Program executable image encryption

An image and program technology, applied in the field of program executable image encryption, can solve the problems of slow processor operation and consumption of processor cycles, etc., and achieve the effect of fast loading

Inactive Publication Date: 2008-10-15
NXP BV
View PDF1 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this correction or patching process may consume valuable processor cycles, resulting in slower processor operation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program executable image encryption
  • Program executable image encryption
  • Program executable image encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] A program's executable image contains section information, and an executable image traditionally has multiple components or sections, such as text components forming the executable program code, data including space for initialized or uninitialized program static data component, and a Block Storage Segment (BSS) component that includes a region allocated by the loader that contains static data that is initialized to zero. The BSS is a memory-mapped component that contains data that is allocated as a binary image at execution time. The more components in a system, the more granular and flexible the system. Granularity indicates the degree to which a system consists of discrete components. For example, the Philips TriMedia Compiler allows renaming of sections or components in a generated object file after compile time and before linking the generated object file into the final executable image.

[0030]Compilers such as the GNU GCC C compiler allow sections to be annota...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides for a method of encrypting and executing an executable image, comprising; flagging sections of the executable image to be encrypted using commands in source files and compiling said executable images so as to generate object files, linking one or more of said executable images using a linker to produce a final executable image, passing said linked executable images to a post-linker encryption engine to encrypt a relocation fix-up patch table and sections of executable images flagged for encryption, and at load time decrypting relocating and executing the executable images.

Description

technical field [0001] The present invention relates to a method and system for encrypting and executing executable images. More specifically, the present invention relates to a method and system for encrypting and loading executable image content. Background technique [0002] Software development requires a considerable investment in both time and money, and unauthorized software use, such as unauthorized copying or sharing, ultimately results in lost revenue for the software developer. Examples of unauthorized software may include copies made by third parties without obtaining the necessary authorization, or the sharing of unauthorized copies over peer-to-peer networks. Such software may also include executable image or sound files that also need to be protected from copying. [0003] To achieve this protection, it is known to use encryption measures to prevent unauthorized copies of software from being executed. Such measures typically include encrypting one or more e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/12
CPCG06F21/125G06F12/02G06F21/14
Inventor 科林・金
Owner NXP BV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products