Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Link method and linker

A linker and compiler technology, applied in the direction of instrument, memory system, program control design, etc., can solve problems such as difficult implementation, complicated process, advanced users, etc., to achieve easy implementation, simplify complexity and difficulty, and reduce complexity and difficulty Effect

Active Publication Date: 2010-02-17
FEITIAN TECHNOLOGIES
View PDF0 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method requires the user to manually add code to the program source code, which has high requirements for the user, and the process is complicated and difficult to implement.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link method and linker
  • Link method and linker

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] see figure 1 , this embodiment provides a linking method, specifically including:

[0053] Step 101: Obtain the target program code of the software to be protected, the target program code is generated by compiling the program source code of the software to be protected by a compiler;

[0054] Wherein, the program source code may be written in multiple high-level languages, such as C language, C++ language and other high-level languages. There are many kinds of compilers, such as gcc (GNU C Compiler) compiler.

[0055] Program source code is usually stored in the form of source files. If there are multiple source files, the compiler compiles each source file into a corresponding object program code, ie, an object file, so that multiple object files can be obtained.

[0056] Step 102: Scanning and analyzing the obtained target program code, obtaining the size and offset of each segment in the target program code, and recording the definitions and references of all symb...

Embodiment 2

[0157] see figure 2 , this embodiment provides a linker, specifically including:

[0158] The scanning module 21 is used to scan the target program code of the software to be protected generated after compiling by the compiler;

[0159] The insertion module 22 is used to determine the insertion point of the verification code of the smart key device in the target program code, and inserts the verification code into the target program code according to the position corresponding to the insertion point;

[0160] Create module 23, be used for creating segment table and symbol table according to the information that scan module 21 obtains, add the symbol corresponding to the function that verification code belongs to and the symbol corresponding to exit function in symbol table, the function that verification code belongs to is used for when running software to be protected When verifying the smart key device, the software to be protected is allowed to run when the verif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a link method and a linker, which belong to the field of software security. The method comprises the following steps: scanning the objective program codes of software to be protected, wherein the codes are generated after the compiling of a compiler; determining the inserting point of the identification codes of an intelligent key facility, and inserting the identificationcodes in the objective program codes; creating a segment table and a symbol table according to scanning information, adding symbols respectively corresponding to identification code functions and exitfunctions in the symbol table, and using the functions to which the identification codes belong to identify the intelligent key facility; if successful, allowing the software to operate, and if fail,calling the exit functions and completing the operation; repositioning the objective program codes, writing the head information of a file, the repositioned objective program codes, the segment tableand the symbol table in an output file to obtain an executable file. The linker comprises a scanning module, an insertion module, a creation module and a repositioning module. The invention realizessoftware protection, simplifies and reduces the complexity and the difficulty of software protection.

Description

technical field [0001] The invention relates to the field of software safety, in particular to a linking method and a linker. Background technique [0002] In order to improve the safety of software use and copyright protection of software, the user of the software is usually authenticated, and if the user is a legitimate user, he is allowed to run the executable file of the software to use the software. The executable file of the software is obtained by compiling the source code of the program by the compiler and linking it by the linker. The file generated by the compiler after compilation is called the target file, including: program instructions and program data, which are stored in the form of segments with a certain length, the program instructions are stored in the code segment, and the program data is stored in the data segment . In addition, there are symbol tables, relocation tables, and file headers in the object file. The symbol table contains exported symbols...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F9/45G06F21/22G06F21/12
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products