当前位置:网站首页>Shen Ying, China Academy of communications and communications: font open source protocol -- Introduction to ofl v1.1 and analysis of key points of compliance
Shen Ying, China Academy of communications and communications: font open source protocol -- Introduction to ofl v1.1 and analysis of key points of compliance
2022-06-25 10:56:00 【Open source society】

| Reprinted from : Intellectual Property Center of China Academy of information and communication
| edit : Gaoyiyang
| Coordinating editor : Qian yingyu
| Design : Malina
introduction
OFL Interpretation of open source agreement
Most of the time , The application of fonts usually includes graphic printing or embedding in software projects . Generally speaking , In the context of font open source , have access to Apahce2.0 perhaps BSD Authorization by agreement , There are also open source licenses for fonts , Such as OFL license . for example , Google website font license agreement properties , Part of it is based on APACHE2.0 Of , And the other part is OFL Of .OFL The full name of the agreement is SIL Open Font License, It is an open source license specially established for fonts and related software based on relevant practical experience in font design and language software engineering , The most common version at present is V1.1. The license agreement is approved by the open source Promotion Association (OSI, Organizations that set standards for open source protocols ) authentication ,OSI It was posted on the official website OFL V1.1 The English full text of the license . meanwhile OFL It is also a free software license agreement , At the free software foundation FSF The official website of provides information about OFLV1.1 Agreement text and FAQ Link to .
OFL V1.1 The license is issued on 2007 year 2 month 26 Japan , The license terms cover both print and font software . The full text of the license is divided into copyright notice template 、 preface 、 Definition 、 Terms of authorization and Disclaimer , The following will be interpreted one by one :
1、 Copyright notice
Consistent with the copyright notices of most open source license agreements ,OFL V1.1 The copyright notice template of the license contains the copyright logo 、 date 、 Copyright holder and contact information .
2、 preface
The preface mainly expounds OFL The gist of the license and the basic authorization principles : On the premise that the font itself is not allowed to be sold separately , Encourage the use of fonts 、 Study 、 Modification and free dissemination .
3、 Definition
The definitions section describes the terms used in the terms of the agreement , Include “ Font software ”、“ Keep font name ”、“ The original version ”、“ Revised version ” and “ author ”.
4、 Terms of authorization
The licensing terms stipulate the various permissions granted by the font copyright owner to the font user and the attached constraints . The terms of authorization in this part can be divided into three categories , They are the powers granted 、 Proposed restrictions and prohibitions . The powers granted can be summed up in two points : First, the printed matter can use the font for free, and the printed matter using the font can be used commercially, and the printed matter does not need to carry the copyright notice and license text to use the font . The second is to use the font source file in the computer software , You need to carry the copyright notice and license text when distributing the software that uses the font source file , Except that the software only mentions the font name and does not call the font source file . The main limitations include : The font itself cannot be sold separately , And the modified font is not allowed to use the reserved font name . Prohibited items are : It is not allowed to use the name of the font copyright owner or organization for product publicity and promotion without explicit authorization .
5、 disclaimer
The disclaimer section is consistent with most open source software license agreements , Offer not to guarantee any risk arising from the use of this font , Including but not limited to product quality risk and infringement risk .
OFL Open source agreement compliance points
summary
Related reading | Related Reading
Reprint Alibaba open source project Egg.js Caused by technical documents “ Copyright disputes ”, Look loose MIT How to use the license ?
DataBricks From open source to commercialization
Activity Notice |EdgeX Developer Summit @ Nanjing station Come on. !

This article is from WeChat official account. - Kaiyuan society KAIYUANSHE(kaiyuanshe).
If there is any infringement , Please contact the [email protected] Delete .
Participation of this paper “OSC Source creation plan ”, You are welcome to join us , share .
边栏推荐
- This is enough for request & response
- Performance file system
- WPF prism framework
- NETCORE performance troubleshooting
- Es learning
- Google Earth Engine (Gee) - evaluate réalise le téléchargement en un clic de toutes les images individuelles dans la zone d'étude (certaines parties de Shanghai)
- Bitmap is converted into drawable and displayed on the screen
- Advanced single chip microcomputer -- development of PCB (2)
- Ouverture de l'inscription | le troisième marathon des hackers de pagaie est arrivé comme prévu.
- NuxtJS实战案例
猜你喜欢
随机推荐
性能之文件系统篇
Requirements and precautions for applying for multi domain SSL certificate
The real difference between i++ and ++i
Nuxtjs actual combat case
NETCORE performance troubleshooting
性能之内存篇
我希望按照我的思路盡可能將canvas基礎講明白
Flask blog practice - realize personal center and authority management
Google Earth Engine (Gee) - evaluate réalise le téléchargement en un clic de toutes les images individuelles dans la zone d'étude (certaines parties de Shanghai)
[file containing vulnerability-03] six ways to exploit file containing vulnerabilities
QT: parsing JSON
Get to know Prometheus
[paper reading | deep reading] line: large scale information network embedding
[observation] objectscale: redefining the next generation of object storage, reconstruction and innovation of Dell Technology
Flask blog practice - realize the latest articles and search in the sidebar
Five types of questions about network planning
Output reading: apply what you have learned
Oracle query comes with JDK version
CSRF攻击
之前字符串反转的题目