WO2010124893A1 - System for generating a warning of potential copyright infringements or license infringements in the field of software development - Google Patents
System for generating a warning of potential copyright infringements or license infringements in the field of software development Download PDFInfo
- Publication number
- WO2010124893A1 WO2010124893A1 PCT/EP2010/052645 EP2010052645W WO2010124893A1 WO 2010124893 A1 WO2010124893 A1 WO 2010124893A1 EP 2010052645 W EP2010052645 W EP 2010052645W WO 2010124893 A1 WO2010124893 A1 WO 2010124893A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- source code
- list
- infringements
- license
- copied
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/18—Legal services
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
Definitions
- the invention relates to a system in which, with the aid of a computer program, a comparison is made with list elements which indicate such injuries.
- the object on which the invention is based is now to specify a system for warning against potential copyright infringements or license violations in the software development area in such a way that the abovementioned disadvantages are avoided.
- the invention consists essentially in an automatic early detection of potential copyright infringements such that application programs such as web browsers, text editors, and development environments are extended to detect copy and paste operations of source code, and that of a monitoring software Address of the source code to be inserted with corresponding addresses of at least one negative list for potential violations are compared and the developer already before copying and pasting the source code to be copied a warning message is generated, if the address of the source code is in the negative list.
- a developer 1 uses an application software 2 to insert a source code 3 into a system source code 7 to be developed, the source code 3 either from a source Code Container 5 owned by company 9, or derived from an external source code container 14.
- a respective application program 2 is thereby extended so that, if a reuse of a source code 3 in a system source code 7 is attempted, the source of the source code is checked via its reference address or network address by a monitoring program 10.
- the monitoring program monitors whether or not the reference address is contained in a negative list or "black list" 12. In the event that the reference address is contained in this "black list" 12, the developer 1 is informed, for example that this reuse would potentially commit a copyright infringement or a license infringement.
- Application programs 2 such as web browsers, text editors and development environments, are expandable by so-called add-ons and thus these add-ons or add-on programs can determine whether the developer copies a source code from an external file or source code 3 into the one to be developed Insert system source code 7.
- Blacklists are lists of web pages 4, folders or files 5 or source code containers with source code that should not be reused or carefully re-used because licenses are required and the developer should be clearly warned by the monitoring program 10.
- a positive list or "white list” 11 is also maintained in which the reference addresses of source code expressly permitted for reuse are included.
- the white list represents a list of web pages 4, folders or files 5 or source code containers which should not be checked by the expansion software 10 To save computer resources and to avoid disruption of the developer.
- these include addresses of directories 5 that are known to contain only internally developed source code or addresses for web pages 4 with source code whose license terms are well known and accepted for which there is a valid license agreement.
- the "white list” and the “black list” must always be kept up to date by a list administrator 13.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Tourism & Hospitality (AREA)
- Human Resources & Organizations (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Multimedia (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Quality & Reliability (AREA)
- Operations Research (AREA)
- Data Mining & Analysis (AREA)
- Primary Health Care (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
Abstract
Description
Beschreibungdescription
System zur Warnung vor potentiellen Urheberrechtsverletzungen beziehungsweise Lizenzverletzungen im Softwareentwicklungsbe- reichSystem for warning about potential copyright infringements or license violations in the software development area
Die Erfindung betrifft ein System, bei dem mit Hilfe eines Computerprogramms ein Vergleich mit Listenelementen durchgeführt wird, die auf solche Verletzungen hindeuten.The invention relates to a system in which, with the aid of a computer program, a comparison is made with list elements which indicate such injuries.
Softwareentwickler arbeiten während ihrer täglichen Arbeit mit bestimmten Applikationen, wie beispielsweise Webbrowser, Texteditoren und Entwicklungsumgebungen, die beispielsweise mit Hilfe von Kopier- und Einfüge-Befehlen (Copy and Paste) die Wiederverwendung von Quellcode unterstützen. In vielen Fällen wird der wiederverwendbare Quellcode, meist über das Internet, von externen Quellen kopiert.Software developers work with specific applications such as web browsers, text editors, and development environments during their day-to-day work, such as copying and pasting commands to help reuse source code. In many cases, the reusable source code is copied from external sources, mostly over the Internet.
Viele Softwareentwickler verwenden ziemlich häufig wiederver- wendbare Quellcodes von externen Quellen in ihren Entwicklungssystemen und berücksichtigen dabei häufig nicht Urheberrechte oder Lizenzen. Dies bezieht auch mit ein, dass Entwickler häufig nicht wissen, ob sie den betreffenden Code wiederverwenden können, und wenn dem so ist, unter welchen Bedingungen. Als Folge davon werden Urheberrechts- beziehungsweise Lizenzverletzungen oftmals unerkannt begangen. Falls diese Verletzungen nicht vor einer Auslieferung des Systems, sondern erst später, beispielsweise durch einen Lizenzinhaber, erkannt werden, drohen dem Arbeitgeber des betreffenden Entwicklers aus dieser Verletzung rechtliche Konsequenzen .Many software developers quite often use reusable source code from external sources in their development systems, often without consideration of copyrights or licenses. This also implies that developers often do not know if they can reuse the code in question, and if so, under what conditions. As a result, copyright or license violations are often committed unrecognized. If these violations are not detected before delivery of the system, but only later, for example by a license holder, the employer of the developer in question may suffer legal consequences from this violation.
Heutzutage wird deshalb ein neu entwickelter System-Quellcode mit Unterstützung von entsprechenden Werkzeugen manuell über- prüft. Hierzu wird beispielsweise eine spezielle Software Blackduck™ ProtexIP http : //www. blackducksoftware . com/protex und http: //www. linuxdevices . cotn/news /NSS408733844.html oder einfach Text-Vergleichstools eingesetzt.Today, therefore, a newly developed system source code is manually checked with the assistance of appropriate tools. For example, a special software Blackduck ™ ProtexIP http: // www. black duck software. com / protex and http: // www. linuxdevices. cotn / news /NSS408733844.html or simply text comparison tools used.
Eine entsprechende Überprüfung des gesamten System Source Codes ist relativ teuer. Die Beseitigung potentieller Lizenz- Verletzungen bedeutet, dann dass unter Umständen große Teile des System-Quellcodes neu geschrieben werden müssen, was unter Umständen extrem teuer sein kann.An appropriate review of the entire system source code is relatively expensive. Eliminating potential license violations means that large parts of the system's source code may have to be rewritten, which can be extremely expensive.
Die der Erfindung zugrunde liegende Aufgabe besteht nun dar- in, ein System zur Warnung vor potentiellen Urheberrechtsverletzungen beziehungsweise Lizenzverletzungen im Softwareentwicklungsbereich derart anzugeben, dass die oben genannten Nachteile vermieden werden.The object on which the invention is based is now to specify a system for warning against potential copyright infringements or license violations in the software development area in such a way that the abovementioned disadvantages are avoided.
Diese Aufgabe wird erfindungsgemäß durch die Merkmale des Patentanspruchs 1 gelöst. Die weiteren Ansprüche betreffen vorteilhafte Ausgestaltungen der Erfindung.This object is achieved by the features of claim 1. The other claims relate to advantageous embodiments of the invention.
Die Erfindung besteht im Wesentlichen in einer automatischen frühen Detektion von potentiellen Urheberrechts- beziehungsweise Lizenzverletzungen derart, dass Applikationsprogramme, wie zum Beispiel Webbrowser, Texteditoren und Entwicklungsumgebungen, so erweitert werden, dass Kopier- und Einfügevorgänge von Quellcodes festgestellt werden und dass von einer Überwachungssoftware die jeweilige Adresse des einzufügenden Quellcodes mit entsprechenden Adressen mindestens einer Negativliste für potentielle Verletzungen verglichen werden und für den Entwickler bereits vor dem Kopieren und Einfügen des zu kopierenden Quellcodes eine Warnmeldung erzeugt wird, so- fern sich die Adresse des Quellcodes in der Negativliste befindet .The invention consists essentially in an automatic early detection of potential copyright infringements such that application programs such as web browsers, text editors, and development environments are extended to detect copy and paste operations of source code, and that of a monitoring software Address of the source code to be inserted with corresponding addresses of at least one negative list for potential violations are compared and the developer already before copying and pasting the source code to be copied a warning message is generated, if the address of the source code is in the negative list.
Nachfolgend wird die Erfindung anhand eines in der Zeichnung dargestellten Ausführungsbeispiels näher erläutert.The invention will be explained in more detail with reference to an embodiment shown in the drawing.
Ein Entwickler 1 benutzt eine Applikationssoftware 2, um einen Quellcode 3 in einen zu entwickelnden System-Quellcode 7 einzufügen, wobei der Quellcode 3 entweder aus einem Source Code Container 5, der der eigenen Firma 9 gehört, oder aus einem externen 14 Source Code Container 4 stammt.A developer 1 uses an application software 2 to insert a source code 3 into a system source code 7 to be developed, the source code 3 either from a source Code Container 5 owned by company 9, or derived from an external source code container 14.
Ein jeweiliges Applikationsprogramm 2 wird dabei so erwei- tert, dass, wenn eine Wiederverwendung eines Quellcodes 3 in einem System-Quellcode 7 versucht wird, durch eine Überwachungsprogramm 10 die Quelle des Quellcodes über seine Bezugsadresse oder Netzadresse überprüft wird. Dabei überwacht das Überwachungsprogramm, ob die Bezugsadresse in einer Nega- tivliste bzw. „schwarzen Liste" 12 enthalten ist oder nicht. Für den Fall, dass die Bezugsadresse in dieser „schwarzen Liste" 12 enthalten ist, wird an den Entwickler 1 bspw. mitgeteilt, dass er durch diese Wiederverwendung potenziell eine Urheberrechtsverletzung beziehungsweise eine Lizenzverletzung begehen würde.A respective application program 2 is thereby extended so that, if a reuse of a source code 3 in a system source code 7 is attempted, the source of the source code is checked via its reference address or network address by a monitoring program 10. In this case, the monitoring program monitors whether or not the reference address is contained in a negative list or "black list" 12. In the event that the reference address is contained in this "black list" 12, the developer 1 is informed, for example that this reuse would potentially commit a copyright infringement or a license infringement.
Applikationsprogramme 2, wie zum Beispiel Webbrowser, Texteditoren und Entwicklungsumgebungen, sind durch so genannte Add Ons erweiterbar und somit können diese Add Ons oder Zu- satzprogramme feststellen, ob der Entwickler einen Quellcode von einem externen File kopiert bzw. den Quellcode 3 in den zu entwickelnden System-Quellcode 7 einfügt.Application programs 2, such as web browsers, text editors and development environments, are expandable by so-called add-ons and thus these add-ons or add-on programs can determine whether the developer copies a source code from an external file or source code 3 into the one to be developed Insert system source code 7.
Schwarze Listen sind Listen von Webseiten 4, Ordnern oder Da- teien 5 oder Source Code Container mit Quellcodes die nicht oder vorsichtig wiederverwendet werden sollen, weil entsprechende Lizenzen bestehen und der Entwickler deutlich durch das Überwachungsprogramm 10 gewarnt werden soll.Blacklists are lists of web pages 4, folders or files 5 or source code containers with source code that should not be reused or carefully re-used because licenses are required and the developer should be clearly warned by the monitoring program 10.
In einer vorteilhaften Weiterbildung der Erfindung wird zusätzlich zur „schwarzen Liste" noch eine Positivliste bzw. „weiße Liste" 11 geführt, in der die Bezugsadressen von zur Wiederverwendung ausdrücklich erlaubten Quellcodes enthalten sind.In an advantageous development of the invention, in addition to the "black list", a positive list or "white list" 11 is also maintained in which the reference addresses of source code expressly permitted for reuse are included.
Die weiße Liste stellt eine Liste von Webseiten 4, Ordnern oder Dateien 5 oder Source Code Containern dar, welche nicht von der Erweiterungssoftware 10 überprüft werden sollen, um Computerressourcen zu sparen und eine Störung des Entwicklers zu vermeiden. Beispielsweise zählen hierzu Adressen von Verzeichnissen 5, die dafür bekannt sind, dass sie nur intern entwickelte Quellcodes oder Adressen für Webseiten 4 mit Quellcode enthalten, dessen Lizenzbedingungen gut bekannt und akzeptiert sind für den es einen gültigen Lizenzvertrag gibt.The white list represents a list of web pages 4, folders or files 5 or source code containers which should not be checked by the expansion software 10 To save computer resources and to avoid disruption of the developer. For example, these include addresses of directories 5 that are known to contain only internally developed source code or addresses for web pages 4 with source code whose license terms are well known and accepted for which there is a valid license agreement.
In einer weiteren vorteilhaften Ausgestaltung der Erfindung, wird vom Überwachungsprogramm 10 festgestellt, dass die Be- zugsadresse des wieder zu verwendenden Quellcodes 3 weder in der „weißen Liste" noch in der „schwarzen Liste" enthalten ist, und der Entwickler durch eine „Unklar"-Warnmmeldung zu einer Überprüfung des Copyrights oder der Lizenz aufgefordert.In a further advantageous embodiment of the invention, it is ascertained by the monitoring program 10 that the reference address of the source code 3 to be reused is contained neither in the "white list" nor in the "black list", and the developer by an "unclear" Warning message asking for a review of the copyright or license.
Die „weiße Liste" und die „schwarze Liste" müssen von einem Listenadministrator 13 immer auf dem neuesten Stand gehalten werden . The "white list" and the "black list" must always be kept up to date by a list administrator 13.
Claims
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| DE102009019649.8 | 2009-04-30 | ||
| DE102009019649 | 2009-04-30 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2010124893A1 true WO2010124893A1 (en) | 2010-11-04 |
Family
ID=42236714
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/EP2010/052645 Ceased WO2010124893A1 (en) | 2009-04-30 | 2010-03-03 | System for generating a warning of potential copyright infringements or license infringements in the field of software development |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2010124893A1 (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103871182A (en) * | 2014-04-09 | 2014-06-18 | 哈尔滨天源石化装备制造有限责任公司 | Perimeter alarm system special for oil depot |
| CN103886729A (en) * | 2014-03-03 | 2014-06-25 | 深圳市敢为软件技术有限公司 | Method and system for displaying alarm video |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP1610239A2 (en) * | 2004-06-22 | 2005-12-28 | Sony Corporation | Content transferring apparatus, content transferring method, and computer program |
| US20070009230A1 (en) * | 2004-07-21 | 2007-01-11 | Koujirou Tanaka | Content processing device, content processing method, and computer program |
| US20090089754A1 (en) * | 2003-11-25 | 2009-04-02 | Software Analysis And Forensic Engineering Corporation | Detecting Plagiarism In Computer Source Code |
-
2010
- 2010-03-03 WO PCT/EP2010/052645 patent/WO2010124893A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20090089754A1 (en) * | 2003-11-25 | 2009-04-02 | Software Analysis And Forensic Engineering Corporation | Detecting Plagiarism In Computer Source Code |
| EP1610239A2 (en) * | 2004-06-22 | 2005-12-28 | Sony Corporation | Content transferring apparatus, content transferring method, and computer program |
| US20070009230A1 (en) * | 2004-07-21 | 2007-01-11 | Koujirou Tanaka | Content processing device, content processing method, and computer program |
Non-Patent Citations (1)
| Title |
|---|
| PAUL CLOUGH: "Plagiarism in natural and programming languages: an overview of current tools and technologies", INTERNET CITATION, 31 July 2000 (2000-07-31), pages 1 - 31, XP002572785, Retrieved from the Internet <URL:http://www.dcs.shef.ac.uk/nlp/meter/Documents/reports/plagiarism/Plag iarism.rtf> [retrieved on 20100312] * |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103886729A (en) * | 2014-03-03 | 2014-06-25 | 深圳市敢为软件技术有限公司 | Method and system for displaying alarm video |
| CN103886729B (en) * | 2014-03-03 | 2016-06-08 | 深圳市敢为软件技术有限公司 | Warning image display method and system |
| CN103871182A (en) * | 2014-04-09 | 2014-06-18 | 哈尔滨天源石化装备制造有限责任公司 | Perimeter alarm system special for oil depot |
| CN103871182B (en) * | 2014-04-09 | 2016-02-03 | 哈尔滨天源石化装备制造有限责任公司 | The special perimeter alarm system of oil depot |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP1176482B1 (en) | Method and computer program for generating a regulation or control system | |
| DE102008015662B4 (en) | Elimination of data | |
| DE60001976T2 (en) | METHOD AND SYSTEM FOR BACKING UP / RECOVERING FILES STORED IN A SINGLE PLACE | |
| DE112011104356B4 (en) | Updating software images based on streaming technology | |
| DE10348591A1 (en) | Automatically identifying a program error in a computer program | |
| WO2005033934A2 (en) | Flexible software update for automation systems via internet | |
| DE112012000693T5 (en) | Execute a variety of instances of an application | |
| EP3217236B1 (en) | Method and system for generating a control program in the form of a mobile application which runs on a mobile device | |
| EP1723513A1 (en) | Method for configuring a computer program | |
| WO2010124893A1 (en) | System for generating a warning of potential copyright infringements or license infringements in the field of software development | |
| DE69618007T2 (en) | ERROR DATA DETECTION ON THE RESTART OF A COMPUTER | |
| EP2977888A1 (en) | Method and system for storage and version management of computer programs | |
| DE102008037651B4 (en) | Method for communication between two unchangeable application programs and computer programs | |
| DE60004788T2 (en) | PROCEDURE FOR DETECTING HIDDEN TEXT AND USE THEREOF FOR APPROVAL OF ELECTRONIC DOCUMENTS | |
| EP1701266A1 (en) | Test apparatus for verification of a batch processing | |
| EP1202166B1 (en) | System for verification of software application models in strings of software development tools | |
| DE102021202133A1 (en) | Method, device and configuration environment for generating configuration data for a control unit | |
| DE102021207046A1 (en) | Upgrading or updating a software application | |
| DE60213008T2 (en) | ARRANGEMENT AND METHOD FOR SUPPORTING THE PROCESS / APPLICATION CONTROL | |
| EP3588340B1 (en) | Computer-implemented method for operating a data storage device | |
| WO2004034246A2 (en) | Method and device for the automatic generation of program code, documentation text and management information bases using the data of a database | |
| DE19851727B4 (en) | Method and device for automatically integrating external archive systems on a central archive system | |
| DE112013004668T5 (en) | Maintaining the integrity of an output of code generators | |
| EP2296360A1 (en) | Method for designing and generating printed products | |
| DE19926370A1 (en) | System for documentation, archiving and locating re-useable software components has version management system, central documentation generation system, search engine, web server |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10707884 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 10707884 Country of ref document: EP Kind code of ref document: A1 |