A TECHNOLOGICAL SALVO FOR ANTI-
SOFTWARE PIRACYVijesh C M, T Dheeraj, Ashfaq N K23 October 2010
Software Piracy Rate & Commercial Value of Unlicensed Software
Overall Piracy Rate 2005: 35% 2009: 43%
Overall Commercial Value 2005: $ 34,482 2009: $ 51,411
Present Anti-Software Piracy Techniques File Encryption Security Dongles Genuine Advantage
Notification Copyright Laws
Why Is Then Piracy Still So Predominant?
Reverse Engineering: Software Cracking
Bypassing Product Key CheckBypassing GANModifying Softwares ExecutableCrack Time Controlled Softwares Counterfeit Product Keys
Software Keygen
EMERGENCE OF UNIVERSAL PIRACY MONITORING SYSTEM
UPMS Highlights
Track Even After Cracking (Counterfeit) Zero Hardware Upgrade Hack Proof Stops Software Piracy From Its Root
UPMS Implementation
Client Side (TROPS) ISP UPMS Server Software Vendors Server
TROPS Installation
After TROPS Installation
TROPSPacket
InternetAccess
UPMS In Action TROPS DATA:•Product ID•Product Version•Product Key•GUID•Hash•IP Address•Time(By UPMS Server)•TROPS ID
UPMS Server DB:•Product ID•Product Version•Product Key•GUID•Hash•IP Address•Time•TROPS ID•Software Status
Is UPMS Hack Proof ?
No Client Logs UGAN Redirected As Webpage MAC Address Spoof Proof
Limitations & Solutions
Limited to Online Users Standalone App. for offline users
ISP Approval Mandatory UPMS Certification
Concept of Software Cafes UPMS in the top of chain
FUTURE OF SOFTWARE ECOSYSTEM
QUESTIONS?
Is UPMS Hack Proof?HashWhat If Firewall Blocks TROPS ?Software Validation
Is UPMS Hack Proof ?
No Client Logs UGAN Redirected As Webpage MAC Address Spoof Proof
HASHFile FingerprintAlgorithms: Message-Digest Algorithm 5 (MD5) Secure Hash Algorithm 1 & 2 (SHA-1,SHA-2)
SHA-1:8684485fc1e8562e928d3ce8cbf3e5aa
Firewall
FIREWALL
Software Validation
Product IDProduct KeyGUID
Software Vendors Webserver