KR20140011021A - Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone - Google Patents
Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone Download PDFInfo
- Publication number
- KR20140011021A KR20140011021A KR1020120062362A KR20120062362A KR20140011021A KR 20140011021 A KR20140011021 A KR 20140011021A KR 1020120062362 A KR1020120062362 A KR 1020120062362A KR 20120062362 A KR20120062362 A KR 20120062362A KR 20140011021 A KR20140011021 A KR 20140011021A
- Authority
- KR
- South Korea
- Prior art keywords
- application
- digital watermarking
- android
- market
- developer
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 34
- 238000003780 insertion Methods 0.000 claims description 5
- 230000037431 insertion Effects 0.000 claims description 5
- 230000002265 prevention Effects 0.000 claims 1
- 241000700605 Viruses Species 0.000 description 4
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/16—Program or content traceability, e.g. by watermarking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/12—Payment architectures specially adapted for electronic shopping systems
- G06Q20/123—Shopping for digital content
- G06Q20/1235—Shopping for digital content with control of digital rights management [DRM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/60—Digital content management, e.g. content distribution
- H04L2209/608—Watermarking
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Editing Of Facsimile Originals (AREA)
Abstract
The present invention is a method of inserting digital watermarking into an icon image of an application for preventing unauthorized copying and initial copy tracking of an application used in an Android platform-based smart mobile terminal.
Description
The present invention relates to a method for inserting and detecting digital watermarking to prevent unauthorized copying and tracking of maximum copy of an application used in an Android platform-based smart mobile terminal.
Recently, due to the rapid development and dissemination of smart mobile terminals, a large population has used smart mobile terminals.
A smart portable terminal is a small computer in which a user downloads and executes an application required by a user from an application market for each platform.
1 is a diagram illustrating an example in which an application developed by a developer and a developer is registered in a market and users download and use an application required by the market.
These applications are largely divided into free and paid standards, but in the case of free, they are distributed free of charge anyway, but it does not matter much, but the registered applications are paid for illegally by hackers and distributed freely through illegal markets.
In the case of paid applications, a lot of time and money are invested in development compared to free applications. As a result, many developers and developers suffer a lot of losses due to unauthorized piracy.
In addition, hackers don't just distribute paid applications for free, they insert malicious codes and viruses during piracy. Users who download and use this application from illegal markets will be exposed to malware and cause huge loss.
2 is a diagram illustrating an example in which hackers illegally copy a paid application and insert malware and viruses to distribute through illegal markets.
There are two types of platforms of smart mobile terminals. Apple's iOS and Google's Android, especially Android, is an open source platform, making it easier to attack than other platforms.
So Google provides a certification system called License Verification Library (LVL), which is a system that determines whether a user has justly purchased this application based on the purchase history of paid applications registered in the Google Android Market.
If you download and use an application that is not certified by LVL, that is, an illegal copy application, it will not be executed.
However, LVL eliminates the need for LVL certification if hackers use the reverse engineering of applications to disable the LVL source and then deploy it.
As a result, many hackers are paying the illegal applications by program reverse engineering technology and inserting and distributing malware and viruses to damage many users, developers, and developers.
Accordingly, the present invention provides a method for preventing piracy by inserting digital watermarking into an application icon image file for copyright protection and revealing who is the most replicator even when piracy is made.
According to one embodiment of the present invention for achieving the above object, in a method for preventing illegal copying of an application based on the Android platform, the method includes a developer and a developer registering a cryptographic key value together with a paid application in a Google application market. Making; Purchasing a desired application from a Google application market by a user using the smart platform based on the Android platform; Inserting the buyer information and the purchase information into the digital watermarking in the icon image file of the application requested by the user in the Google application market; Encrypting an apk file of the application into which the digital watermarking is inserted, using a key value provided by a developer and a developer; Transmitting the application apk file in which the digital watermarking insertion and encryption have been completed to a user who purchased the application; Detecting conformity by detecting digital watermarking of an application downloaded from the smart platform based on the Android platform; Comparing buyer information of the detected digital watermarking with information in a Google Android Market; When an application that is not formally purchased in the comparing step is executed, the application is not executed.
According to the present invention, when the buyer information is inserted into the application icon image file in the form of digital watermarking and compressed into an apk file, the method further includes encrypting the buyer with a key value provided by the developer and the developer. It is done.
According to the present invention, the method further includes the step of comparing the image file provided to the developer and the developer in case the application icon image file into which the digital watermarking containing the buyer information is inserted into another image file by a hacker. Characterized in that.
According to the present invention as described above, the existing LVL authentication system includes the authentication procedure source in the application program code, so that hackers disable the application using the program reverse engineering technology to disable the LVL authentication system. Digital watermarking, a method proposed in the present invention, has a robust effect compared to LVL authentication system because it goes through the authentication process in the Android platform layer.
And even if it is redistributed to the illegal market by hackers, the digital watermarking contains the buyer's information. It works.
1 is a flowchart illustrating a process of a current application registration and purchase procedure according to an embodiment of the present invention.
2 is a flowchart illustrating a process in which an illegal application is redistributed through an illegal market after illegal copying, malicious code, and virus insertion of an application according to an exemplary embodiment of the present invention.
3 is a flowchart illustrating a digital watermarking insertion and encryption process in an application according to an embodiment of the present invention.
4 is a flowchart illustrating a digital watermarking authentication procedure of a downloaded application according to an embodiment of the present invention.
Hereinafter, with reference to the accompanying drawings will be described in detail with respect to preferred embodiments of the present invention.
An object of the present invention is to provide an authentication method for confirming whether an application is formally purchased by inserting and detecting digital watermarking to prevent illegal copying of an Android platform based application.
3 is a flowchart illustrating a digital watermarking insertion and apk file encryption process according to an embodiment of the present invention.
Referring to FIG. 3, when a user using an Android platform-based smart mobile terminal purchases an application in the Google Android Market, the user's information is inserted into the application icon image file by digital watermarking in the market. Perform the steps.
In the digital watermarking as described above, the Google account, the purchase date, and the purchase amount of the buyer are converted into digital watermarking and inserted into the application icon image file as information on the buyer who purchased the application.
The reason why the icon image file is used in the above method is that digital watermarking is inserted into images, videos, audio files, etc., but there may be no video and audio files in each application. However, since the icon image file is an essential part of the application, digital watermarking is inserted into the icon image file.
When the digital watermarking is inserted into the application icon image file as described above, the application and the apk file are encrypted with the key value registered when the application is registered in the Google Android Market.
In order for a hacker to make illegal copies using reverse engineering, the apk file must first be decompressed and the source file decompiled or deassembled. Do not encrypt it.
For the above reason, the encrypted apk file is distributed to the user who requests the purchase.
4 is a flowchart illustrating a process of detecting and authenticating digital watermarking of an application downloaded by a purchaser's request according to an embodiment of the present invention.
Referring to FIG. 4, the digital watermarking is inserted in the market at the request of the buyer, and then the apk file of the provided application is downloaded and executed.
When the application is executed, digital watermarking is detected in the application icon image file executed in the Android platform layer.
It is determined whether the detected digital watermarking is a suitable digital watermarking or a digital watermark modulated by a hacker or an image file in which the digital watermarking is not detectable.
If the detected digital watermarking is not modulated, digital watermarking or digital watermarking is impossible, so the application is not executed and the Google Android Market, the developer and the developer are notified.
If the detected digital watermarking is a suitable digital watermarking, an authentication procedure for comparing the information of the buyer inserted in the digital watermarking with the information in the Google Android Market is performed.
If the authentication is successful in the authentication procedure, the application will operate normally.
However, if the authentication fails in the authentication process, the buyer information inserted in the digital watermarking becomes a hacker who distributes illegally for the first time because it is an illegally copied application.
The hacker's information will be notified to the Google Android Market, developers and developers.
As described above, by inserting the buyer's information into the application icon image file of the Android platform based on digital watermarking, encrypting and distributing it, and performing the authentication process, the illegal copying of the application based on the Android platform can be greatly reduced. Even if a copy is made, it is effective to know the information of the original copy.
The above description is for the embodiments of the present invention, and the content of the present invention is not limited to the above-described embodiments, and those skilled in the art can make various changes and modifications without departing from the technical spirit of the present invention. .
Therefore, the technical scope of the present invention should not be limited to the contents described in the detailed description in the specification but should be defined by the claims.
Claims (6)
Registering a paid application and an encryption key value provided by the developer or the developer in the Google Android Application Market;
Requesting a user of the smart platform based on the Android platform to purchase the paid application from the Google Android Application Market;
Inserting the buyer's Google account, the purchase date, and the purchase price information into the digital image of the icon image file of the pay application requested by the user in the Google Android application market; And
And encrypting an apk file of the application into which the digital watermarking is inserted in the Google Android application market using the encryption key value provided by a developer or a developer.
And transmitting the application apk file having the digital watermarking insertion and encryption completed from the Google Android application market to a smart mobile terminal of a user who purchased the application. Prevention method.
Detecting the digital watermarking of the application downloaded from the smart platform based on the android platform and comparing the digital watermarking information stored in the google android market, and then checking the suitability. How to prevent unauthorized copying of applications on smart mobile devices based on the Android platform.
If the detected digital watermarking is an appropriate digital watermarking, and if the digital watermarking is inappropriate, further comprising the step of notifying the Google Android application market, the developer and the developer. Copy protection method.
And if the detected digital watermarking is suitable, comparing the purchaser information with the information in the Google Android Application Market.
When the application is not officially purchased in the comparison step is executed, the application is not executed, and further comprising the step of notifying the Google Android Application Market, developers and developers of the buyer, that is, illegal distributor information registered in the digital watermarking Method for preventing unauthorized copying of smart mobile terminal based on Android platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120062362A KR20140011021A (en) | 2012-06-11 | 2012-06-11 | Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR1020120062362A KR20140011021A (en) | 2012-06-11 | 2012-06-11 | Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone |
Publications (1)
Publication Number | Publication Date |
---|---|
KR20140011021A true KR20140011021A (en) | 2014-01-28 |
Family
ID=50143406
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
KR1020120062362A KR20140011021A (en) | 2012-06-11 | 2012-06-11 | Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone |
Country Status (1)
Country | Link |
---|---|
KR (1) | KR20140011021A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105224833A (en) * | 2014-06-30 | 2016-01-06 | 北京金山安全软件有限公司 | Method and system for identifying whether application program is legal by using digital watermark |
CN107463806A (en) * | 2017-06-20 | 2017-12-12 | 国家计算机网络与信息安全管理中心 | The signature and sign test method of a kind of Android application programs installation kit |
CN107980132A (en) * | 2017-10-27 | 2018-05-01 | 福建联迪商用设备有限公司 | A kind of APK signature authentications method and system |
-
2012
- 2012-06-11 KR KR1020120062362A patent/KR20140011021A/en not_active Application Discontinuation
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105224833A (en) * | 2014-06-30 | 2016-01-06 | 北京金山安全软件有限公司 | Method and system for identifying whether application program is legal by using digital watermark |
CN107463806A (en) * | 2017-06-20 | 2017-12-12 | 国家计算机网络与信息安全管理中心 | The signature and sign test method of a kind of Android application programs installation kit |
CN107463806B (en) * | 2017-06-20 | 2020-08-14 | 国家计算机网络与信息安全管理中心 | Signature and signature verification method for Android application program installation package |
CN107980132A (en) * | 2017-10-27 | 2018-05-01 | 福建联迪商用设备有限公司 | A kind of APK signature authentications method and system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7716474B2 (en) | Anti-piracy software protection system and method | |
US8271390B2 (en) | Digital rights management (DRM) license manager | |
US8539240B2 (en) | Rights object authentication in anchor point-based digital rights management | |
US7802306B1 (en) | Multiple watermarks for digital rights management (DRM) and content tracking | |
US20040117664A1 (en) | Apparatus for establishing a connectivity platform for digital rights management | |
US20040225894A1 (en) | Hardware based method for digital rights management including self activating/self authentication software | |
US20040117663A1 (en) | Method for authentication of digital content used or accessed with secondary devices to reduce unauthorized use or distribution | |
US20040107368A1 (en) | Method for digital rights management including self activating/self authentication software | |
US20040117644A1 (en) | Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content | |
US20040117628A1 (en) | Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content | |
US20080256368A1 (en) | Method and Device For Protecting Digital Content in Mobile Applications | |
US11093587B2 (en) | Software wrapper and installer using timestamp validation and system identification validation | |
US20040117631A1 (en) | Method for digital rights management including user/publisher connectivity interface | |
EP2413257B1 (en) | Method for replacing an illegitimate copy of a software program with legitimate copy and corresponding system | |
CN109151506B (en) | Method, system and server for operating video file | |
CN110096849A (en) | A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing | |
EP3001341B1 (en) | NFC device, software installation method, software uninstallation method, computer program and article of manufacture | |
KR101642267B1 (en) | System for preventing forgery of application and method therefor | |
US8479014B1 (en) | Symmetric key based secure microprocessor and its applications | |
Jeong et al. | An anti-piracy mechanism based on class separation and dynamic loading for android applications | |
KR20140011021A (en) | Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone | |
CN111611551B (en) | Dynamic link library protection method and system based on cryptographic algorithm | |
KR101604892B1 (en) | Method and devices for fraud prevention of android-based applications | |
Bahaa-Eldin et al. | A comprehensive software copy protection and digital rights management platform | |
KR101711024B1 (en) | Method for accessing temper-proof device and apparatus enabling of the method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WITN | Withdrawal due to no request for examination |