094153A KR20130094153A KR1020120040425A KR20120040425A KR20130094153A KR 20130094153 A KR20130094153 A KR 20130094153A KR 1020120040425 A KR1020120040425 A KR 1020120040425A KR 20120040425 A KR20120040425 A KR 20120040425A KR 20130094153 A KR20130094153 A KR 20130094153A
- Authority
- KR
- South Korea
- Prior art keywords
- program
- computer
- portable electronic
- electronic device
- contents
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/28—Error detection; Error correction; Monitoring by checking the correct order of processing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
Abstract
Description
The present invention provides a software compilation and software quality verification, distribution, and sales management method for a software sales and distribution system for use in a computer and a portable information communication device using a wired or wireless transmission method in an information communication network, and a computer and a portable information communication device. The present invention relates to the technical idea of identifying copyrights by finding and inspecting copyrights of pictures, music, sounds, icons, and symbologies embedded in a program for use.
Digital Rights Management (DRM) system is one of the computerizations in which all elements such as server security, system security, information security, hacking, and information management are concentrated enough to be called 'flowers' in security, like online games. Field.
Historical information (hereinafter referred to as content) is not a big problem because of the media cost or quality deterioration even if the copy is made by distributing the paper, CD, plastic, etc. based on offline.
However, now that all content is digitized, the nature of the digital does not degrade the quality of the original and the copy, and the cost of copying converges to zero, so many people want to copy and use it without paying for the content if possible.
The creator of the content (hereinafter referred to as the copyright holder) should, of course, have to pay the price from the users. If there is no information protection device, the user will use the content without paying the price. Thus, the copyright holder has no place to pay for his efforts. The DRM system is an information protection device to protect the rights of rights holders.
It has been less than 20 years since the DRM system was born. In the early days of the DRM system, most viewer-based DRM systems were applied in the form of specially designed programs (viewers) that drive security-enabled contents to prevent illegal use by users.
Since then, the viewer plug-in DRM system appeared by inserting a security plug-in into a popular viewer.
In recent years, the security of the operating system has evolved to a viewer-independent DRM system that supports a general-purpose viewer. As such, the DRM system has been developed in a different way from academia and industry.
A program management apparatus for a computer and a portable electronic device according to an embodiment of the present invention processes a program of a computer and a portable electronic device developed in the form of a source program into an intermediate code, and distributes the program in the form of the processed intermediate code. A low level virtual machine compiler for converting the program into a program for sale, and a check processing unit for inspecting whether the converted program and the contents included in the program are in violation of at least one of quality, distribution, sale, and copyright. Can be.
Program management method of a computer and a portable electronic device according to an embodiment of the present invention using a low-level virtual machine compiler, processing the program of the computer and portable electronic device developed in the form of a source program into an intermediate code, the processed Converting the program in the form of an intermediate code into a program for distribution / sale, and checking whether there is a violation of at least one of quality, distribution, sale, and copyright of the converted program and the contents included in the program It may include.
According to an embodiment of the present invention, it is possible to efficiently check whether the computer program and the contents used in the computer and the portable information communication device are in violation of the sale, management, and copyright.
According to an embodiment of the present invention, by checking whether the computer program and contents are in violation of the sale, management, and copyright, and reporting to the administrator, illegal use of the computer programs and contents can be prevented.
1 is a block diagram illustrating a program management apparatus of a computer and a portable electronic device according to an embodiment of the present invention.
2 is a block diagram specifically illustrating an inspection processing unit according to an embodiment of the present invention.
3 is a view for explaining an operation example of a program management apparatus of a computer and a portable electronic device according to an embodiment of the present invention.
4 is a flowchart illustrating a program management method of a computer and a portable electronic device according to an embodiment of the present invention.
Hereinafter, preferred embodiments according to the present invention will be described in detail with reference to the accompanying drawings.
In the following description of the present invention, detailed description of known functions and configurations incorporated herein will be omitted when it may make the subject matter of the present invention rather unclear. The terminologies used herein are terms used to properly represent preferred embodiments of the present invention, which may vary depending on the user, the intent of the operator, or the practice of the field to which the present invention belongs. Therefore, the definitions of the terms should be made based on the contents throughout the specification. Like reference symbols in the drawings denote like elements.
1 is a block diagram illustrating a program management apparatus of a computer and a portable electronic device according to an embodiment of the present invention.
