Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Command generation device

An instruction generation and instruction technology, applied in computer security devices, instruments, electronic digital data processing and other directions, can solve the problems of invalidation, tampering, tampering and verification processing, and achieve great effect, prevent illegal analysis and tampering. Effect

Inactive Publication Date: 2009-07-22
PANASONIC CORP
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, figure 2 The problem existing in the conventional falsification prevention processing generation device shown is that the falsification verification processing is easily found by illegal analysts, and the falsification verification processing is falsified and invalidated.
Accordingly, the falsification verification process itself is invalidated
[0015] In addition, in the method of monitoring the operation of the program like the technology described in Patent Document 1, there is also the possibility that the process of monitoring the work itself will be found and tampered with.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Command generation device
  • Command generation device
  • Command generation device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0161] The processing system in Embodiment 1 according to the present invention will be described.

[0162] image 3 is a configuration diagram of the processing system in Example 1.

[0163] The processing system 100 in this embodiment includes a tamper prevention processing generating means (command generating means) 110 , and an execution processing means 130 .

[0164] The anti-tampering processing generation device 110 is a device that generates a program that can reliably protect the protection target code, obtains the first processing command group 140 and the second processing command group 150 as the protection target code, and generates the output processing command group 160 . The anti-falsification processing generation device 110 is configured as an unreadable device, and generates an output processing instruction group 160 by making the second processing instruction group 150 difficult to read. Furthermore, unless otherwise specified, the instruction group in t...

Deformed example 1

[0342] In the above-mentioned embodiment, the variables that are the arguments of the first processing command group 140 are used as the variables for substituting values ​​in the referenced variable value substituting processing command group 310 as they are, but the present invention is not limited thereto. The referenced variable value is substituted into the processing instruction group generation unit 240, the variable name used by the second processing instruction group 150 can be determined, and the following instruction group can be substituted into the processing instruction group 310 as the referenced variable value, the instruction group refers to: An instruction group that performs a process of substituting a random value into a variable with a variable name not used by the second processing instruction group 150 among the variable names held by the reference variable information holding unit 230 . With these configurations, it is possible to make the second process...

Deformed example 2

[0346] In the referenced variable value substitution process command group generation unit 240 , values ​​to be substituted into the referenced variables are randomly determined, however, depending on the substituted value, it may be difficult to analyze the behavior of an unauthorized person. Therefore, the configuration of the falsification prevention process generation device 110 may be configured such that the user designates a substituted value or an estimated value.

[0347] The following instructions, in the Figure 5C Shown is the difficulty of the illegal parser's parsing behavior when the value of the referenced variable "encryptedData" is "0xF022", and the difficulty of the parsing behavior when the value of the referenced variable "encryptedData" is "0xF0001" A specific example of the difference in the degree of difficulty of the analysis behavior of an illegal analysis person.

[0348] Such as Figure 5C As shown, if the value substituted into the referenced var...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a tampering-prevention-process generation apparatus (110) which generates a program that reliably protects a code targeted for protection is an apparatus that generates an output process instruction group (160) to be executed by an execution processing apparatus (130) in order to protect a first process instruction (140) which causes the execution processing apparatus (130) to assign a value to an assign-target variable. The apparatus comprises: a branch-process-instruction-group generating unit (203) configured to generate, as a part of the output process instruction group (160), a branch process instruction group (320) which causes a processing route to branch to the first process instruction (140) so that the execution processing apparatus (130) executes the first process instruction (140); and a dependent-process-instruction-group generating unit (201) configured to generate, as a part of the output process instruction group (160), a dependent process instruction group (330) which causes the execution processing apparatus (130) to execute a process dependent on the value of the assign-target variable which indicates a result of the first process instruction (140) executed by the execution processing apparatus (130) according to the branch process instruction group (320).

Description

technical field [0001] The present invention relates to a command generating device for generating computer programs capable of preventing illegal analysis and falsification. Background technique [0002] Among the programs that work on computers, there are programs that are required to prevent illegal tampering. Examples of these procedures include procedures for handling personal information and procedures for copyright management. For programs that use important information such as personal information, leaking of falsified programs is a threat, and therefore falsification is desired to be prevented. In addition, a program related to copyright management is a program that manages the number of times of use of the content and restricts its use. For this program, evasion of the use restriction due to falsification is a threat, so it is desired to prevent falsification. In addition to the examples described above, programs developed by software development companies may be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/24G06F21/54
Inventor 佐藤太一浅井理惠子
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products