信息网络安全 ›› 2014, Vol. 14 ›› Issue (12): 7-11.doi: 10.3969/j.issn.1671-1122.2014.12.002

• 技术研究 • 上一篇    下一篇

一种基于机器指纹的可信软件水印技术研究

王伟1, 2, 张毅1, 2, 王刘程1, 2, 朱健伟3   

  1. 1. 同济大学计算机科学与技术系,上海 200092;
    2. 国家高性能计算机工程技术中心同济分中心,上海 200092;
    3. 中标软件有限公司,上海 200030
  • 收稿日期:2014-07-21 出版日期:2014-12-15
  • 通讯作者: 王伟 wwang@tongji.edu.cn
  • 作者简介:王伟(1979-),男,湖北,副教授,博士,主要研究方向:信息安全、并行分布式计算;张毅(1993-),男,四川,硕士研究生,主要研究方向:并行计算;王刘程(1991-),男,安徽,本科,主要研究方向:信息安全;朱健伟(1984-),男,上海,本科,主要研究方向:操作系统安全。
  • 基金资助:
    国家自然科学基金[61103068]; 教育部博士点基金[20110072120017]; 上海市科技人才计划[13XD1424400]; 信息安全国家重点实验室开放课题; 同济大学中央高校基本科研业务费专项资金

The Research on Trusted Software Watermarking Based on Machine Fingerprint

WANG Wei1, 2, ZHANG Yi1, 2, WANG Liu-cheng1, 2, ZHU Jian-wei3   

  1. 1. Department of Computer Science and Engineering, Tongji University, Shanghai 200092, China;
    2. Tongji Branch of National Engineering & Technology Center of High Performance Computer, Shanghai 200092, China;
    3. China Standard Software Co., Ltd., Shanghai 200030, China
  • Received:2014-07-21 Online:2014-12-15

摘要: 随着网络的发展和云计算的到来,互联网用户数量迅速增加。利用互联网传播成本低廉、方便快捷的特点,盗版软件在互联网用户间得到了快速广泛的流传。数字水印技术将一些标识信息直接嵌入数字载体当中或通过修改特定区域的结构来间接表示,且不影响原载体的使用价值。它们不容易被探知和再次修改,但可以被生产方识别和辨认。通过这些隐藏在载体中的信息,可以达到确认内容创建者、购买者,传送隐秘信息或者判断载体是否被篡改等目的。正是因为数字水印技术可以有效地发现数字文件被盗版和篡改等现象,近年来该技术得到了蓬勃的发展。文章在传统数字水印的研究基础上,针对传统数字水印在应对几何攻击和伪造攻击方面鲁棒性和确定性的不足,并结合可信计算技术中可信平台模块(TPM)的设计原理,提出一种全新的基于可信平台模块的数字水印生成方法。由该方法产生的数字水印攻击者难以仿制,同时可以鉴别用户和软件提供商双方的身份和安全状态,从而在保护版权的同时,也避免了软件因遭受感染而对计算机造成破坏,具有更加广泛的适用范围。

关键词: 可信计算, 可信平台模块, 软件水印, 机器指纹

Abstract: In recent years, with the prevalence of the Internet and cloud technology, digital products with copyright generated by people from all of the world, but at the same time the copyright pirate becomes commoner and commoner, which did a great harm to the interest of the providers. The technology of digital watermarking embeds some identifying information directly in a digital carrier or indirectly represents them via modifying the structure of a specific area, and does not affect the original value. The technology can be easily detected by the provider while difficult to the hackers, so it can completely tell the identification information. After the study of the existing methods of software watermarks which are totally based on the software’s attributes and the analysis of their disadvantages when face distortion attack and adding attack, this paper proposes a new method to generate digital watermarking with the help of the principles of trusted platform module (TPM) in trusted computing system. The digital watermarking generation method we proposed has great security, undetectability and robustness, avoids damages to the computer, and can be used much more broadly.

Key words: trusted computing, trusted platform module, software watermark, machine fingerprint

中图分类号: