Identifying factorable code

A technology of factorization and coding, applied in the field of anti-piracy

Active Publication Date: 2012-07-18
MICROSOFT TECH LICENSING LLC
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, once a computer program enters the market, a hostile user can reverse engineer its protection mechanisms and produce a new copy that appears to be functionally equivalent to the authentic copy, but with anti-piracy enforcement disabled

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identifying factorable code
  • Identifying factorable code
  • Identifying factorable code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0009] When looking for a part of code located remotely from another part of the code due to anti-piracy concerns, it may be difficult to locate when factored effectively to prevent piracy without affecting the performance of authorized versions of the program Harmful degree of code. This task is especially difficult for large, complex applications such as video games. For example, it is desirable for remotely located factored code to have functionality that is difficult to infer, such that when given a known input to the code, the code can provide an output that is not easily correlated with the input. Also, it is expected that there will be no factored code that has a sufficiently negative impact on program performance, since capturing such factored code would significantly degrade the quality of the user experience provided by the program. These concerns may favor factorization of relatively large and / or complex functions.

[0010] On the other hand, it is not desirable t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to identifying factorable code. Various embodiments are disclosed that relate to the automated identification of one or more computer program functions for potentially placing on a remote computing device in a split-computational computing environment. For example, one disclosed embodiment provides, on a computing device, a method of determining a factorable portion of code to locate remotely from other portions of the code of a program to hinder unauthorized use and / or distribution of the program. The method includes, on a computing device, receiving an input of a representation of the code of the program, performing analysis on the representation of the code, the analysis comprising one or more of static analysis and dynamic analysis, and based upon the analysis of the code, outputting a list of one or more functions determined from the analysis to be candidates for locating remotely.

Description

technical field [0001] The invention relates to anti-piracy technology of computer programs. Background technique [0002] Computer programs for personal computers are easy to reverse engineer. For example, permission enforcement code in such programs can be detected and disabled by editing the program's machine code. As a result, once a computer program enters the market, a hostile user can reverse engineer its protection mechanisms and produce a new copy that appears functionally equivalent to the authentic copy, but with anti-piracy enforcement disabled. [0003] Recent developments in anti-piracy technology have led to the development of unbundled computational anti-piracy methods. The unbundling computing method involves dividing or factoring a program into two or more pieces that execute remotely from each other. For example, in some embodiments, smaller, functionally important pieces of the program are located on the server, while the remainder of the program is lo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00
CPCG06F21/125G06F2221/2115
Inventor D·基洛夫斯基B·利夫希茨G·梅德文斯基V·盖加拉K·雷J·林德
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products