Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for protecting object files

A target file and protection system technology, applied in the direction of program/content distribution protection, etc., can solve problems such as inability to protect, achieve the effect of increasing the scope of protection, improving security, and increasing difficulty

Active Publication Date: 2014-09-24
BEIJING SENSESHIELD TECH
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Regardless of whether the software is protected by packing or a virtual machine, some library functions (such as memcpy, sprintf, etc.) in the software cannot be protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for protecting object files
  • Method and system for protecting object files
  • Method and system for protecting object files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The target file protection method and protection system of the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments, but this is not intended to limit the present invention.

[0041] figure 1 It is a schematic flowchart of a method for protecting a target file according to an embodiment of the present invention. The protection method of the target file of the embodiment of the present invention comprises: After disassembling the function that needs to be protected in each target file used in the software, transforming the instruction of the function, and inserting garbage instructions in the function, thereby Individual object files are protected to form an overall protection for the software.

[0042] The method adopted in the embodiment of the present invention includes the following steps:

[0043] S10: Analyze the function symbols in the target file, and select the fun...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting object files. The method comprises the steps that after disassembling is conducted on functions needing to be protected in each object file used in software, deformation is conducted on orders of the functions, a junk order is inserted into each function, and therefore each object file is protected and the whole software is protected. The invention further discloses a system for protecting the object files. The system comprises an analysis module, a disassembling module, a deformation module, a junk order insertion module and a repairing module. According to the method and system for protecting the object files, the object files are protected, the protection range can be widened, the difficulty of disassembling and analyzing is increased, and the safety of the software is greatly improved.

Description

technical field [0001] The invention relates to the field of software protection, in particular to a method and system for protecting an object file (obj file). Background technique [0002] As a special product, software has been plagued by piracy since its inception due to its digital characteristics. The existence of piracy not only caused huge losses to software developers, but also greatly hindered the development of the entire software industry. At present, the main method that can protect the software is to use shelling or virtual machine for protection. Packing is mainly to protect the software as a whole, which is equivalent to wrapping a layer of shell on the outside of the software. There is an obvious gap between the shell and the software. The demarcation line, the use of virtual machine protection is mainly to virtualize key codes, and there is a clear boundary between software and virtual machines. Regardless of whether the software is protected by packing o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/10
CPCG06F21/14
Inventor 孙吉平韩勇
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products