Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Embedding and extraction method of software watermark

A software watermarking and watermarking technology, applied in the direction of program/content distribution protection, etc., can solve problems such as incomprehension, inability to apply directly, and inapplicable to Android platform application software protection, etc., to achieve the effect of improving concealment

Active Publication Date: 2017-09-29
BEIJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, rewrite it into a single letter, or a short combination of meaningless letters, or even rewrite it into a symbol like "__", so that readers cannot guess its purpose based on the name
[0007] (2) Rewrite part of the logic in the code and turn it into a functionally equivalent but harder to understand form
Since the Android platform uses the dalvik virtual machine to run the Android program, and the dalvik virtual machine runs the dalvik bytecode, the dalvik bytecode has instruction characteristics different from the assembly instruction, so the existing software based on assembly instructions such as x86 Watermark technology cannot be directly applied to Android-based Dalvik bytecode instructions
[0020] It can be seen that the current software protection methods are not suitable for the protection of Android platform application software.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Embedding and extraction method of software watermark
  • Embedding and extraction method of software watermark

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0037] The core idea of ​​the present invention is: according to the application event flow (key) of the application software triggered by the user and the watermark information to be embedded, generate the corresponding watermark code, and embed it in the assembly code segment corresponding to each event (that is, the Dalvik byte code segment). In this way, by establishing a logical dependency relationship between the watermark and the program itself, the concealment of the watermark information can be improved. In addition, the embedding of the watermark is carried out based on the assembly code, therefore, the dependence on the source code is avoided, so that the present invention is easy to implement.

[0038] figure 1 It is a schem...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an embedding and extracting method for a software watermark. When the watermark is embedded, corresponding watermark codes are generated according to an even flow triggered by a user and watermark information to be embedded, and are embedded into assembly code sections corresponding to all events. Through establishing a logical dependency relation between the watermark and a program, the concealing performance of the watermark information can be improved. By the adoption of the embedding and extracting method, Android platform application software can be effectively protected.

Description

technical field [0001] The invention relates to computer software security technology, in particular to a software watermark embedding and extraction method. Background technique [0002] Currently, with the rapid development of Android mobile smart terminals, an emerging economic model has emerged around mobile applications in recent years. However, app repackaging poses a huge risk to app developers, app stores, and users. Malicious users can destroy developers' revenue sources and infringe their intellectual property rights through application repackaging. Recent research has shown that app repackaging is one of the most common mechanisms by which Android malware spreads externally. The survey also revealed that app repackaging was a serious vulnerability in mobile banking apps. In the face of these security threats, application software needs to be protected. [0003] At present, a lot of research has been done in the field of software protection at home and abroad, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 胡阳雨徐国爱李承泽张程鹏董枫
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products