The method of the internet authorization for the protection of shareware programs
DOI:
https://doi.org/10.15587/1729-4061.2014.26302Keywords:
computer program protection, piracy, authorization method, shareware, protocol, implementation, encryptionAbstract
The possibility of providing users with a shareware version of the program is promising for software developers. In this case, the user may use a fully working version for a limited period, or only part of the program functions, but without time limitation. However, this possibility is often a weak point in the software protection. There are many cases of unauthorized use of shareware programs.
The authors have developed a software protection protocol, including shareware programs, which is based on using the electronic digital signature mechanism.
In developing the program, its paid features are placed in a separate dynamic-link library DLL. The original file of the library is stored only on a remote server and is not distributed with the program upon its purchase. The file is loaded into the program memory at the time of its launch by the authorization over the Internet.
Description of the protocol of data transfer between the program and the remote server, as well as the method of the paid functional protection in the software, is given in the paper. In addition, the software implementation of the protocol was executed and, on its basis, the computer program protection module was developed.
This method in contrast to the existing allows a developer easily distribute software through the Internet without the worry about the possible appearance of illegal copies. Developer has the opportunity to monitor the process of using the licenses provided, reveal offenses and block licenses. The server part allows to "follow" the user's actions such as starting a program, creating a new document, using the data handler, generating a report, etc. and block the program in case of unauthorized use.
Providing licenses over the Internet allows the user quickly renew the license or replace one license with another.
References
- Erickson, J. (2008). Hacking: The Art of Exploitation, 2nd Edition. San Francisco: No Starch Press Inc., 488.
- Skljarov, D. V. (2004). Iskusstvo zashhity i vzloma informacii. SPb.: BHV-Peterburg, 288.
- Virtual machine. Available at : http://en.wikipedia.org/wiki/Virtual_machine
- Software as a service. Available at: http://en.wikipedia.org/wiki/ Software_as_a_service
- Copy Protection. Available at: http://www.zappersoftware.com/copy-protection.html
- Andrushhenko, D. M., Kozіna, G. L., Karpukov, L. M. (2012). Pat. 68078 Ukraina, MP G06F 12/00. Sposіb zahistu lіcenzіjnogo programnogo zabezpechennja vіd nesankcіonovanogo vikoristannja. Zajavnik ta patentovlasnik Zaporіzkij nacіonalnij tehnіchnij unіversitet. Opubl. 12.03.2012. Bjul. № 5/2012.
- Andrushhenko, D. M. (2011). Metod zashhity programmnogo obespechenija. Informacionnaja bezopasnost regionov Rossii (IBRR-2011). VII Sankt-Peterburgskaja mezhregionalnaja konferencija. Sankt-Peterburg, 100–101.
- Andrushhenko, D. M., Kozіna, G. L. (2012). Kompjuterna programa “Zahist programnih produktіv”. Svіdoctvo pro reєstracіju avtorskogo prava na tvіr №. 46740. Kiev: Derzhavnij departament іntelektual'noї vlasnostі Ukraїni. Data reestracіi: 11.12.2012.
- Moldovjan, N. A. (2010). Teoreticheskij minimum i algoritmy cifrovoj podpisi. SPb.: BHV-Peterburg, 304.
- Paret, D., Riesco, R. (2005). RFID and Contactless Smart Card Applications. doi:10.1002/9780470016152
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2014 Дмитрий Михайлович Андрущенко, Галина Леонидовна Козина
This work is licensed under a Creative Commons Attribution 4.0 International License.
The consolidation and conditions for the transfer of copyright (identification of authorship) is carried out in the License Agreement. In particular, the authors reserve the right to the authorship of their manuscript and transfer the first publication of this work to the journal under the terms of the Creative Commons CC BY license. At the same time, they have the right to conclude on their own additional agreements concerning the non-exclusive distribution of the work in the form in which it was published by this journal, but provided that the link to the first publication of the article in this journal is preserved.
A license agreement is a document in which the author warrants that he/she owns all copyright for the work (manuscript, article, etc.).
The authors, signing the License Agreement with TECHNOLOGY CENTER PC, have all rights to the further use of their work, provided that they link to our edition in which the work was published.
According to the terms of the License Agreement, the Publisher TECHNOLOGY CENTER PC does not take away your copyrights and receives permission from the authors to use and dissemination of the publication through the world's scientific resources (own electronic resources, scientometric databases, repositories, libraries, etc.).
In the absence of a signed License Agreement or in the absence of this agreement of identifiers allowing to identify the identity of the author, the editors have no right to work with the manuscript.
It is important to remember that there is another type of agreement between authors and publishers – when copyright is transferred from the authors to the publisher. In this case, the authors lose ownership of their work and may not use it in any way.