Font Size: a A A

The Key Problem Research On Softerware Protect

Posted on:2010-08-24Degree:DoctorType:Dissertation
Country:ChinaCandidate:J Q ZhuFull Text:PDF
GTID:1118360302466066Subject:Computer system architecture
Abstract/Summary:PDF Full Text Request
The massive spreading of broadband networks and new developments in digital technology have lead to the unrestricted transmission of digital content over the internet. More and more digital products such as music, pictures, e-books, software are transmitted through online communication and transactions. Digital content can easily be copied and modified illegally that caused enormous economic losses. Content providers are seeking technologies for protection of copyrighted content. In the past few decades, researchers have studied the digital copyright protection technology extensively and have achieved many results. The multimedia content copyright protection has been widely studied and discussed such as digital watermarking, security containers and security protocol. However, the copyright protection for software did not attach adequate importance. Clearly, there is strong need for developing more efficient and effective mechanisms to protect software to be illegally used. How to effectively protect intellectual property rights of digital products is an important issue for the software developers and consumers.Software copyright protection protocol is an important part of software security areas. It can prevent illegal copying and proliferation of the software content, confirm the copyright timely. It also can trace the software piracy and illegal copying, which effectively protects the software providers and the consumers that guarantee the healthy development of software industry. Software watermarking that is the main technology of information hiding is one of supporting technologies in realizing the software copyright protection protocols. How to embed the copyright information or the users fingerprint in the host software effectively is the core issue in software watermarking. The software industry is more demanding and looking forward to the strong robustness, high security and good performance software watermarking schemes. This paper studied the following aspects focusing on the key problems in software protection such as the software copyright detection, controlling the illegal copying and transmission, software watermarking and so on.(1) Present a novel software authentication protocol SRMP (Software Right Management Protocol) that dynamically distributes copyright. The mechanism is the separation of the software and the kernel that provides the supporting for the model of first trial and after purchase. Integrating the kernel, software environment and copyright information that effectively limit the software running in one machine (unique environment). It ensures the data security and integrality in the protocol exchange in network through encryption, authentication and digital signature that implements safe registration, software migrating and redistribution. It realizes the dynamical distributing copyright and solves the hard disk copy attacking by online to the server and register the kernel dynamically. The protocol achieves the users purchasing scheme of the license duration through the online server timestamps inspection of Ts tart and Tl ifetime.(2) Establish a concept of"company card"and SRMP_C scheme based on SRMP protocol, which binds the license and the dedicated"company card"together in order to effectively ensure the legal use of software in one machine with the"company card". This mechanism improves the operability and ease of use, prevents the illegal copying. Breaking the traditional mode of"one software one card". The mode of"one machine one card"can effectively improves the network load conditions and provides a new perspective for the dynamic authorization mechanism in the sense of protecting the copyright.(3) Propose a software license management protocol of ROI_SRMP for the copyright detection. With the information hiding technology means of software watermarking or fingerprints and so on, this protocol chooses a suitable watermarking algorithm according to the characteristics of the application software and takes the IDs (including the author, license management institution or users and so on), the information abstract of software, the watermarking ID and its key as the watermarking information to effectively realize the subsequent confirmation of the software copyright through the cryptograph technologies such as encryption, digital signature and so on. ROI_SRMP gives the safe use protocol for the software watermarking and provides guidance on the practical application in the field of copyright protection.(4) Give out a novel dynamic software watermarking scheme based on Shamir threshold and branch structure. The watermark is split into pieces with Shamir threshold scheme, the small particle size of watermarking piece is conducive to improve the stealth. With Shamir scheme, only partial information can retrieve the original watermark, which improves the robustness. The more of watermark pieces and reasonable distribution of embedding points will improve the part protection. Block cipher not only improves the safety (because it offers the ciphertext to the attackers) but also makes the watermark information more random. The technologies of self isomorphic mapping and check code form a"ring"structure between all the pieces, which can carry out the error-correcting and partial retrieval that improves the robustness. The cipher table is used, and all the pieces are embedded into different methods of program according to the dynamic behavior of branch structure. The branches are necessary in the program and can be seen any where. The resulting binary string won't change if the branches are reordered, or if instructions other than condition statements are inserted or deleted, which resists various kinds of attacks. The pretreatment of watermark decomposition, encryption and redundancy check code provides reference to pretreatment for software watermarking.(5) Present a novel planar TIPPCT tree (Two-dimensional Intensify PPCT) that holds higher data rate based on analysis of main topologies characteristics of current dynamic graph watermarking system (DGW). Multiple dimensional MIPPCT tree (Multi-dimensional Intensify PPCT) model and three identities vectors of DataRate , structure and Total concerning it are constructed and presented, then the effect of these vectors on MIPPCT model is discussed in detail . The results show that the data rate of MIPPCT tree will increase to a limit with its dimension number n increasing based on equal number of leaves and this limit is also computed. Moreover, it proved that there exists a two dimensional area HArea, when DataRate is in this area, dynamic graph watermarking system will take on greater performance.(6) Propose a novel tamper-proofing software watermarking scheme based on CLOC code of PPCT structure and constant tamper-proofing technology. Construct a"one to many"function with the watermark pieces and encode the function result into a constant. Embed the watermark into the whole program in the form of the parameters of opaque predicates, which makes the watermark pieces associated between each other. Once there being one or some attacked, it can feel and the whole program will not work that improves the tamper-proofing ability.
Keywords/Search Tags:Software protection, copyright protection, information hiding, Software Watermarking, HD clone, companion card, DWG, Data Rate, constant tamper-proofing, opaque predicate
PDF Full Text Request
Related items