With the help of the key technologies in trusted computing ( TC) including integrity measurement, access control and seal storage, a TC-based secure model for software protection was proposed. 借助可信计算的完整性检验、认证及访问控制和密封存储等关键技术,在现有PC体系结构下提出了支持可信计算的软件保护模型。
The general thought, software integrity in running state includes two parts: ( 1) the running state of software is integrity;( 2) control flow of software is integrity. 一般的认为,在运行状态下的软件完整性包含两部.分:(1)软件的运行状态的完整;(2)软件的控制流的完整。