Trusted Computing-Based Security Model for Software Protection
-
摘要: 借助可信计算的完整性检验、认证及访问控制和密封存储等关键技术,在现有PC体系结构下提出了支持可信计算的软件保护模型.该模型利用PC机USB接口外接TPM,结合基于动态口令的身份认证、基于角色的访问控制、代码移植和信道加密技术,从不同层次和角度来综合防止软件被非法使用和传播.与现有软件保护方案相比,本模型利用TPM实现了用户和软件之间的相互认证,并通过身份映射的角色来控制不同用户对软件的使用权限.Abstract: With the help of the key technologies in trusted computing(TC) including integrity measurement,access control and seal storage,a TC-based secure model for software protection was proposed.A trusted platform module(TPM),which is an extention of current USB port,is employed in this model to prevent software from illegal copying,unauthorized modification and implementation of software.The technologies,such as dynamic password-based authentication,role-based access control,code transformation and channel encryption.Compared with traditional schemes,the proposed model implements mutual identification between user and software via TPM,and authentication mechanism via role-based access control(RBAC).
-
Key words:
- trusted computing /
- software protection /
- dynamic password /
- RBAC
点击查看大图
计量
- 文章访问数: 1083
- HTML全文浏览量: 70
- PDF下载量: 415
- 被引次数: 0