The program management apparatus 100 of a computer and a portable electronic device according to an embodiment of the present invention may include a low level virtual
First, a low-level virtual machine (Llvm) 110 according to an embodiment of the present invention processes an intermediate code for a program of a computer and a portable electronic device developed in the form of a source program, and processes the above. The program in the form of intermediate code can be converted into a program for distribution / sale.
The low-level
At this time, the low-level
Next, the low-level
Next, the
At this time, if there is no copyright issue for the program and the contents included in the program, the process proceeds to the next step.
If, as a result of the inspection of the
The
To this end, the program management apparatus 100 for a computer and a portable electronic device according to an embodiment of the present invention may construct a database related to copyright or use a database previously established as a method of checking a corresponding copyright.
Specifically, in the program management apparatus 100 of the computer and the portable electronic device according to an embodiment of the present invention, in order for the
The
To this end, the program management apparatus 100 of a computer and a portable electronic device according to an embodiment of the present invention is a database by downloading at least one or more contents and copyright information of the at least one or more contents using a wired or wireless network in advance. You can.
Thus, the
In other words, the
The
The
In addition, the
In addition, the
Next, when the
In addition, the
If a problem occurs as a result of the execution in the above process, the
If the problem does not occur as a result of the execution in the above process, that is, if there is no problem as a result of the execution, the
The execution result output from the
Accordingly, the computer or the portable information communication device can check whether the execution authority is available in executing the downloaded program.
In order to prevent execution if there is no execution authority, the program management apparatus 100 of a computer and a portable electronic device according to an embodiment of the present invention inserts execution code into a result converted into a distributable and sellable program. can do.
2 is a block diagram illustrating in detail the inspection processing unit 200 according to an embodiment of the present invention.
The inspection processor 200 according to an embodiment of the present invention may include a
The
To this end, the
The
A memory leak is a phenomenon in which the amount of available memory is reduced because the program does not properly cancel the dynamically allocated memory as the program is executed.In the case of a severe memory leak or a program in which the leak gradually increases, the performance is deteriorated or the memory is exhausted. Disorders may occur.
In addition, if the memory leak is severe, the program in question may use too much memory and other programs may not work and the user may not even find the cause of the problem.
To prevent this, the memory
When executing the converted program, the execution
Also, when executing the converted program, the execution
The inspection processing unit 200 according to an embodiment of the present invention may check whether a file which is determined to be unavailable in advance exists among files used when executing the converted program.
In addition, the inspection processing unit 200 according to an embodiment of the present invention may check at least one of whether the network is used or whether the data flowing from the network is used, in response to the inspection of the files used in the execution. .
3 is a view for explaining an operation example of a program management apparatus of a computer and a portable electronic device according to an embodiment of the present invention.
The program management apparatus of the computer and the portable electronic device according to an embodiment of the present invention can grasp the structure of the application file included in the deb package (Debian software package) (301). In this case, the program management apparatus of the computer and the portable electronic device according to an embodiment of the present invention grasps the directory structure for each of the applications constituting the deb package, and the image, music file, etc. constituting each of the applications Information can be obtained.
Next, the program management apparatus of the computer and the portable electronic device according to an embodiment of the present invention may extract a sound source and an image file check sum value from the extracted image, music file, or the like (step 302). In this case, the program management apparatus of the computer and the portable electronic device according to an embodiment of the present invention may extract the checksum value by using a message-digest algorithm 5 (MD5) algorithm.
Message-Digest Algorithm 5 (MD5) is a 128-bit cryptographic hash function, specified by RFC 1321, that is mainly used for integrity checking to verify that a program or file is intact.
The MD5 may receive a variable-length message and output a 128-bit fixed length value. The input message is divided into 512 bit blocks.
Next, the program management apparatus of the computer and the portable electronic device according to an embodiment of the present invention may compare a license database with the extracted checksum value (303). In this case, the license database may correspond to the
Next, the program management apparatus of the computer and the portable electronic device according to an embodiment of the present invention may perform static analysis on the execution binary (304). At this time, the program management apparatus of the computer and the portable electronic device according to an embodiment of the present invention can check the structure of the directory and whether the image and the sound source are illegally used.
4 is a flowchart illustrating a program management method of a computer and a portable electronic device according to an embodiment of the present invention.
Program management method of a computer and a portable electronic device according to an embodiment of the present invention can be processed into intermediate code for the program of the computer and portable electronic device developed in the form of a source program, using a low-level virtual machine compiler (step 401).
Next, the program management method of the computer and the portable electronic device according to an embodiment of the present invention may convert the program in the form of the processed intermediate code into a program for distribution / sale (step 402).
Next, the program management method of a computer and a portable electronic device according to an embodiment of the present invention checks whether there is at least one violation of quality, distribution, sales, and copyright of the converted program and the contents included in the program. It may be done (step 403).
In the program management method of the computer and the portable electronic device according to an embodiment of the present invention, the copyright of the content may be checked from the DB of the server where the copyright is recorded to check for copyright violation.
To this end, the program management method of a computer and a portable electronic device according to an embodiment of the present invention maintains a copyright information database in which at least one or more contents and copyright information of the at least one or more contents are recorded and the copyright information database is stored. For reference, it may be checked whether or not the copyright of the contents included in the converted program is violated.
Next, the program management method of a computer and a portable electronic device according to an embodiment of the present invention can access a server providing a service for checking whether a copyright violation exists, and check copyright for the content to check for copyright violation. .
To this end, the program management method of a computer and a portable electronic device according to an embodiment of the present invention is to check whether there is a violation of at least one of the quality, distribution, sales, and copyright of the converted program and the content contained in the program. In order to do so, at least one or more contents and copyright information of the at least one or more contents can be accessed.
In addition, the program management method of the computer and the portable electronic device according to an embodiment of the present invention can check whether the copyright infringement on the content included in the converted program in the connected server.
According to an embodiment of the present invention, it is possible to efficiently check whether the computer program and the contents used in the computer and the portable information communication device are in violation of the sale, management, and copyright.
According to an embodiment of the present invention, by checking whether the computer program and contents are in violation of the sale, management, and copyright, and reporting to the administrator, illegal use of the computer programs and contents can be prevented.
The program management method of a computer and a portable electronic device according to an embodiment of the present invention may be implemented in the form of program instructions that can be executed by various computer means and recorded in a computer readable medium. The computer readable medium may include program instructions, data files, data structures, etc. alone or in combination. The program instructions recorded on the medium may be those specially designed and constructed for the present invention or may be available to those skilled in the art of computer software. Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tape, optical media such as CD-ROMs, DVDs, and magnetic disks, such as floppy disks. Magneto-optical media, and hardware devices specifically configured to store and execute program instructions, such as ROM, RAM, flash memory, and the like. Examples of program instructions include not only machine code generated by a compiler, but also high-level language code that can be executed by a computer using an interpreter or the like. The hardware device described above may be configured to operate as one or more software modules to perform the operations of the present invention, and vice versa.
As described above, the present invention has been described by way of limited embodiments and drawings, but the present invention is not limited to the above embodiments, and those skilled in the art to which the present invention pertains various modifications and variations from such descriptions. This is possible.
Therefore, the scope of the present invention should not be limited to the described embodiments, but should be determined by the equivalents of the claims, as well as the claims.
100: program management device for computers and portable electronic devices
110: low level virtual machine compiler
120: inspection processing unit
130: Copyright Information Database
Claims (14)
Inspection processing unit for inspecting whether the converted program and the content contained in the program in violation of at least one of quality, distribution, sale, and copyright
Program management apparatus of a computer and a portable electronic device comprising a.
Copyright information database in which at least one or more contents and copyright information of the at least one or more contents are recorded.
Program management device for a computer and a portable electronic device further comprising.
The inspection processing unit,
A program management apparatus for a computer and a portable electronic device for referring to the copyright information database and inspecting whether a copyright of a content included in the converted program is violated.
The inspection processing unit,
A computer and portable electronic device for connecting to a server on which at least one or more contents and copyright information of the at least one or more contents are recorded, and checking whether the copyrighted content is in violation of the contents included in the converted program. Program management device.
The inspection processing unit,
A static inspection unit which executes the converted program to a predetermined state by using a test program on the converted program, inspects the contents of the storage device in the selected state, and performs a static inspection.
Program management apparatus of a computer and a portable electronic device comprising a.
The inspection processing unit,
When executing the converted program, the memory leak check unit that checks whether the available memory size is reduced to perform a memory leak check
Program management device for a computer and a portable electronic device further comprising.
The inspection processing unit,
Execution code inspection unit that checks the presence or absence of execution code that causes a competitive situation of memory usage in the converted program when executing the converted program
Program management apparatus of a computer and a portable electronic device comprising a.
