OVER-THE-AIR COPY PROTECTION : Using commonly used techniques
Taavettila, Heikki (2015)
Taavettila, Heikki
Oulun ammattikorkeakoulu
2015
All rights reserved
Julkaisun pysyvä osoite on
https://urn.fi/URN:NBN:fi:amk-201505127766
https://urn.fi/URN:NBN:fi:amk-201505127766
Tiivistelmä
This Master’s thesis examines how copy prevention and market segmentation via licensing could utilize the fact that virtually all mobile applications have connection to the Internet at least occasionally. It surveys existing technical tools and methods for an author of a software product to be able to provision features on units at another edge of the world. The thesis is about a project to replace an old copy prevention and system which was based on the installing a software license using an installation package.
The thesis will examine basic building blocks for secure communication. It will review modern cryptography techniques and how a public key cryptography enables two parties without pre-existing acquaintance to be able to agree a common secret key using an unsecure channel. Also, it studies an RSA asymmetric cryptography and a symmetric Rijndael cryptographic algorithm behind the AES standard. The thesis will discuss how cryptography is used together with Internet communication protocols establishing secure sockets over unsecure channels. The thesis will drill down to practical considerations of how a key token, a license file, can be used in product segmentation as well as unauthorized copy prevention. It discusses practical protection methods against attempts to work around copy prevention from network, server and mobile application points of view. This thesis will also examine the possibilities of implementing a server from different levels of cloud computing to having servers in own premises.
This thesis will offer a summary of available tools for designing any client/server solution with a demand for a high availability and secure communication. Naturally, there is room for a further development such as Elliptic Curve Cryptography and how it could be utilized in all relevant platforms. In addition, dockers as a technology is becoming increasingly mature and it might allow interesting opportunities. Also, business models like in-app-purchases are not covered at all.
The thesis will examine basic building blocks for secure communication. It will review modern cryptography techniques and how a public key cryptography enables two parties without pre-existing acquaintance to be able to agree a common secret key using an unsecure channel. Also, it studies an RSA asymmetric cryptography and a symmetric Rijndael cryptographic algorithm behind the AES standard. The thesis will discuss how cryptography is used together with Internet communication protocols establishing secure sockets over unsecure channels. The thesis will drill down to practical considerations of how a key token, a license file, can be used in product segmentation as well as unauthorized copy prevention. It discusses practical protection methods against attempts to work around copy prevention from network, server and mobile application points of view. This thesis will also examine the possibilities of implementing a server from different levels of cloud computing to having servers in own premises.
This thesis will offer a summary of available tools for designing any client/server solution with a demand for a high availability and secure communication. Naturally, there is room for a further development such as Elliptic Curve Cryptography and how it could be utilized in all relevant platforms. In addition, dockers as a technology is becoming increasingly mature and it might allow interesting opportunities. Also, business models like in-app-purchases are not covered at all.