소프트웨어 저작권 보호를 위한 전자 소프트웨어 유통 프로토콜의 설계

Design of Electronic Software Distribution Protocol for Software Copyright Protection

  • 발행 : 2001.12.31

초록

최근 초고속 통신망을 이용한 인터넷의 대중화와 더불어 인터넷을 기반으로 하는 전자상거래가 활발해지고 있다. 특히 인터넷을 통한 전자 소프트웨어 유통 (ESD: Electronic Software Distribution)은 많은 연구의 대상이 되고 있다. 하지만 기존의 모델들은 실질적인 불법복제방지와 저작권보호에 미흡하고 익명성의 보장이 어려운 단점이 있다. 따라서 본 논문에서는 공개키 기반 구조(PKI: Public Key Infrastructure) [l,2,3]에 기초하여 실질적인 저작권보호와 익명성을 보장하는 ESD 프로토콜을 제안한다. 제안된 기법은 익명을 원하는 구매자에 대한 정보를 판매자에게 제공하지 않으면서도 불법적인 복제와 유통을 억제하고 불법 복제와 유통이 발생할 시에 추적할 수 있는 장치를 제공함으로써 저작권을 보호한다. 또한 기존의 시리얼넘버(Serial Number)입력방식과 별도로 사용권을 설치해야하는 방식을 지양함으로써 사용자에게 보다 편리한 환경을 제공한다.

In recent years, e-Commerce is very active on the Internet, especially the World Wide Web along with the popularization of Internet using high-speed networks. Especially, Electronic Software Distribution(ESD) is widely being focused as one of the popular researches. However, the existing models of ESD lack substantial illegal copy protection or copyright protection as they have the shortcomings of guaranteeing anonymity of users. This study suggests an ESD protocol that guarantees substantial copyright protection and anonymity based on the Public Key Infrastrncture(PKl). The suggested method does not give the information of a buyer who doesn't want to reveal to a seller, and protects illegal copy and distribution as well. When it happens that illegal copies are in circulation, this method provides a device to trace back its original distributor so that it helps protect the copyright. In addition, it provides more convenient environment to the user by not using the methods of serial number input and extra installation to use.

키워드

참고문헌

  1. PKI, 'http://www.kisa.or.kr/technology/sub1/PKI.htm'
  2. Perlman, R., 'An overview of PKI trust models,' IEEE Network, Vol.13 No.6, pp.38-43, 1999 https://doi.org/10.1109/65.806987
  3. Oppliger, R., 'Authorization Methods for E-Commerce Applications,' Proceedings of the 1999 18th IEEE Symposium on Reliable Distributed Systems, pp.366-371, 1999 https://doi.org/10.1109/RELDIS.1999.805125
  4. Kalakota, R. and Whinston, B.A., 'Frontiers of Electronic Commerce,' IEEE Transactions on Components Packaging & Manufacturing Technology Part C: Manufacturing, Vol.19 No.2, 1996 https://doi.org/10.1109/TCPMC.1996.507151
  5. Yardan, S., 'Evaluating the Performances of Electronic Commerce System,' Proceedings of the 1997 Winter Simulation Conference, pp.1053-1056, 1997 https://doi.org/10.1145/268437.268739
  6. Jutla, D., Bodorik, P., Hajnal, C., and Davis, C., 'Making business sense of electronic commerce,' IEEE (us), Computer, Vol. 32, No.3, pp.67-75, 1999 https://doi.org/10.1109/2.751331
  7. ESD, 'http://www.esd.com/'
  8. ESD, 'http://www.previewsystems.com/get-started/index.html'
  9. 윤우성, 김태윤, 'UML을 이용한 불법 복제 방지를 위한 ESD 서버 설계', 정보처리학회 2000 춘계학술발표논문집, 제7권, 제1호
  10. 'http://www.esd.com/glossary/glossary1.html'
  11. Preview Systems, 'http://www.previewsystems.com'
  12. ESD models, 'http://www.siia.net/pubs/bookstore/items/wpe98.htm'
  13. Masud, S., 'Selling bits with Electronic Software Distribution,' Intertec Publishing Corporation(us), Vol.23 No.7, 1998
  14. Symantec, 'http://www.symantec.com/region/kr'
  15. Neal R. Wagner, 'Fingerprinting' IEEE Symposium on Security and Privacy, Oakland, pp.18-22, 1983
  16. Birgit Pfitzmann, Matthias Schunter, 'Asymmetric Fingerprinting' Advances in Cryptology - Euro Crypt'96, Proceedings, Springer-Verlag, pp.84-94, 1997
  17. Birgit Pfitzmann, Michael Waidner, 'Anonymous Fingerprinting' Advances in Cryptology - Euro Crypt'97, Lecture Notes in Computer Science, Springer- Verlag, Vol.1233, pp.88-102, 1997
  18. C. Collberg and C. Thomborson, 'Software Watermarking: Models and dynamic embeddings,' In Principles of Programming Languages 1999, POPL'99, San Antonio, TX, January 1999 https://doi.org/10.1145/292540.292569
  19. B. Chor, A. Fiat, and M. Naor, 'Tracing Traitors,' Advances in Cryptology-CRYPTO '94, LNCS, Springer-Verlag, pp. 257-262,1995
  20. Birgit Pfitzmann, 'Trials of Traced Traitors,' Information Hiding, Lecture Notes in Computer Science, Vol. 1174, pp.49-64, Springer-Verlag, 1996