Method for restricting illegal JAVA software operation by using software watermarks

A software watermarking and watermarking technology, which is applied in the direction of instrument, program/content distribution protection, electronic digital data processing, etc., can solve the problems of malicious software attack, lack of verification of JAVA software, etc., achieve good anti-attack ability and meet the security requirements of JAVA software operation Requirements for performance and operating efficiency, effects of good operating performance

Active Publication Date: 2012-11-14
TSINGHUA UNIV
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this solution lacks verification for the local JAVA software, and there is a possibility of being attacked by malware

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for restricting illegal JAVA software operation by using software watermarks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The method for restricting the operation of illegal JAVA software by utilizing software watermarks proposed by the present invention has a flow chart as follows: figure 1 shown, including the following steps:

[0029] (1) Embed a watermark in the JAVA software submitted by the user, and the embedding process includes the following steps:

[0030] (1-1) Build a JAVA software watermark generation module, and generate a JAVA software watermark according to the identity of the user submitting the JAVA software;

[0031] (1-2) Construct a JAVA software watermark embedding module including multiple watermark embedding methods;

[0032] (1-3) Select a software watermark embedding method from the JAVA software watermark embedding module according to the requirements of the submitted JAVA software user. The specific process is as follows:

[0033] (1-3-1) If the user requires the software watermark to have strong robustness, select the dynamic watermark embedding method;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for restricting illegal JAVA software operation by using software watermarks, belonging to the technical field of software protection. The method comprises the following steps of: embedding a watermark in JAVA software submitted by a user; then, constructing a JAVA software extraction module and a JAVA software watermark verification module in a JAVA software operation system; extracting the watermark from the JAVA software submitted by the user with a watermark extraction method in the water extraction module; and verifying the extracted watermark to determine the validity of the JAVA software submitted by the user. The method in the invention has good confidentiality, high safety, and better attack resistance capacity for attacks of malicious software. In the method, the software watermark has short extraction time, and the software embedded with the watermark can still keep good operation performance. The method has good portability, a watermark method is selected according to user demands, and the JAVA software requirement on safety and operation efficiency can be better satisfied.

Description

technical field [0001] The invention relates to a method for restricting the running of illegal JAVA software by using a software watermark, and belongs to the technical field of software protection. Background technique [0002] In an open network environment, the software running environment is faced with problems such as illegal program intrusion and diverse and heterogeneous system platforms, and JAVA software has been widely used because of its good portability. Therefore, it is important to ensure the security of the JAVA software running system. realistic meaning. [0003] In order to protect the security of JAVA software running system, the "sandbox" model has been widely used. In the JAVA "sandbox" model, the execution environment of JAVA software is strictly divided into two parts: the local code can access all the resources of the computer; while the remote code (mainly the Applet downloaded from the network) can only run in strict Inside the restricted sandbox....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F21/16G06F21/51
Inventor 王建民王朝坤余志伟戴鹏飞
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products