Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method and system of executable file

A technology for executing files and software protection devices, applied in the direction of digital data protection, etc., can solve problems such as poor analysis resistance, and achieve the effect of improving security and increasing difficulty

Active Publication Date: 2013-07-03
BEIJING SENSESHIELD TECH
View PDF2 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The object of the present invention is to provide a method and system for protecting executable files, so as to solve the problem of poor analysis resistance of executable files in the prior art due to the use of pure software protection for key data

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and system of executable file
  • Protection method and system of executable file
  • Protection method and system of executable file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0024] figure 1 It is a schematic flowchart of the executable file protection method of the present invention. Such as figure 1 As shown, the protection method of the executable file of the present invention comprises the following steps:

[0025] S101: Find a data access instruction for accessing data in the original executable file;

[0026] S102: Analyze whether the data accessed by the data access instruction is key data, if so, execute step S103;

[0027] S103: storing the key data in a software protection device and clearing it from the original executable file;

[0028] S104: Transform the instruction for accessing the key data in the original executable file into an instruction for reading the key data from the software protection device;

[0029] S105: Inject an instruction for reading the key data from the software protection de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protection method and a protection system of an executable file. The method comprises the following steps of: finding a data access command for accessing data in an original executable file; analyzing whether the data accessed by the data access command is key data, if yes, storing the key data into a software protection device, and removing from the original executable file; converting the command for accessing the key data in the original executable file into a command for reading key data from the software protection device; and injecting the command for reading the key data from the software protection device into the original executable file so as to form a novel executable file. The system provided by the invention corresponds to the method. According to the invention, the key data of the executable data is stored into the software protection device; and the data is taken out from the software protection device only when being accessed, so that the decompilation and analysis difficulties are increased, and the safety of the executable file is improved greatly.

Description

technical field [0001] The invention relates to the field of software protection, in particular to a method and system for protecting executable files. Background technique [0002] As a special product, software has been plagued by piracy since its inception due to its digital characteristics. The existence of piracy not only caused huge losses to software developers, but also greatly hindered the development of the entire software industry. Key data in executable files, such as sensitive strings, keys for encryption and decryption, etc., are important data for executable files analyzed by pirates. By directly locating key data, you can directly locate key algorithms and analyze the protection of executable files. Therefore, key data has always been the key object of protection. At present, the pure software protection method for these data has poor analysis resistance, and it is easy to be compiled and analyzed, resulting in data leakage and destruction. Contents of the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/62
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH