KR101680605B1 - The system which detects a illegal software based on the network type licence circulation structure - Google Patents
The system which detects a illegal software based on the network type licence circulation structure Download PDFInfo
- Publication number
- KR101680605B1 KR101680605B1 KR1020150122962A KR20150122962A KR101680605B1 KR 101680605 B1 KR101680605 B1 KR 101680605B1 KR 1020150122962 A KR1020150122962 A KR 1020150122962A KR 20150122962 A KR20150122962 A KR 20150122962A KR 101680605 B1 KR101680605 B1 KR 101680605B1
- Authority
- KR
- South Korea
- Prior art keywords
- software
- license
- hash value
- illegal
- file
- Prior art date
Links
- 238000001514 detection method Methods 0.000 claims description 64
- 238000012545 processing Methods 0.000 claims description 24
- 238000000605 extraction Methods 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 6
- 238000000034 method Methods 0.000 abstract description 52
- 230000008520 organization Effects 0.000 abstract description 23
- 238000004891 communication Methods 0.000 abstract description 9
- 238000010586 diagram Methods 0.000 description 5
- 238000012546 transfer Methods 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 2
- 239000000470 constituent Substances 0.000 description 1
- 230000001186 cumulative effect Effects 0.000 description 1
- 125000004122 cyclic group Chemical group 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/105—Arrangements for software license management or administration, e.g. for managing licenses at corporate level
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Abstract
The present invention relates to an illegal software detection system based on a network-type license distribution structure. In the present invention, under a communication / program infrastructure such as a license management server and a member information device, Independent of the procedure, the proprietary process is performed independently, and the hash value of each software-related license file is compared with the hash value of the relevant software-related license file having the same version of the software, A computer module capable of judging whether or not the software is illegal according to whether the software is illegal or not, and thereby, some members belonging to the organization are allowed to perform illegal Even if you acquire / install / operate the software, (For example, a company, a school, a public institution, a group, etc.), or an affiliated organization of the affiliated company, by allowing the existence of per-illegal software to be strictly detected in accordance with the hash- The software licensing administrator can guide you in effectively avoiding serious and / or tangible damages caused by illegal software concealment / use by members.
Description
The present invention relates to a system for detecting the concealment / use of illegal software based on a network-type license distribution structure, and more particularly, to a system for detecting the concealment / use of illegal software, Independent of the license / acquisition procedure between the server and the software, the proprietary process is performed independently, and the hash value of each software-related license file is compared with the hash value of the legitimate software-side license-related file And a computer module capable of judging whether or not the software is illegal according to whether or not the hash values are coincident with each other is additionally disposed so that some members belonging to the organization are separated from the network network Obtain illegal software of stand alone type (Such as a company, a school, a public institution, a group, or the like) by allowing the existence of the illegal software to be strictly detected in accordance with the hash value verification procedure of the license file ), Or a software licensing administrator who belongs to it, can guide the user in effectively avoiding serious or unintentional damage caused by illegal software concealment / use by an illegal software detection system .
Recently, as social awareness of software copyright has increased, a variety of software license management technologies with various functions have been widely developed and distributed.
For example, Korean Patent Laid-Open No. 10-2000-30889 entitled " Method and Apparatus for Managing Software Licenses Using a Computer Network " (June 5, 2000), Korean Patent Laid-Open No. 10-2005-12322 An example of a conventional software license management technology is disclosed in more detail in, for example, a method for preventing illegal copying by issuing a software license using a network (published on February 22, 2005).
1, the
Under this procedure, for example, when the preset number of concurrent usable licenses is 20 and the total number of licenses to be further counted by the use of the license of the current software 3a is 19, the
However, under the above procedure, when the preset number of concurrent usable licenses is 20 and the total number of license usage counted by the license of the current software 3a is 21, the
Of course, under the performance of the
However, under such a conventional system, as described above, the
Therefore, it is an object of the present invention to provide a method and system for controlling a license management server, a license management server, and a license management server, A hash value of a file is compared with a hash value of a legitimate software-side license-related file having the same version as the software, and a computation module >, And even if some members belonging to the organization obtain / install / operate illegal software of stand alone type separated from the network in the information device, the existence of the illegal software According to the procedure for verifying whether or not the hash value of the license related file is matched, (Such as a company, a school, a public agency, a group, etc.), or a software license manager belonging to the organization, And the like.
Other objects of the present invention will become more apparent from the following detailed description and the accompanying drawings.
delete
According to another aspect of the present invention, there is provided a license management system, comprising: a license management server installed in a member information device under a situation where a member information device installed with software communicates with a license management server via a network, Related file hash that analyzes the license-related file recorded in the license-related file list among the files constituting the software and calculates a hash value corresponding to the license-related file, A value processing agent; Related file hash value processing agent to obtain a hash value of the software-related license-related file, compares the hash value with a hash value of a legitimate software-side license-related file having the same version as the software, And a software illegal presence detection server for detecting the illegal use of the software according to whether the hash value matches or not, and for transmitting the detection result to the license management server side, wherein the license related file hash value processing agent performs the license management A license-related file list acquisition module for communicating with a server and acquiring a license-related file list related to license use of the software; Related file extraction module for extracting a license-related file having a file name identical to a file name recorded in the license-related file list among the files constituting the software by searching the software-related file list after reading the license- ; A hash value generation module for applying a hash function to the license related file extracted from the software and generating a hash value corresponding to the license related file; And a hash value transmission module communicating with the software illegal presence detection server and transmitting a hash value corresponding to the license related file to the software illegal presence detection server side. Discloses a software detection system.
According to the present invention, under the communication / program infrastructure of the license management server and the member information device, the independent process is performed independently of the license lease / acquisition procedure between the license management server and the software, A hash value is compared with a hash value of a license file of the legitimate software side having the same version as the software and a computational module capable of judging whether the software is illegal according to whether or not the hash value is matched is additionally arranged Therefore, even if some members belonging to the organization obtain / install / operate illegal software of a stand-alone type separated from the network in the self-information device under the implementation environment of the present invention, Verifies whether or not the hash value of the above license related file is matched The software licensing manager side of the organization (e.g., a company, a school, a public institution, a group, etc.) or a member of the software license manager belongs to the organization, the serious illegal software concealment / The intangible damage can be effectively avoided.
BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is an exemplary diagram conceptually showing a distribution pattern of a network-type license according to the prior art; FIG.
FIG. 2 is an exemplary diagram conceptually showing a distribution pattern of a network-type license employing the present invention; FIG.
FIG. 3 is an exemplary diagram conceptually showing a detailed configuration of a license-related file hash value processing agent according to the present invention; FIG.
4 is a diagram conceptually showing a detailed configuration of a software illegal-state detection server according to the present invention.
FIG. 5 is an exemplary diagram conceptually illustrating a detailed function execution procedure of a license-related file hash value processing agent according to the present invention; FIG.
FIG. 6 is an exemplary view conceptually illustrating a detailed function execution procedure of a software illegal state detection server according to the present invention; FIG.
Hereinafter, an illegal software detection system based on a network-type license distribution structure according to the present invention will be described in detail with reference to the accompanying drawings.
2, the
Under this procedure, for example, when the preset number of concurrent usable licenses is 20 and the total number of licenses to be further counted by the use of the license of the
However, under the above procedure, when the preset number of concurrent usable licenses is 20 and the total number of license usage counts added by the use of the license of the
Of course, under the function of the
On the other hand, under the system of the present invention, as described above, the
Under this sensitive situation, the license-related file hash
In this case, the license-related file hash
At this time, the software license manager side belonging to the organization accesses the
3, the license-related file hash
In this case, on the side of the operating
Under this situation, the license-related file hash
4, the software illegal
In this case, on the side of the operation
In addition, the process-based
Under this situation, the software
Hereinafter, an illegal software detection procedure based on the network-type license distribution structure inherent to the present invention through the association operation of the license related file hash
5, the license-related-file-
In this case, the list of license related files includes, for example, the name of the illegal detection target software, the license related file name of each version of the illegal detection target software (for example, aa.dll, bb.dll, cc. dll, etc.) are described.
In this way, the name of the illegal detection target software, the license related file name of each version of the illegal detection target software (for example, aa.dll, bb.dll, cc.dll in the case of XX version AA software) The license related
The access to the illegal
In this procedure, among the
In this way, among the
In this case, the hash function used by the hash
Of course, under such a hash value generation situation, the hash
Also, under such a hash value generation situation, the hash
On the other hand, a hash value for a license related file (for example, aa.dll file, bb.dll file, cc.dll file, etc.) constituting the illegal
In this case, the hash value report message includes the name of the software for generating the hash value, the version of the software to generate the hash value, the license related file (for example, aa.dll file, bb.dll file, cc.dll file Hash value of each license related file (e.g., aa.dll file, bb.dll file, cc.dll file, etc.), registration information of the
In this way, the name of the hash value creation target software, the version of the hash value creation target software, the name of the license related file (e.g., aa.dll file, bb.dll file, cc.dll file) When a hash value report message including / described the hash value of the license related file (e.g., aa.dll file, bb.dll file, cc.dll file, etc.) and the registration information of the
6, at the side of the hash
When the hash value report message generated by the hash
In a situation where the hash value report message generated by the hash
In this way, the hash value report message accumulated in the information storage area of the hash value storage module 304 (for example, the name of the hash value creation target software, the version of the hash value creation target software, The file name, the hash value of each license related file, the registration information of the
Under this procedure, for example, a hash value of the aa.dll file, which is a license-related file of the
However, if the hash value of the aa.dll file, which is a license-related file of the
As another example, a hash value of the bb.dll file, which is a license related file of the
In addition, the hash value of the bb.dll file, which is the license related file of the
On the other hand, through the above-described procedure, the detection result that the software (13, 13a, 13b) installed in the
In this way, the hash value report message acquired or stored by the hash
Through the above-described procedure, when a software illegal detection result message indicating the registration information of the
Of course, through the above-described procedure, a software illegal detection result message (a result of detection of illegal software, registration information of the
As described above, in the present invention, the license lease / acquisition procedure between the
The present invention is not limited to a specific field, and it has a generally useful effect in various fields where effective management of licenses is required.
Although specific embodiments of the present invention have been described and illustrated above, it is to be understood that the present invention may be embodied in many other specific forms without departing from the spirit or essential characteristics thereof.
Such modified embodiments should not be understood individually from the technical idea and viewpoint of the present invention, and such modified embodiments should be included in the appended claims of the present invention.
1,11: License management server
2,12: member information device
12a: Operating system
3, 3a, 3b, 13, 13a, 13b: software
4, 14: Network
15: License Manager Information Device
100: Illegal software detection system
200: License related file hash value processing agent
201: Interface module
202: Operational information storage module
203: license file list acquisition module
204: License related file extraction module
205: hash value generation module
206: Hash Value Transfer Module
300: Software Illegal Surveillance Server
301: Interface module
302: Operational information storage module
303: Hash value acquisition module
304: Hash value storage module
305: software illegal detection module
306: Process based information storage module
307: software illegal notification module
Claims (4)
Related file hash value processing agent to obtain a hash value of the software-related license-related file, compares the hash value with a hash value of the relevant software-related license file having the same version as the software, And a software illegal presence detection server for detecting the illegal use of the software according to whether the values match or not and for transmitting the detection result to the license management server side,
Wherein the license-related file hash value processing agent comprises: a license-related-file list acquisition module that communicates with the license management server and acquires a license-related file list related to license usage of the software;
Related file extraction module for extracting a license-related file having a file name identical to a file name recorded in the license-related file list among the files constituting the software by searching the software-related file list after reading the license- ;
A hash value generation module for applying a hash function to the license related file extracted from the software and generating a hash value corresponding to the license related file;
And a hash value transmission module communicating with the software illegal presence detection server and transmitting a hash value corresponding to the license related file to the software illegal presence detection server side. Software detection system.
The hash value of the software-related license-related file is compared with the hash value of the license-related file of the legitimate software-side license having the same version as the previously stored software, and whether or not the software is illegal is detected Software detection and detection module;
A software illegal presence notification module that communicates with the license management server and transmits a generated software illegal presence detection result message to the license management server side after generating a software illegal presence detection result message reflecting a result of detection of illegal software, Wherein the network-based license distribution structure is based on an illegal software detection system.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150122962A KR101680605B1 (en) | 2015-08-31 | 2015-08-31 | The system which detects a illegal software based on the network type licence circulation structure |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020150122962A KR101680605B1 (en) | 2015-08-31 | 2015-08-31 | The system which detects a illegal software based on the network type licence circulation structure |
Publications (1)
Publication Number | Publication Date |
---|---|
KR101680605B1 true KR101680605B1 (en) | 2016-12-12 |
Family
ID=57574043
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020150122962A KR101680605B1 (en) | 2015-08-31 | 2015-08-31 | The system which detects a illegal software based on the network type licence circulation structure |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR101680605B1 (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000030889A (en) | 2000-03-24 | 2000-06-05 | 유우영 | License management method and apparatus of software with computer network system |
KR20050012322A (en) | 2003-07-25 | 2005-02-02 | 엘지전자 주식회사 | A method for preventing unauthorized copying by issuing software license using a network |
KR20150056244A (en) * | 2013-11-15 | 2015-05-26 | (주)닥터소프트 | Terminal device and software managing method thereof |
-
2015
- 2015-08-31 KR KR1020150122962A patent/KR101680605B1/en active IP Right Grant
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20000030889A (en) | 2000-03-24 | 2000-06-05 | 유우영 | License management method and apparatus of software with computer network system |
KR20050012322A (en) | 2003-07-25 | 2005-02-02 | 엘지전자 주식회사 | A method for preventing unauthorized copying by issuing software license using a network |
KR20150056244A (en) * | 2013-11-15 | 2015-05-26 | (주)닥터소프트 | Terminal device and software managing method thereof |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9069936B2 (en) | Licensing verification for application use | |
US8769296B2 (en) | Software signature tracking | |
US9143509B2 (en) | Granular assessment of device state | |
CN110011848B (en) | Mobile operation and maintenance auditing system | |
US20150326618A1 (en) | Method of providing evidence collection tool, and apparatus and method for collecting digital evidence in domain separation-based mobile device | |
US20220329446A1 (en) | Enhanced asset management using an electronic ledger | |
US11562052B2 (en) | Computing system and method for verification of access permissions | |
KR102011363B1 (en) | Method for software authentication using block-chain authentication | |
CN106487752A (en) | A kind of method and apparatus for authentication-access safety | |
US11658996B2 (en) | Historic data breach detection | |
CN108256351B (en) | File processing method and device, storage medium and terminal | |
CN103488948A (en) | Method and device for achieving data security of operation system | |
US20130339731A1 (en) | Device-specific secure licensing | |
JP4711824B2 (en) | Business administrator terminal, environmental management station terminal, network operator terminal, business operator terminal, business administrator terminal control method, environmental management station terminal control method, network operator terminal control method, and business operator program | |
CN103841120A (en) | Data security management method, mobile terminal and system based on digital watermarking | |
CN113542191A (en) | Block chain based data access and verification method and device | |
CN112000933A (en) | Application software activation method and device, electronic equipment and storage medium | |
KR101680605B1 (en) | The system which detects a illegal software based on the network type licence circulation structure | |
US9122878B1 (en) | Software license management with drifting component | |
KR101680608B1 (en) | The system which detects a illegal software based on the network type licence circulation structure | |
US11611570B2 (en) | Attack signature generation | |
CN110677483A (en) | Information processing system and trusted security management system | |
CN109150863B (en) | Desktop cloud access control method and device and desktop cloud terminal equipment | |
US20240143805A1 (en) | Document protection mechanism | |
KR102421216B1 (en) | Method for activation of literary work based on certification and apparatus for performing the method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
GRNT | Written decision to grant |