KR101680605B1 - The system which detects a illegal software based on the network type licence circulation structure - Google Patents

The system which detects a illegal software based on the network type licence circulation structure Download PDF

Info

Publication number
KR101680605B1
KR101680605B1 KR1020150122962A KR20150122962A KR101680605B1 KR 101680605 B1 KR101680605 B1 KR 101680605B1 KR 1020150122962 A KR1020150122962 A KR 1020150122962A KR 20150122962 A KR20150122962 A KR 20150122962A KR 101680605 B1 KR101680605 B1 KR 101680605B1
Authority
KR
South Korea
Prior art keywords
software
license
hash value
illegal
file
Prior art date
Application number
KR1020150122962A
Other languages
Korean (ko)
Inventor
김태엽
채헌
Original Assignee
주식회사 에이엠아이티랩
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 주식회사 에이엠아이티랩 filed Critical 주식회사 에이엠아이티랩
Priority to KR1020150122962A priority Critical patent/KR101680605B1/en
Application granted granted Critical
Publication of KR101680605B1 publication Critical patent/KR101680605B1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/105Arrangements for software license management or administration, e.g. for managing licenses at corporate level
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation

Abstract

The present invention relates to an illegal software detection system based on a network-type license distribution structure. In the present invention, under a communication / program infrastructure such as a license management server and a member information device, Independent of the procedure, the proprietary process is performed independently, and the hash value of each software-related license file is compared with the hash value of the relevant software-related license file having the same version of the software, A computer module capable of judging whether or not the software is illegal according to whether the software is illegal or not, and thereby, some members belonging to the organization are allowed to perform illegal Even if you acquire / install / operate the software, (For example, a company, a school, a public institution, a group, etc.), or an affiliated organization of the affiliated company, by allowing the existence of per-illegal software to be strictly detected in accordance with the hash- The software licensing administrator can guide you in effectively avoiding serious and / or tangible damages caused by illegal software concealment / use by members.

Description

[0001] The present invention relates to an illegal software detection system based on a network type license distribution structure,

The present invention relates to a system for detecting the concealment / use of illegal software based on a network-type license distribution structure, and more particularly, to a system for detecting the concealment / use of illegal software, Independent of the license / acquisition procedure between the server and the software, the proprietary process is performed independently, and the hash value of each software-related license file is compared with the hash value of the legitimate software-side license-related file And a computer module capable of judging whether or not the software is illegal according to whether or not the hash values are coincident with each other is additionally disposed so that some members belonging to the organization are separated from the network network Obtain illegal software of stand alone type (Such as a company, a school, a public institution, a group, or the like) by allowing the existence of the illegal software to be strictly detected in accordance with the hash value verification procedure of the license file ), Or a software licensing administrator who belongs to it, can guide the user in effectively avoiding serious or unintentional damage caused by illegal software concealment / use by an illegal software detection system .

Recently, as social awareness of software copyright has increased, a variety of software license management technologies with various functions have been widely developed and distributed.

For example, Korean Patent Laid-Open No. 10-2000-30889 entitled " Method and Apparatus for Managing Software Licenses Using a Computer Network " (June 5, 2000), Korean Patent Laid-Open No. 10-2005-12322 An example of a conventional software license management technology is disclosed in more detail in, for example, a method for preventing illegal copying by issuing a software license using a network (published on February 22, 2005).

1, the license management server 1 has an organization (for example, a company, a school, a public institution, a group, or the like) via the network 4 under the network- When a license lease request message is transmitted from the software 3a while communicating with the member information device 2 on which the software 3 3a is installed while being operated by a member constituting the software 3a, After checking the configured number of concurrent licenses (in this case, the number of concurrent licenses may be the number of licenses legally purchased by the organization), the total number of additional counts It is judged whether or not the number of license usage is included in the number of concurrent usable licenses, and according to the result, the use of the license of the software (3a) Hire a licensed software side), or to proceed to the restricted procedure.

Under this procedure, for example, when the preset number of concurrent usable licenses is 20 and the total number of licenses to be further counted by the use of the license of the current software 3a is 19, the license management server 1 side, (I.e., the process of renting the license to the current software).

However, under the above procedure, when the preset number of concurrent usable licenses is 20 and the total number of license usage counted by the license of the current software 3a is 21, the license management server 1 determines that the current software 3a (I.e., a procedure for refusing to license the license to the current software 3a).

Of course, under the performance of the license management server 1, when the use of the license of the software 3, 3a installed in the self-member information device 2 is limited (that is, the license acquisition of the software fails (3,3a) can not be executed / used normally. As a result, the software license manager belonging to the organization can concurrently use / execute the software (3,3a) by each member at the same time. (Ie, within the number of licenses legally purchased in the organization) within a reasonable number of days.

However, under such a conventional system, as described above, the license management server 1 side controls the execution / use of the software 3, 3a on the basis of only the number of concurrently used licenses based on the network 4 Therefore, if some of the members obtain / install the illegal software 3b in the self-information device 2, the illegal software 3b may be used as a stand alone type separated from the network 4 (Eg, company, school, public institution, organization, etc.), or the software license manager side belonging to the license management server 1, the license management server 1 can not grasp or control the license management server 1 at all (3b) of the member is forced to suffer serious or unintentional damage due to concealment / use (under this circumstance, for example, Software (3b) If you use be caught by the supervisory authority, the side of the organization is forced to leave the eyes intact serious civil / criminal liability).

Korean Patent Laid-Open No. 10-2000-30889 (entitled: METHOD AND APPARATUS FOR MANAGING SOFTWARE LICENSE USING COMPUTER NETWORK) Korean Patent Laid-Open No. 10-2005-12322 (Name: Method for preventing illegal copying by issuing a software license using a network) (Published on Feb.2,2005)

Therefore, it is an object of the present invention to provide a method and system for controlling a license management server, a license management server, and a license management server, A hash value of a file is compared with a hash value of a legitimate software-side license-related file having the same version as the software, and a computation module >, And even if some members belonging to the organization obtain / install / operate illegal software of stand alone type separated from the network in the information device, the existence of the illegal software According to the procedure for verifying whether or not the hash value of the license related file is matched, (Such as a company, a school, a public agency, a group, etc.), or a software license manager belonging to the organization, And the like.

Other objects of the present invention will become more apparent from the following detailed description and the accompanying drawings.

delete

According to another aspect of the present invention, there is provided a license management system, comprising: a license management server installed in a member information device under a situation where a member information device installed with software communicates with a license management server via a network, Related file hash that analyzes the license-related file recorded in the license-related file list among the files constituting the software and calculates a hash value corresponding to the license-related file, A value processing agent; Related file hash value processing agent to obtain a hash value of the software-related license-related file, compares the hash value with a hash value of a legitimate software-side license-related file having the same version as the software, And a software illegal presence detection server for detecting the illegal use of the software according to whether the hash value matches or not, and for transmitting the detection result to the license management server side, wherein the license related file hash value processing agent performs the license management A license-related file list acquisition module for communicating with a server and acquiring a license-related file list related to license use of the software; Related file extraction module for extracting a license-related file having a file name identical to a file name recorded in the license-related file list among the files constituting the software by searching the software-related file list after reading the license- ; A hash value generation module for applying a hash function to the license related file extracted from the software and generating a hash value corresponding to the license related file; And a hash value transmission module communicating with the software illegal presence detection server and transmitting a hash value corresponding to the license related file to the software illegal presence detection server side. Discloses a software detection system.

According to the present invention, under the communication / program infrastructure of the license management server and the member information device, the independent process is performed independently of the license lease / acquisition procedure between the license management server and the software, A hash value is compared with a hash value of a license file of the legitimate software side having the same version as the software and a computational module capable of judging whether the software is illegal according to whether or not the hash value is matched is additionally arranged Therefore, even if some members belonging to the organization obtain / install / operate illegal software of a stand-alone type separated from the network in the self-information device under the implementation environment of the present invention, Verifies whether or not the hash value of the above license related file is matched The software licensing manager side of the organization (e.g., a company, a school, a public institution, a group, etc.) or a member of the software license manager belongs to the organization, the serious illegal software concealment / The intangible damage can be effectively avoided.

BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is an exemplary diagram conceptually showing a distribution pattern of a network-type license according to the prior art; FIG.
FIG. 2 is an exemplary diagram conceptually showing a distribution pattern of a network-type license employing the present invention; FIG.
FIG. 3 is an exemplary diagram conceptually showing a detailed configuration of a license-related file hash value processing agent according to the present invention; FIG.
4 is a diagram conceptually showing a detailed configuration of a software illegal-state detection server according to the present invention.
FIG. 5 is an exemplary diagram conceptually illustrating a detailed function execution procedure of a license-related file hash value processing agent according to the present invention; FIG.
FIG. 6 is an exemplary view conceptually illustrating a detailed function execution procedure of a software illegal state detection server according to the present invention; FIG.

Hereinafter, an illegal software detection system based on a network-type license distribution structure according to the present invention will be described in detail with reference to the accompanying drawings.

2, the license management server 11 side may be an organization (for example, a company, a school, a public institution, a group, or the like) via the network 14 under a network type license distribution structure employing the present invention, , When a license lease request message is transmitted from the software 13a while communicating with the member information device 12 in which the software 13 or 13a is installed, (In this case, the number of concurrent licenses may be the number of licenses legally purchased by the organization) and then the total number of licenses that are counted by the license of the current software (13a) It is determined whether or not the number is included in the number of concurrent usable licenses, and according to the result, permission to use the license on the side of the software 13a is permitted Rental software licenses side), or to proceed to the restricted process.

Under this procedure, for example, when the preset number of concurrent usable licenses is 20 and the total number of licenses to be further counted by the use of the license of the current software 13a is 19, the license management server 11 side, (That is, a procedure for renting the license to the current software) is permitted.

However, under the above procedure, when the preset number of concurrent usable licenses is 20 and the total number of license usage counts added by the use of the license of the current software 13a is 21, the software license management server 11 A procedure for restricting the use of the license of the software 13a (that is, a procedure for refusing to license the license to the current software 13a) proceeds.

Of course, under the function of the license management server 11, when the use of the license of the software 13 or 13a installed in the self-member information device 12 is limited (that is, the license acquisition of the software fails (13,13a) can not be executed / used normally. As a result, at the software license manager side belonging to the organization, the simultaneous use / use of the software (13,13a) (Ie, within the number of licenses legally purchased in the organization) within a reasonable number of days.

On the other hand, under the system of the present invention, as described above, the license management server 11 can not execute / use the software 13 or 13a only on the basis of the number of simultaneously used licenses based on the network 14 The unauthorized software 13b may be installed in a stand alone type separate from the network 14 after the illegal software 13b is acquired / installed in the self information device 12, The license management server 11 can not grasp or control the license management server 11 at all, and eventually the license management server 11 can not grasp or control the organization (for example, a company, a school, a public institution, On the administrator side, the illegal software (13b) of the member is forced to suffer serious / unintentional damage due to concealment / use.

Under this sensitive situation, the license-related file hash value processing agent 200, the software illegal-state detection server 300, etc. are installed under the communication / program infrastructure of the license management server 11, the member information device 12, An illegal software detection system 100 based on the network-type license distribution structure unique to the present invention is systematically combined.

In this case, the license-related file hash value processing agent 200 and the software illegalness detection server 300 that constitute the illegal software detection system 100 of the present invention mutually form a close communication relationship based on the network 14 The license management server 11 and the software 13 and 13a collaborate with each other independently of the license lease / acquisition procedure to acquire the license related files included in the respective software 13, 13a, and 13b 13a and 13b with the hash value of the legitimate software side license related file having the same version as that of the software 13, 13a, 13b , And the process of judging / detecting whether or not the software 13, 13a, 13b is illegal is performed according to whether or not the hash values match.

At this time, the software license manager side belonging to the organization accesses the license management server 11 via the license manager information device 15, the network 14, and the like, and then the software 13a, 13a , 13b) of the license-related file list (see FIG. 5), so that a series of illegal software detection services according to the present invention can proceed normally without any problem.

3, the license-related file hash value processing agent 200 according to the present invention is connected to the operating system 12a of the member information device 12, An operation information storage module 202 for communicating with the license management server 11, a software illegal presence detection server 300, etc., a license related file list acquisition module 203, The license related file extraction module 204, the hash value generation module 205, and the hash value transmission module 206 are closely combined.

In this case, on the side of the operating information storage module 202, various operating information required for the illegal software detection service, for example, registration information of the operating system 12a, registration information of the software 13, 13a, 13b, Registration information of the management server 11, registration information of the software illegal presence detection server 300, program component information for assisting the process progress of each computation module, communication resource information for forming / maintaining a communication session, Thereby assisting a series of illegal software detection services according to the present invention to proceed normally without any problem.

Under this situation, the license-related file hash value processing agent 200 side communicates with the license management server 11 to acquire a license-related file list related to license usage of the software 13, 13a, 13b, Related file 401 described in the license-related file list among the files 400 constituting the license-related file 401, the license-related file 401, the license-related file 401, the license-related file 401, And transmits / provides the value to the software illegal presence server 300 (refer to FIG. 5).

4, the software illegal presence detection server 300 according to the present invention, which operates in cooperation with the license related file hash value processing agent 200, includes an interface module 301, a network 14, and the like An operation information storage module 302 for communicating with the license related file hash value processing agent 200, the license management server 11, the license manager information device 15, etc., a hash value acquisition module 303, The hash value storage module 304, the software illegal detection module 305, the process reference information storage module 306, and the software illegal notification module 307 are closely combined.

In this case, on the side of the operation information storage module 302, the registration information of the license related file hash value processing agent 200, the registration information of the license management server 11, the registration of the license manager information device 15 Program component information for assisting the process progress of each computation module, communication resource information for forming / maintaining a communication session, and the like, so that a series of illegal software detection services according to the present invention can be normally performed without any problem .

In addition, the process-based information storage module 306 stores and manages version information of each legitimate software, license-related file information of each version-specific legal software, and hash value information of each license-related file in its information storage area, Thereby assisting a series of illegal software detection services according to the present invention to proceed normally without any problem (see FIG. 6).

Under this situation, the software illegal presence server 300 communicates with the license related file hash value processing agent 200 to acquire the hash value of the license related file 401 on the software 13, 13a, 13b, The hash value is compared with the hash value of the legitimate software side license related file having the same version as the software 13, 13a, 13b, and the hash value of the software 13, 13a, 13b And then transmits the detection result to the license management server 11 and the license manager information device 15 (see FIG. 6).

Hereinafter, an illegal software detection procedure based on the network-type license distribution structure inherent to the present invention through the association operation of the license related file hash value processing agent 200 and the software illegalness detection server 300 will be described in detail .

5, the license-related-file-list acquisition module 203 belonging to the license-related-file hash value processing agent 200 communicates with the license management server 11 via the interface module 201 The user accesses the database 11a of the license management server 11 and proceeds to acquire a license related file list related to license usage of the software 13, 13a, 13b previously stored.

In this case, the list of license related files includes, for example, the name of the illegal detection target software, the license related file name of each version of the illegal detection target software (for example, aa.dll, bb.dll, cc. dll, etc.) are described.

In this way, the name of the illegal detection target software, the license related file name of each version of the illegal detection target software (for example, aa.dll, bb.dll, cc.dll in the case of XX version AA software) The license related file extraction module 204 communicates with the license related file list acquisition module 203 and acquires the license related file list related to the license usage of the software 13, 13a, 13b And then communicates with the operating system 12a on the member information device 12 to acquire the illegal information from the software 13, 13a, 13b installed in the member information device 12 And proceeds to the process of accessing the side of the detection target software 13, 13a, 13b (refer to FIG. 5).

