信息网络安全 ›› 2014, Vol. 14 ›› Issue (12): 7-11.doi: 10.3969/j.issn.1671-1122.2014.12.002

Previous Articles     Next Articles

The Research on Trusted Software Watermarking Based on Machine Fingerprint

WANG Wei1, 2, ZHANG Yi1, 2, WANG Liu-cheng1, 2, ZHU Jian-wei3   

  1. 1. Department of Computer Science and Engineering, Tongji University, Shanghai 200092, China;
    2. Tongji Branch of National Engineering & Technology Center of High Performance Computer, Shanghai 200092, China;
    3. China Standard Software Co., Ltd., Shanghai 200030, China
  • Received:2014-07-21 Online:2014-12-15

Abstract: In recent years, with the prevalence of the Internet and cloud technology, digital products with copyright generated by people from all of the world, but at the same time the copyright pirate becomes commoner and commoner, which did a great harm to the interest of the providers. The technology of digital watermarking embeds some identifying information directly in a digital carrier or indirectly represents them via modifying the structure of a specific area, and does not affect the original value. The technology can be easily detected by the provider while difficult to the hackers, so it can completely tell the identification information. After the study of the existing methods of software watermarks which are totally based on the software’s attributes and the analysis of their disadvantages when face distortion attack and adding attack, this paper proposes a new method to generate digital watermarking with the help of the principles of trusted platform module (TPM) in trusted computing system. The digital watermarking generation method we proposed has great security, undetectability and robustness, avoids damages to the computer, and can be used much more broadly.

Key words: trusted computing, trusted platform module, software watermark, machine fingerprint

CLC Number: