Abstract

According to statistical research, a violation of license agreements annually causes huge losses to software companies. On the one hand, illegal copies of the software product are created, on the other hand, some fragments of the programs are used by third parties unauthorized. Another important problem is the violation of the program integrity, for example, in terms of blocking functions of the license key checking. In this regard, the task of construction methods for protecting intellectual property in software applications is highly relevant. Previously known methods solve this problem by means of fragile digital watermarks. Below is presented a method for constructing a fragile digital watermark used in executable files. A model of a developers team creating software product protected by DWM is considered. The application of this method will allow to reveal the fact of the container integrity violation, on the one hand, and, on the other hand, will allow the author, if it is necessary, to confirm his participation in the development and embedding of the DWM. In this method we use mathematical properties of systems of linear algebraic equations, digital signature and cryptographic hash functions. The scheme is based on the Kronecker – Capelli theorem. To find the group password the co-author who is in the group finds one root of the consistent system of linear algebraic equations. The indicated system consists of n equations and contains n + 1 variables. For an outsider who is not in the group, the system of equations does not have a unique solution. The co-author of the group is able to calculate one variable in system based on their passport data. Therefore, the system of equations for such co-author has a unique solution. Various attacks on a protected by the new method are analyzed, and it is shown its efficiency. The constructed method can be applied in companies with a large team of developers.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call