Abstract:
실행파일의부분정보에기반한소프트웨어불법복제또는표절을탐지하는방법및 장치가개시된다. 본발명에따른탐지방법은대상소프트웨어를구성하는실행파일의적어도일부분을추출하는단계, 상기실행파일의적어도일부분에기초한버스마크(birthmark)를생성하는단계, 상기버스마크를정품소프트웨어들의버스마크들과비교하는단계및 상기비교에기초하여적어도하나의정품소프트웨어에대한상기대상소프트웨어의불법복제또는표절여부를결정하는단계를포함하여구성될수 있다. 따라서, 소프트웨어의실행파일만으로소프트웨어의불법복제또는표절을판별할수 있고, 실행파일의일부분만을이용하여버스마크를생성하므로, 대용량의실행파일에대해서도성능의제약을받지않고소프트웨어불법복제또는표절여부의판단이가능하다.
Abstract:
Disclosed are a method and a device to detect software similarity by using feature information of an execution file. According to the present invention, the method to detect software similarity includes a step of disassembling execution files of first and second software that become a comparison target -a first and second execution files-, a step of dividing a disassembled result of the first and second execution files into multiple blocks including a function call command, and a step of calculating similarity between blocks of the first execution file and blocks of the second execution file. Therefore, when the method of the present invention is used, illegal copy or plagiarism can be efficiently detected based on a binary execution file composing software without a source code.
Abstract:
An embodiment of the present invention relates to a method and system for authenticating software. A software execution device comprises: a communication unit to transmit or receive data through a network; a storage unit to store a transformation program received through the communication unit; a program execution unit to execute the transformation program; a volatile memory to load the transformation program from the storage unit; and an authentication unit to transmit authentication information through the communication unit and receiving a response code as a response, if the transformation program is executed, wherein the received response code is stored in the volatile memory, and the program execution unit replaces at least a part of the transformation program with the response code or a conversion code converted therefrom and executes the replaced transformation program. [Reference numerals] (S100) Request a program; (S110) Separate a code piece and generate a transformation program; (S120) Receive the transformation program; (S130) Execute the transformation program; (S140) Request authentication; (S150) Prepare authentication and the code piece; (S160) Receive the code piece; (S170) Combine and execute the transformation program and the code piece
Abstract:
PURPOSE: An automatic outflow prevention method of a software development document which is illegally photographed and a prevention system thereof are provided to detect and block important image circulation caused by illegal photography, thereby minimizing damage caused by illegal circulation. CONSTITUTION: A signature manufacturing terminal(100) generates a virus signature for detecting a signature pattern adhered to a software development document. When illegal circulation attempt of an image file for the software development document, which is illegally photographed, is performed, a virus tool(300) blocks illegal circulation by detecting the virus signature adhered to the software development document. The virus signature is adhered to a right top of the software development document. [Reference numerals] (200) Illegal photographer, disseminator PC; (300) Virus tool; (400) Communication network; (500) Movable storage medium(USB,CD); (AA) Software development document with a signature pattern; (BB) Software development document A; (CC) Attach a signature pattern 'A'; (DD) Software development document B; (EE) Attach a signature pattern 'B'; (FF) Software development document C; (GG) Attach a signature pattern 'N'; (HH) Generate a signature; (II) Illegal photographing; (JJ) Detect the signature; (KK) Block illegal circulation; (LL) Signature DB; (MM) Add new signatures
Abstract:
PURPOSE: A smart phone and a finger mouse in the smart phone are provided to mount the finger mouse in the smart phone, thereby supplementing or extending functions for a touch screen. CONSTITUTION: A moving body(110) receives a physical signal by using finger force after a user holds a finger mouse. A distance sensing module generates a sensing signal by sensing movement distance of the moving body based on the physical signal. The distance sensing module includes a first distance sensing module(120) and a second distance sensing module(130). [Reference numerals] (210) I/O interface; (220) Control unit; (220a) Moving body recognition module; (220b) Distance measurement module; (220c) Position measurement module; (230) Storage unit; (240) Front touch screen
Abstract:
본 발명에 따른 파일 탈취 방법은 시스템 내에 존재하며 보호될 필요가 있는 제한파일들에 대하여 제1코드가 상기 제한파일들로 삽입되는 단계; 시스템 내에 존재하는 파일들이 상기 시스템 외부로 전송되는 경우에, 제2코드가 상기 파일들로 삽입되는 단계; 및 상기 시스템 외부로 전송되는 상기 제1코드 및 상기 제2코드가 모두 삽입되어 악성코드로 인식되는 파일들을 필터링하는 단계를 포함한다. 악성코드, 파일 탈취, 보안
Abstract:
PURPOSE: A data enciphering method for reusing the encoding pad and an apparatus thereof are provided to maintain the stability of a coding function and reuse the encoded pad. CONSTITUTION: A pad arranger(23) divides an encoding/decoding pad consisting of a plurality of bits into a plurality of blocks. The blocks are disposed in order to correspond to the specific permutation. The PAD display part disposes something for bits comprising arranged blocks with the permutation in which blocks are arranged. An encoder(27) uses the pad arranged by the PAD display part. The data coding part transmits the information for permutation and encrypted data by the client.
Abstract:
PURPOSE: An apparatus for application copyright protection, a method thereof and a storing medium recorded with the program are provided to block the execution of an application, which is copied illegally in a smart phone, by itself without a specific device, and to enable a software developer or a software development company to manage normal execution or supply of library or update of a smart phone application directly, and to track a user who distributes the application illegally. CONSTITUTION: A first install unit (21) installs an execution code of a program excluding a part of code during initial execution. A download request unit (22) transmits user information to a first server (100), and requests the first server to download a part of code where the user information is inserted. A second install unit (23) supplements the execution code by downloading the partial code including the user information from the first server. A copy unit (24) performs dispersion copy of the user information inserted into the partial code to the execution code after the execution code is supplemented. [Reference numerals] (20) Copyright protection program; (21) First install unit; (22) Download request unit; (23) Second install unit; (24) Copy unit; (25) User information comparison unit