The method of the internet authorization for the protection of shareware programs

Authors

  • Дмитрий Михайлович Андрущенко Zaporizhzhya National Technical University Str. Zhukovskogo 64, Zaporizhia, Ukraine, 69063, Ukraine https://orcid.org/0000-0001-7008-6944
  • Галина Леонидовна Козина Zaporizhzhya National Technical University Str. Zhukovskogo 64, Zaporizhia, Ukraine, 69063, Ukraine

DOI:

https://doi.org/10.15587/1729-4061.2014.26302

Keywords:

computer program protection, piracy, authorization method, shareware, protocol, implementation, encryption

Abstract

The possibility of providing users with a shareware version of the program is promising for software developers. In this case, the user may use a fully working version for a limited period, or only part of the program functions, but without time limitation. However, this possibility is often a weak point in the software protection. There are many cases of unauthorized use of shareware programs.

The authors have developed a software protection protocol, including shareware programs, which is based on using the electronic digital signature mechanism.

In developing the program, its paid features are placed in a separate dynamic-link library DLL. The original file of the library is stored only on a remote server and is not distributed with the program upon its purchase. The file is loaded into the program memory at the time of its launch by the authorization over the Internet.

Description of the protocol of data transfer between the program and the remote server, as well as the method of the paid functional protection in the software, is given in the paper. In addition, the software implementation of the protocol was executed and, on its basis, the computer program protection module was developed.

This method in contrast to the existing allows a developer easily distribute software through the Internet without the worry about the possible appearance of illegal copies. Developer has the opportunity to monitor the process of using the licenses provided, reveal offenses and block licenses. The server part allows to "follow" the user's actions such as starting a program, creating a new document, using the data handler, generating a report, etc. and block the program in case of unauthorized use.

Providing licenses over the Internet allows the user quickly renew the license or replace one license with another.

Author Biographies

Дмитрий Михайлович Андрущенко, Zaporizhzhya National Technical University Str. Zhukovskogo 64, Zaporizhia, Ukraine, 69063

Assistant

Department of Information Protection

Галина Леонидовна Козина, Zaporizhzhya National Technical University Str. Zhukovskogo 64, Zaporizhia, Ukraine, 69063

Cand. Sc. Physics and Mathematics, Associate Professor

Department of Information Protection

References

  1. Erickson, J. (2008). Hacking: The Art of Exploitation, 2nd Edition. San Francisco: No Starch Press Inc., 488.
  2. Skljarov, D. V. (2004). Iskusstvo zashhity i vzloma informacii. SPb.: BHV-Peterburg, 288.
  3. Virtual machine. Available at : http://en.wikipedia.org/wiki/Virtual_machine
  4. Software as a service. Available at: http://en.wikipedia.org/wiki/ Software_as_a_service
  5. Copy Protection. Available at: http://www.zappersoftware.com/copy-protection.html
  6. Andrushhenko, D. M., Kozіna, G. L., Karpukov, L. M. (2012). Pat. 68078 Ukraina, MP G06F 12/00. Sposіb zahistu lіcenzіjnogo programnogo zabezpechennja vіd nesankcіonovanogo vikoristannja. Zajavnik ta patentovlasnik Zaporіzkij nacіonalnij tehnіchnij unіversitet. Opubl. 12.03.2012. Bjul. № 5/2012.
  7. Andrushhenko, D. M. (2011). Metod zashhity programmnogo obespechenija. Informacionnaja bezopasnost regionov Rossii (IBRR-2011). VII Sankt-Peterburgskaja mezhregionalnaja konferencija. Sankt-Peterburg, 100–101.
  8. Andrushhenko, D. M., Kozіna, G. L. (2012). Kompjuterna programa “Zahist programnih produktіv”. Svіdoctvo pro reєstracіju avtorskogo prava na tvіr №. 46740. Kiev: Derzhavnij departament іntelektual'noї vlasnostі Ukraїni. Data reestracіi: 11.12.2012.
  9. Moldovjan, N. A. (2010). Teoreticheskij minimum i algoritmy cifrovoj podpisi. SPb.: BHV-Peterburg, 304.
  10. Paret, D., Riesco, R. (2005). RFID and Contactless Smart Card Applications. doi:10.1002/9780470016152

Published

2014-07-24

How to Cite

Андрущенко, Д. М., & Козина, Г. Л. (2014). The method of the internet authorization for the protection of shareware programs. Eastern-European Journal of Enterprise Technologies, 4(2(70), 23–27. https://doi.org/10.15587/1729-4061.2014.26302