The access to the illegal detection target software 13, 13a, 13b described in the license-related file list is completed among the software 13, 13a, 13b installed in the member information device 12 through the above- The license related file extraction module 204 proceeds to a series of information search routines to search for illegal detection target software 13,13a and 13b and thereby detect illegal detection target software 13,13a and 13b Related file 401 having the same name as the name of the license-related file described in the license-related file list among the constituent files 400 (see FIG. 5).

In this procedure, among the files 400 constituting the illegal detection target software 13, 13a, and 13b, the aa.dll file having the same name as the license related file described in the license related file list, the bb.dll File, cc.dll file, and the like are extracted by the license-related file extraction module 204 (see FIG. 5).

In this way, among the files 400 constituting the illegal detection target software 13, 13a, and 13b, the aa.dll file and the bb.dll file having the same names as the names of the license-related files described in the license- and the cc.dll file are extracted, the hash value generation module 205 communicates with the license-related file extraction module 204 to extract the extracted license-related files (for example, aa.dll file, bb.dll file, a hash function is applied to each license related file (e.g., aa.dll file, bb.dll file, cc.dll file, and the like) by advancing a series of hash function applying routines , And a procedure for generating a hash value corresponding to the corresponding license-related file (for example, aa.dll file, bb.dll file, cc.dll file, etc.) is performed (see FIG. 5).

In this case, the hash function used by the hash value generation module 205 may be a CRC (Cyclic Redundancy Check) hash function, an MD5 hash function, a Secure Hash Algorithm (SHA) hash function (e.g., SHA-2 hash function, SHA-3 hash function, etc.) can be widely selected.

Of course, under such a hash value generation situation, the hash value generation module 205 may apply a hash function to all license related files (e.g., aa.dll file, bb.dll file, cc.dll file, etc.) , A hash function may be applied to a part of license related files (for example, aa.dll file, bb.dll file, cc.dll file, etc.) depending on circumstances.

Also, under such a hash value generation situation, the hash value generation module 205 may use a single hash function alone, or may use a plurality of hash functions at once, depending on the situation.

On the other hand, a hash value for a license related file (for example, aa.dll file, bb.dll file, cc.dll file, etc.) constituting the illegal detection target software 13, 13a, Upon completion, the hash value transfer module 206 side communicates with the hash value generation module 205 and acquires the license related files (e.g., aa.dll file, bb.aa.dll file) constituting the illegal detection target software 13, 13a, 13b. (for example, an aa.dll file, a bb.dll file, a cc.dll file, or the like) by reading a hash value for a file A procedure of generating a hash value report message including the hash value of the hash value is performed.

In this case, the hash value report message includes the name of the software for generating the hash value, the version of the software to generate the hash value, the license related file (for example, aa.dll file, bb.dll file, cc.dll file Hash value of each license related file (e.g., aa.dll file, bb.dll file, cc.dll file, etc.), registration information of the member information device 12, and the like.

In this way, the name of the hash value creation target software, the version of the hash value creation target software, the name of the license related file (e.g., aa.dll file, bb.dll file, cc.dll file) When a hash value report message including / described the hash value of the license related file (e.g., aa.dll file, bb.dll file, cc.dll file, etc.) and the registration information of the member information device 12 is generated, The value transmission module 206 communicates with the software illegal presence detection server 300 through the interface module 201 and the network 14 and transmits the generated hash value report message to the software illegal presence detection server 300. [ And then proceeds to the step of transmitting the data to the mobile station.

6, at the side of the hash value acquisition module 303 constituting the software illegal presence detection server 300, the interface module 301 receives the hash value report message from the hash value acquisition module 303, Related file hash value processing agent 200 communicating with the license related file hash value processing agent 200 installed in each member information device 12 via the network network 14 and the like, Value transfer module 206 and proceeds to a process of receiving / receiving / acquiring the generated hash value report message.

When the hash value report message generated by the hash value transmission module 206 of the license related file hash value processing agent 200 is received / received / acquired in this way, the hash value acquisition module 303 acquires the hash value The hash value report message transmitted from each license related file hash value processing agent 200 is transmitted to the information storage area of the hash value storage module 304 while communicating with the license file 304, (See FIG. 6), so that a series of illegal software detection services according to the present invention can be normally performed without any problem.

In a situation where the hash value report message generated by the hash value transmission module 206 is cumulatively stored / managed in the information storage area of the hash value storage module 304, the software illegalness detection module 305, Side accesses the information storage area of the hash value storage module 304 and proceeds to a series of information read routines to read out the cumulative stored hash value report message, After accessing the information storage area of the process reference information storage module 306, a series of information readout routines are advanced, and the process reference information stored therein (e.g., version information of each legacy software, Related file information of the pertinent law software, hash value information of each license related file, and the like) (see FIG. 6).

In this way, the hash value report message accumulated in the information storage area of the hash value storage module 304 (for example, the name of the hash value creation target software, the version of the hash value creation target software, The file name, the hash value of each license related file, the registration information of the member information device 12, and the like), the process reference information stored in the information storage area of the process reference information storage module 306 The version information, the license-related file information of each version-specific legal software, the hash value information of each license-related file, and the like) are read, the software illegal detection module 305 advances a series of information comparison routines, 13a, 13b) (i.e., illegal detection target software) side license related files (e.g., aa.dll file, bb.dll file, cc (for example, aa.dll file, bb.dll file, cc.dll file, etc.) having the same version as the software 13, 13a, 13b After the hash values are compared with each other, the process of detecting whether or not the software 13, 13a, 13b is illegal is performed according to whether or not the corresponding hash value is matched.

Under this procedure, for example, a hash value of the aa.dll file, which is a license-related file of the software 13a (i.e., illegal detection target software) side, and a hash value of the legitimate software side license file When the hash value of the aa.dll file of the member information device 12 has the same value, the detection result of the software illegal detection module 305 is that the software 13a installed in the member information device 12 is legitimate software .

However, if the hash value of the aa.dll file, which is a license-related file of the software 13a (that is, illegal detection target software), and the hash value of the aa.dll file, which is a legitimate software side license related file having the same version as the software 13a If the hash values are different from each other, the detection result of the software illegalness detection module 305 is that the software 13a installed in the member information device 12 is illegal software.

As another example, a hash value of the bb.dll file, which is a license related file of the software 13b (that is, illegal detection target software), and a bb.dll file, which is a legitimate software side license related file having the same version as the software 13b The detection result that the software 13b installed in the member information device 12 is legitimate software is derived from the software illegal detection module 305 even if the hash value of the member information device 12 has the same value.

In addition, the hash value of the bb.dll file, which is the license related file of the software 13b (i.e., illegal detection target software), and the hash value of the bb.dll file, which is a legitimate software side license related file having the same version as the software 13b Even if the hash values have different values, the detection result of the software illegal detection module 305 is that the software 13b installed in the member information device 12 is illegal software.

On the other hand, through the above-described procedure, the detection result that the software (13, 13a, 13b) installed in the member information device 12 is legitimate software or the software The software illegal notification module 307 communicates with the software illegal detection module 305 to detect the illegal software illegally derived from the software illegality detection module 305 The hash value acquiring module 303, the hash value storing module 304, and the like, and acquires / stores a hash value report message (e.g., The version of the software to generate the hash value, the file name of the license of the target software to generate the hash value, the hash value of each license related file, (For example, the registration information of the user) (see FIG. 6).

In this way, the hash value report message acquired or stored by the hash value acquisition module 303, the hash value storage module 304, and the like is read out as a result of detection of illegal software derived by the software illegal presence detection module 305 The software illegal notification module 307 advances a series of information generation routines to update the registration information of the member information device 12 on which the illegal / legitimate software is installed, the registration information of the illegal / legitimate software A process of generating a software illegal presence detection result message in which a name, etc. is described (see FIG. 6).

Through the above-described procedure, when a software illegal detection result message indicating the registration information of the member information device 12 on which the illegal / legitimate software is installed, the name of the illegal / legitimate software, and the like is generated The software illegal notification module 307 communicates with the license manager information device 15 and the license management server 11 via the interface module 301 and the network 14 to detect whether the software is illegal And the result message is transmitted to the license manager information device 15, the license management server 11, and the like (see FIG. 6).

Of course, through the above-described procedure, a software illegal detection result message (a result of detection of illegal software, registration information of the member information appliance 12 in which illegal / legitimate software is installed, name of illegal / legitimate software, etc.) The software license manager side can strictly detect, detect, and control the existence of illegal software only by a simple procedure of watching the software illegalness detection result message posted on the license manager information device 15 under the circumstance.

As described above, in the present invention, the license lease / acquisition procedure between the license management server 11 and the software 13, 13a, 13b is performed under the communication / program infrastructure of the license management server 11, the member information device 12, The Hash value of the license-related file 401 on the side of each software 13, 13a and 13b is managed by the legitimate software having the same version as the software 13, 13a, 13b Side licensing-related file, and additionally arranges a computer module capable of judging whether or not the software 13, 13a, 13b is illegal according to whether or not the hash value matches the hash value. Even if some members belonging to the organization obtain / install / operate illegal software of a stand alone type separated from the network 14 in the self information device 12 under the environment, The presence of the software may be strictly perceived in accordance with the hash value conformance procedure of the license file and may eventually be detected by the organization (e.g., company, school, public agency, organization, etc.) On the administrator side, it is possible to effectively avoid severe or unintentional damages caused by illegal software concealment / use by members.

The present invention is not limited to a specific field, and it has a generally useful effect in various fields where effective management of licenses is required.

Although specific embodiments of the present invention have been described and illustrated above, it is to be understood that the present invention may be embodied in many other specific forms without departing from the spirit or essential characteristics thereof.

Such modified embodiments should not be understood individually from the technical idea and viewpoint of the present invention, and such modified embodiments should be included in the appended claims of the present invention.

1,11: License management server
2,12: member information device
12a: Operating system
3, 3a, 3b, 13, 13a, 13b: software
4, 14: Network
15: License Manager Information Device
100: Illegal software detection system
200: License related file hash value processing agent
201: Interface module
202: Operational information storage module
203: license file list acquisition module
204: License related file extraction module
205: hash value generation module
206: Hash Value Transfer Module
300: Software Illegal Surveillance Server
301: Interface module
302: Operational information storage module
303: Hash value acquisition module
304: Hash value storage module
305: software illegal detection module
306: Process based information storage module
307: software illegal notification module

Claims (4)

delete A license information management unit that is installed in the member information device and communicates with the license management server and acquires a license file list related to license usage of the software under a situation where the member information device in which the software is installed communicates with the license management server via a network, A license related file hash value processing agent for analyzing a license related file recorded in the license related file list among the files constituting the software and calculating a hash value corresponding to the license related file;
Related file hash value processing agent to obtain a hash value of the software-related license-related file, compares the hash value with a hash value of the relevant software-related license file having the same version as the software, And a software illegal presence detection server for detecting the illegal use of the software according to whether the values match or not and for transmitting the detection result to the license management server side,
Wherein the license-related file hash value processing agent comprises: a license-related-file list acquisition module that communicates with the license management server and acquires a license-related file list related to license usage of the software;
Related file extraction module for extracting a license-related file having a file name identical to a file name recorded in the license-related file list among the files constituting the software by searching the software-related file list after reading the license- ;
A hash value generation module for applying a hash function to the license related file extracted from the software and generating a hash value corresponding to the license related file;
And a hash value transmission module communicating with the software illegal presence detection server and transmitting a hash value corresponding to the license related file to the software illegal presence detection server side. Software detection system.
delete 3. The system of claim 2, wherein the software illegal presence detection server comprises: a hash value acquisition module for communicating with the license related file hash value processing agent to obtain a hash value of the software license related file;
The hash value of the software-related license-related file is compared with the hash value of the license-related file of the legitimate software-side license having the same version as the previously stored software, and whether or not the software is illegal is detected Software detection and detection module;
A software illegal presence notification module that communicates with the license management server and transmits a generated software illegal presence detection result message to the license management server side after generating a software illegal presence detection result message reflecting a result of detection of illegal software, Wherein the network-based license distribution structure is based on an illegal software detection system.
KR1020150122962A 2015-08-31 2015-08-31 The system which detects a illegal software based on the network type licence circulation structure KR101680605B1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020150122962A KR101680605B1 (en) 2015-08-31 2015-08-31 The system which detects a illegal software based on the network type licence circulation structure

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020150122962A KR101680605B1 (en) 2015-08-31 2015-08-31 The system which detects a illegal software based on the network type licence circulation structure

Publications (1)

Publication Number Publication Date
KR101680605B1 true KR101680605B1 (en) 2016-12-12

Family

ID=57574043

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020150122962A KR101680605B1 (en) 2015-08-31 2015-08-31 The system which detects a illegal software based on the network type licence circulation structure

Country Status (1)

Country Link
KR (1) KR101680605B1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000030889A (en) 2000-03-24 2000-06-05 유우영 License management method and apparatus of software with computer network system
KR20050012322A (en) 2003-07-25 2005-02-02 엘지전자 주식회사 A method for preventing unauthorized copying by issuing software license using a network
KR20150056244A (en) * 2013-11-15 2015-05-26 (주)닥터소프트 Terminal device and software managing method thereof

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000030889A (en) 2000-03-24 2000-06-05 유우영 License management method and apparatus of software with computer network system
KR20050012322A (en) 2003-07-25 2005-02-02 엘지전자 주식회사 A method for preventing unauthorized copying by issuing software license using a network
KR20150056244A (en) * 2013-11-15 2015-05-26 (주)닥터소프트 Terminal device and software managing method thereof

Similar Documents

Publication Publication Date Title
US9069936B2 (en) Licensing verification for application use
US8769296B2 (en) Software signature tracking
US9143509B2 (en) Granular assessment of device state
CN110011848B (en) Mobile operation and maintenance auditing system
US20150326618A1 (en) Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device
US20220329446A1 (en) Enhanced asset management using an electronic ledger
US11562052B2 (en) Computing system and method for verification of access permissions
KR102011363B1 (en) Method for software authentication using block-chain authentication
CN106487752A (en) A kind of method and apparatus for authentication-access safety
US11658996B2 (en) Historic data breach detection
CN108256351B (en) File processing method and device, storage medium and terminal
CN103488948A (en) Method and device for achieving data security of operation system
US20130339731A1 (en) Device-specific secure licensing
JP4711824B2 (en) Business administrator terminal, environmental management station terminal, network operator terminal, business operator terminal, business administrator terminal control method, environmental management station terminal control method, network operator terminal control method, and business operator program
CN103841120A (en) Data security management method, mobile terminal and system based on digital watermarking
CN113542191A (en) Block chain based data access and verification method and device
CN112000933A (en) Application software activation method and device, electronic equipment and storage medium
KR101680605B1 (en) The system which detects a illegal software based on the network type licence circulation structure
US9122878B1 (en) Software license management with drifting component
KR101680608B1 (en) The system which detects a illegal software based on the network type licence circulation structure
US11611570B2 (en) Attack signature generation
CN110677483A (en) Information processing system and trusted security management system
CN109150863B (en) Desktop cloud access control method and device and desktop cloud terminal equipment
US20240143805A1 (en) Document protection mechanism
KR102421216B1 (en) Method for activation of literary work based on certification and apparatus for performing the method

Legal Events

Date Code Title Description
GRNT Written decision to grant