Supercharge Your Innovation With Domain-Expert AI Agents!

A Method for Encrypting Executable Files When the Software Source Code Is Unknown

A technology for executing files and encryption methods, which is applied in the fields of instruments, computing, electrical digital data processing, etc., to achieve the effect of simple implementation, reducing the difficulty of encryption, and reducing infringement

Inactive Publication Date: 2011-12-21
WUHAN UNIV
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, most software encryption is currently developed in the source code of the software, and there is still a lack of a method for encrypting when the software source code is unknown

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Encrypting Executable Files When the Software Source Code Is Unknown
  • A Method for Encrypting Executable Files When the Software Source Code Is Unknown
  • A Method for Encrypting Executable Files When the Software Source Code Is Unknown

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0038] A method for encrypting an executable file when the software source code is unknown, comprising the following steps:

[0039] Step 1, start the executable file that has been injected into the custom dynamic link library; the specific method of injecting the custom dynamic link library into the executable file is as follows: image 3It is the process of injecting dynamic link library. In this process, before the dynamic link library is injected, the source function execution process can directly call the target function (as shown by arrow 1), and after the execution of the target function is completed, the source function can be directly returned (as shown by arrow 2). The selected target function is intercepted through the API HOOK technology, and the target function has the characteristic of being executed during the running of the program and only executed once. Inject a custom dynamic link library before the execution of the target function, and the user-defined use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for encrypting an executable file when the software source code is unknown. In the case that the source code is unknown, the encryption of the executable file of the software is realized. The user can obtain the MAC address of the network card of the computer through the injected custom dynamic link library, combine the obtained MAC address with the information of the application software, and use it as an application code that uniquely identifies the user, and send the application code to the computer by phone, email, fax, etc. The software copyright owner applies for the license file required to run the software. The software copyright owner encrypts the application code provided by the user and the restrictions on the user through a custom encryption component to generate a license file, which records the application code, the restriction information on the user and the encrypted key, and will license The file is fed back to the client. The encryption algorithm does not require major changes to hardware and software, the method is simple, and the software infringement is effectively reduced.

Description

[0001] technical field [0002] The invention relates to an encryption method, in particular to a method for encrypting an executable file when the software source code is unknown. [0003] Background technique [0004] HOOK API technology refers to intercepting the call of a specific process or system to an API function, so that the execution flow of the API is diverted to the specified code. Applications under Windows have their own address space, and they can only call functions in their own address space, so before HOOK API, a custom function that can be executed instead of API (generally called this function as a proxy function) must be The execution code is injected into the target process, and then find a way to change the call of the target process to the API into a custom call injected into the target process, so that the API function can be intercepted. Under Windows, API interception is a very useful technique, which gives the user the opportunity to interfere w...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/12G06F21/60
Inventor 苏科华章登义李洁付虹博
Owner WUHAN UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More