The execution code inspection unit,
And a program management device for a computer and a portable electronic device that, when executing the converted program, further checks for the existence of execution code causing a deadlock of parallel execution in the converted program.
The inspection processing unit,
A program management apparatus for a computer and a portable electronic device that checks whether a file which has been previously determined to be unavailable among files used when executing the converted program exists.
The inspection processing unit,
And at least one of whether to use a network and whether to use data flowing from the network, in response to the inspection of the files used in the execution.
Checking whether there is a violation of at least one of quality, distribution, sale, and copyright of the converted program and the contents included in the program.
Program management method of a computer and a portable electronic device comprising a.
Maintaining a copyright information database in which at least one or more contents and copyright information of the at least one or more contents are recorded; And
Checking whether the copyright is infringed on the content included in the converted program by referring to the copyright information database;
Program management method of the computer and portable electronic device further comprising.
The step of checking whether the violation is,
Accessing a server in which at least one or more contents and copyright information of the at least one or more contents are recorded; And
Checking whether the connected server violates the copyright of the contents included in the converted program.
Program management method of a computer and a portable electronic device comprising a.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20120006716 | 2012-01-20 | ||
KR1020120006716 | 2012-01-20 |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20130094153A true KR20130094153A (en) | 2013-08-23 |
Family
ID=49218113
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020120040425A KR20130094153A (en) | 2012-01-20 | 2012-04-18 | Apparatus and method of program managing of computer and portable device |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20130094153A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20150063798A (en) * | 2013-12-02 | 2015-06-10 | 한국과학기술연구원 | Method for code conversion using target-independent debugging information, apparatus and computer-readable recording medium with program therefor |
KR20150133902A (en) * | 2014-05-20 | 2015-12-01 | 국방과학연구소 | System and method for developing of service based on software product line |
-
2012
- 2012-04-18 KR KR1020120040425A patent/KR20130094153A/en not_active Application Discontinuation
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20150063798A (en) * | 2013-12-02 | 2015-06-10 | 한국과학기술연구원 | Method for code conversion using target-independent debugging information, apparatus and computer-readable recording medium with program therefor |
KR20150133902A (en) * | 2014-05-20 | 2015-12-01 | 국방과학연구소 | System and method for developing of service based on software product line |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7734549B2 (en) | Methods and apparatus for managing secured software for a wireless device | |
TWI557589B (en) | Secure software product identifier for product validation and activation | |
KR101712726B1 (en) | Method and system for verifying integrity and validity of contents using hash code | |
JP4651947B2 (en) | System and method for providing a flexible and durable hardware ID based on time and weight | |
US20170116410A1 (en) | Software protection | |
JP4506837B2 (en) | Authority transfer device, authority transfer system, authority transfer method, and authority transfer program | |
JP2002140126A (en) | System for distributing program, distributor for encrypted program, system for collecting program trouble information, and method of distributing program | |
US9038057B2 (en) | Method for replacing an illegitimate copy of a software program with a legitimate copy and corresponding system | |
WO2007139277A1 (en) | Method for executing digital right management and tracking using characteristic of virus and system for executing the method | |
US20100031033A1 (en) | Apparatus and method of sharing drm agents | |
US8479014B1 (en) | Symmetric key based secure microprocessor and its applications | |
US8966651B2 (en) | Digital rights management (DRM) locker | |
KR20130094153A (en) | Apparatus and method of program managing of computer and portable device | |
KR101604892B1 (en) | Method and devices for fraud prevention of android-based applications | |
KR20140011021A (en) | Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone | |
Kim et al. | A birthmark-based method for intellectual software asset management | |
US9081936B2 (en) | System and method for tracking a downloaded digital media file | |
KR101064221B1 (en) | Apparatus and method for preventing illegal copy of content | |
CN115296821B (en) | Data processing system for digital collection management | |
KR100716719B1 (en) | Method and apparatus for providing package contents using d.r.m | |
US20240143805A1 (en) | Document protection mechanism | |
CN111984944B (en) | Source code processing method, related device and storage medium | |
WO2008036455A2 (en) | Method and apparatus for securing unprotected content files from unauthorized use | |
KR101425315B1 (en) | Terminal device and server having java virturl machine for preventing illegal copy of java application, and method for authentification of the java application in the terminal device | |
KR101440234B1 (en) | The method and system for managing program integrity, and computer-radable recording medium storing program integrity management program recored theron |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |