Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Weak software watermark method used for software configuration management

A technology for software configuration management and software watermarking, which is used in electrical digital data processing, computer security devices, instruments, etc., to solve the problems of no version change, new programs not being submitted normally, and abnormal changes in program version numbers. The effect of high return on investment

Inactive Publication Date: 2009-08-12
GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] (1) It is not automatically known that someone has modified a certain part of the program (or document);
[0018] (2) Due to some special reasons, the content of the local program code (or document) has changed, but the version has not changed, so it cannot be submitted normally
As a result, the program has changed, but the version number of the program has not changed, so that the new program cannot be submitted normally;
[0019] (3) Due to some special reasons, the local program code has not changed, but the version number of the program has changed abnormally;
[0020] (4) When the project situation is more complicated, this technology correctly controls the version number, and the overhead is very large

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Weak software watermark method used for software configuration management
  • Weak software watermark method used for software configuration management
  • Weak software watermark method used for software configuration management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Various details involved in the method provided by the present invention will be described in detail below in conjunction with the accompanying drawings.

[0034] Such as figure 1 Shown, the specific implementation steps of the inventive method are as follows:

[0035] The first step: program grouping. Group the program code (including comments) in units of 500 lines (the number can be adjusted according to actual needs);

[0036] The second step: generation of watermark information. The watermark information includes program information, author information and modification time, where the author information is the machine name or the physical address of the machine, which is recorded as AUTHOR; the time information is the current time of the system, which is recorded as M_TIME; and the program information can be generated in two ways: One is to calculate the ASCII code sum of program code characters; the second ( figure 1 This is the way) to calculate the Hash valu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a novel fragile software watermarking method for software configuration management. The basic thought of the method is to fully utilize the frangibility of software watermarking to identify the version alteration of software and take watermarking information as an evidence of version identification and retrieval. The method comprises the following steps of: firstly, grouping program codes; secondly, generating various groups of code program information according to various groups of the program codes; thirdly, splicing the groups of the code program information to obtain integral program information; fourthly, splicing the integral program information, author information and time information to obtain final watermarking information; and finally embedding the watermarking information into a first code line containing a program start character of a first group of programs and a final code line containing a program end character of a final group of programs in a write file mode to obtain a program containing the watermarking information. The proposal can effectively overcome and solve the disadvantages and problems existing in the prior software version control method in the software configuration management, and can also be applied to technology such as software tamper resistance and content authentication at the same time.

Description

technical field [0001] The invention belongs to the field of computer science and technology, and relates to technologies such as software engineering, coding theory, computer algorithm, cryptography and computer program design, and in particular to software watermarking technology and software version control technology. Background technique [0002] As a new research field, software watermarking has received more and more attention from the industry. Scholars at home and abroad have paid more and more attention to the research of software watermarking. Compared with media watermarking such as images, software watermarking has more practical significance and can It will bring huge economic benefits to my country's informatization construction. With the rapid development of information technology and Internet technology, the software industry is facing great development opportunities, but also faces many challenges. But the following side effect is that the digital products ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/16
Inventor 肖俊朱健鹏王颖
Owner GRADUATE SCHOOL OF THE CHINESE ACAD OF SCI GSCAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products