KR20140011021A - Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone - Google Patents

Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone Download PDF

Info

Publication number
KR20140011021A
KR20140011021A KR1020120062362A KR20120062362A KR20140011021A KR 20140011021 A KR20140011021 A KR 20140011021A KR 1020120062362 A KR1020120062362 A KR 1020120062362A KR 20120062362 A KR20120062362 A KR 20120062362A KR 20140011021 A KR20140011021 A KR 20140011021A
Authority
KR
South Korea
Prior art keywords
application
digital watermarking
android
market
developer
Prior art date
Application number
KR1020120062362A
Other languages
Korean (ko)
Inventor
김정현
Original Assignee
김정현
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 김정현 filed Critical 김정현
Priority to KR1020120062362A priority Critical patent/KR20140011021A/en
Publication of KR20140011021A publication Critical patent/KR20140011021A/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/16Program or content traceability, e.g. by watermarking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/608Watermarking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Editing Of Facsimile Originals (AREA)

Abstract

The present invention is a method of inserting digital watermarking into an icon image of an application for preventing unauthorized copying and initial copy tracking of an application used in an Android platform-based smart mobile terminal.

Description

Method for preventing unauthorized copying of the Android platform-based applications and inserting digital watermarking in order to track the first clone}

The present invention relates to a method for inserting and detecting digital watermarking to prevent unauthorized copying and tracking of maximum copy of an application used in an Android platform-based smart mobile terminal.

Recently, due to the rapid development and dissemination of smart mobile terminals, a large population has used smart mobile terminals.

A smart portable terminal is a small computer in which a user downloads and executes an application required by a user from an application market for each platform.

1 is a diagram illustrating an example in which an application developed by a developer and a developer is registered in a market and users download and use an application required by the market.

These applications are largely divided into free and paid standards, but in the case of free, they are distributed free of charge anyway, but it does not matter much, but the registered applications are paid for illegally by hackers and distributed freely through illegal markets.

In the case of paid applications, a lot of time and money are invested in development compared to free applications. As a result, many developers and developers suffer a lot of losses due to unauthorized piracy.

In addition, hackers don't just distribute paid applications for free, they insert malicious codes and viruses during piracy. Users who download and use this application from illegal markets will be exposed to malware and cause huge loss.

2 is a diagram illustrating an example in which hackers illegally copy a paid application and insert malware and viruses to distribute through illegal markets.

There are two types of platforms of smart mobile terminals. Apple's iOS and Google's Android, especially Android, is an open source platform, making it easier to attack than other platforms.

So Google provides a certification system called License Verification Library (LVL), which is a system that determines whether a user has justly purchased this application based on the purchase history of paid applications registered in the Google Android Market.

If you download and use an application that is not certified by LVL, that is, an illegal copy application, it will not be executed.

However, LVL eliminates the need for LVL certification if hackers use the reverse engineering of applications to disable the LVL source and then deploy it.

As a result, many hackers are paying the illegal applications by program reverse engineering technology and inserting and distributing malware and viruses to damage many users, developers, and developers.

Accordingly, the present invention provides a method for preventing piracy by inserting digital watermarking into an application icon image file for copyright protection and revealing who is the most replicator even when piracy is made.

According to one embodiment of the present invention for achieving the above object, in a method for preventing illegal copying of an application based on the Android platform, the method includes a developer and a developer registering a cryptographic key value together with a paid application in a Google application market. Making; Purchasing a desired application from a Google application market by a user using the smart platform based on the Android platform; Inserting the buyer information and the purchase information into the digital watermarking in the icon image file of the application requested by the user in the Google application market; Encrypting an apk file of the application into which the digital watermarking is inserted, using a key value provided by a developer and a developer; Transmitting the application apk file in which the digital watermarking insertion and encryption have been completed to a user who purchased the application; Detecting conformity by detecting digital watermarking of an application downloaded from the smart platform based on the Android platform; Comparing buyer information of the detected digital watermarking with information in a Google Android Market; When an application that is not formally purchased in the comparing step is executed, the application is not executed.

According to the present invention, when the buyer information is inserted into the application icon image file in the form of digital watermarking and compressed into an apk file, the method further includes encrypting the buyer with a key value provided by the developer and the developer. It is done.

According to the present invention, the method further includes the step of comparing the image file provided to the developer and the developer in case the application icon image file into which the digital watermarking containing the buyer information is inserted into another image file by a hacker. Characterized in that.

According to the present invention as described above, the existing LVL authentication system includes the authentication procedure source in the application program code, so that hackers disable the application using the program reverse engineering technology to disable the LVL authentication system. Digital watermarking, a method proposed in the present invention, has a robust effect compared to LVL authentication system because it goes through the authentication process in the Android platform layer.

And even if it is redistributed to the illegal market by hackers, the digital watermarking contains the buyer's information. It works.

1 is a flowchart illustrating a process of a current application registration and purchase procedure according to an embodiment of the present invention.
2 is a flowchart illustrating a process in which an illegal application is redistributed through an illegal market after illegal copying, malicious code, and virus insertion of an application according to an exemplary embodiment of the present invention.
3 is a flowchart illustrating a digital watermarking insertion and encryption process in an application according to an embodiment of the present invention.
4 is a flowchart illustrating a digital watermarking authentication procedure of a downloaded application according to an embodiment of the present invention.

Hereinafter, with reference to the accompanying drawings will be described in detail with respect to preferred embodiments of the present invention.

An object of the present invention is to provide an authentication method for confirming whether an application is formally purchased by inserting and detecting digital watermarking to prevent illegal copying of an Android platform based application.

3 is a flowchart illustrating a digital watermarking insertion and apk file encryption process according to an embodiment of the present invention.

Referring to FIG. 3, when a user using an Android platform-based smart mobile terminal purchases an application in the Google Android Market, the user's information is inserted into the application icon image file by digital watermarking in the market. Perform the steps.

In the digital watermarking as described above, the Google account, the purchase date, and the purchase amount of the buyer are converted into digital watermarking and inserted into the application icon image file as information on the buyer who purchased the application.

The reason why the icon image file is used in the above method is that digital watermarking is inserted into images, videos, audio files, etc., but there may be no video and audio files in each application. However, since the icon image file is an essential part of the application, digital watermarking is inserted into the icon image file.

When the digital watermarking is inserted into the application icon image file as described above, the application and the apk file are encrypted with the key value registered when the application is registered in the Google Android Market.

In order for a hacker to make illegal copies using reverse engineering, the apk file must first be decompressed and the source file decompiled or deassembled. Do not encrypt it.

For the above reason, the encrypted apk file is distributed to the user who requests the purchase.

4 is a flowchart illustrating a process of detecting and authenticating digital watermarking of an application downloaded by a purchaser's request according to an embodiment of the present invention.

Referring to FIG. 4, the digital watermarking is inserted in the market at the request of the buyer, and then the apk file of the provided application is downloaded and executed.

When the application is executed, digital watermarking is detected in the application icon image file executed in the Android platform layer.

It is determined whether the detected digital watermarking is a suitable digital watermarking or a digital watermark modulated by a hacker or an image file in which the digital watermarking is not detectable.

If the detected digital watermarking is not modulated, digital watermarking or digital watermarking is impossible, so the application is not executed and the Google Android Market, the developer and the developer are notified.

If the detected digital watermarking is a suitable digital watermarking, an authentication procedure for comparing the information of the buyer inserted in the digital watermarking with the information in the Google Android Market is performed.

If the authentication is successful in the authentication procedure, the application will operate normally.

However, if the authentication fails in the authentication process, the buyer information inserted in the digital watermarking becomes a hacker who distributes illegally for the first time because it is an illegally copied application.

The hacker's information will be notified to the Google Android Market, developers and developers.

As described above, by inserting the buyer's information into the application icon image file of the Android platform based on digital watermarking, encrypting and distributing it, and performing the authentication process, the illegal copying of the application based on the Android platform can be greatly reduced. Even if a copy is made, it is effective to know the information of the original copy.

The above description is for the embodiments of the present invention, and the content of the present invention is not limited to the above-described embodiments, and those skilled in the art can make various changes and modifications without departing from the technical spirit of the present invention. .

Therefore, the technical scope of the present invention should not be limited to the contents described in the detailed description in the specification but should be defined by the claims.

Claims (6)

In the method for preventing piracy and finding the first distributor of the application running on the smart platform based on Android platform,
Registering a paid application and an encryption key value provided by the developer or the developer in the Google Android Application Market;
Requesting a user of the smart platform based on the Android platform to purchase the paid application from the Google Android Application Market;
Inserting the buyer's Google account, the purchase date, and the purchase price information into the digital image of the icon image file of the pay application requested by the user in the Google Android application market; And
And encrypting an apk file of the application into which the digital watermarking is inserted in the Google Android application market using the encryption key value provided by a developer or a developer.
The method of claim 1,
And transmitting the application apk file having the digital watermarking insertion and encryption completed from the Google Android application market to a smart mobile terminal of a user who purchased the application. Prevention method.
3. The method of claim 2,
Detecting the digital watermarking of the application downloaded from the smart platform based on the android platform and comparing the digital watermarking information stored in the google android market, and then checking the suitability. How to prevent unauthorized copying of applications on smart mobile devices based on the Android platform.
The method of claim 3, wherein
If the detected digital watermarking is an appropriate digital watermarking, and if the digital watermarking is inappropriate, further comprising the step of notifying the Google Android application market, the developer and the developer. Copy protection method.
The method of claim 3, wherein
And if the detected digital watermarking is suitable, comparing the purchaser information with the information in the Google Android Application Market.
6. The method of claim 5,
When the application is not officially purchased in the comparison step is executed, the application is not executed, and further comprising the step of notifying the Google Android Application Market, developers and developers of the buyer, that is, illegal distributor information registered in the digital watermarking Method for preventing unauthorized copying of smart mobile terminal based on Android platform.
KR1020120062362A 2012-06-11 2012-06-11 Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone KR20140011021A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
KR1020120062362A KR20140011021A (en) 2012-06-11 2012-06-11 Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
KR1020120062362A KR20140011021A (en) 2012-06-11 2012-06-11 Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone

Publications (1)

Publication Number Publication Date
KR20140011021A true KR20140011021A (en) 2014-01-28

Family

ID=50143406

Family Applications (1)

Application Number Title Priority Date Filing Date
KR1020120062362A KR20140011021A (en) 2012-06-11 2012-06-11 Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone

Country Status (1)

Country Link
KR (1) KR20140011021A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224833A (en) * 2014-06-30 2016-01-06 北京金山安全软件有限公司 Method and system for identifying whether application program is legal by using digital watermark
CN107463806A (en) * 2017-06-20 2017-12-12 国家计算机网络与信息安全管理中心 The signature and sign test method of a kind of Android application programs installation kit
CN107980132A (en) * 2017-10-27 2018-05-01 福建联迪商用设备有限公司 A kind of APK signature authentications method and system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105224833A (en) * 2014-06-30 2016-01-06 北京金山安全软件有限公司 Method and system for identifying whether application program is legal by using digital watermark
CN107463806A (en) * 2017-06-20 2017-12-12 国家计算机网络与信息安全管理中心 The signature and sign test method of a kind of Android application programs installation kit
CN107463806B (en) * 2017-06-20 2020-08-14 国家计算机网络与信息安全管理中心 Signature and signature verification method for Android application program installation package
CN107980132A (en) * 2017-10-27 2018-05-01 福建联迪商用设备有限公司 A kind of APK signature authentications method and system

Similar Documents

Publication Publication Date Title
US7716474B2 (en) Anti-piracy software protection system and method
US8271390B2 (en) Digital rights management (DRM) license manager
US8539240B2 (en) Rights object authentication in anchor point-based digital rights management
US7802306B1 (en) Multiple watermarks for digital rights management (DRM) and content tracking
US20040117664A1 (en) Apparatus for establishing a connectivity platform for digital rights management
US20040225894A1 (en) Hardware based method for digital rights management including self activating/self authentication software
US20040117663A1 (en) Method for authentication of digital content used or accessed with secondary devices to reduce unauthorized use or distribution
US20040107368A1 (en) Method for digital rights management including self activating/self authentication software
US20040117644A1 (en) Method for reducing unauthorized use of software/digital content including self-activating/self-authenticating software/digital content
US20040117628A1 (en) Computer readable storage medium for enhancing license compliance of software/digital content including self-activating/self-authenticating software/digital content
US20080256368A1 (en) Method and Device For Protecting Digital Content in Mobile Applications
US11093587B2 (en) Software wrapper and installer using timestamp validation and system identification validation
US20040117631A1 (en) Method for digital rights management including user/publisher connectivity interface
EP2413257B1 (en) Method for replacing an illegitimate copy of a software program with legitimate copy and corresponding system
CN109151506B (en) Method, system and server for operating video file
CN110096849A (en) A kind of License authorization and authentication method, device, equipment and readable storage medium storing program for executing
EP3001341B1 (en) NFC device, software installation method, software uninstallation method, computer program and article of manufacture
KR101642267B1 (en) System for preventing forgery of application and method therefor
US8479014B1 (en) Symmetric key based secure microprocessor and its applications
Jeong et al. An anti-piracy mechanism based on class separation and dynamic loading for android applications
KR20140011021A (en) Method for preventing unauthorized copying of the android platform-based applications and inserting digital watermarking in order to track the first clone
CN111611551B (en) Dynamic link library protection method and system based on cryptographic algorithm
KR101604892B1 (en) Method and devices for fraud prevention of android-based applications
Bahaa-Eldin et al. A comprehensive software copy protection and digital rights management platform
KR101711024B1 (en) Method for accessing temper-proof device and apparatus enabling of the method

Legal Events

Date Code Title Description
WITN Withdrawal due to no request for examination