Method for providing security for common intermediate language-based program

A universal intermediate language and security technology, which is used in the field of providing security for programs based on universal intermediate language, and can solve problems such as source code leaks, program analysis difficulties, and the inability of technology to become a fundamental solution.

Inactive Publication Date: 2016-05-25
INKA ENTWORKS INC
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In order to make the analysis of the program difficult, a technique for obfuscating the source code of the program or the common intermediate language code can be used, but since the source code of the application will be leaked, this technique cannot be a fundamental solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for providing security for common intermediate language-based program
  • Method for providing security for common intermediate language-based program
  • Method for providing security for common intermediate language-based program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Hereinafter, the present embodiment will be described in detail with reference to the drawings.

[0027] Embodiments of the present invention relate to a common intermediate language code application, a DLL containing the application's key algorithm or logic, and a plug-in containing the encryption DLL and providing security functions. The plug-in should be a local code made by C / C++, such as Android NDK (Native Development Kit, native development kit) and XCode. If the plug-in is made in a language that creates common intermediate language code (eg, C# and Java), the plug-in itself may be hacked and thus the security functions provided by the plug-in may be disabled.

[0028] The following examples are directed at applications made in the Unity-based C# language and plug-ins made in C / C++ with native code support. However, the technical idea of ​​the present invention should not be limited thereto.

[0029] figure 1 is a configuration diagram of an apparatus for gen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Disclosed is a method for providing security of a program configured by a script language. The present invention provides security for a common intermediate language-based program, which provides security to a user DLL used for a platform supporting an application made of a common intermediate language code and a plug-in made of a native code. The method comprises: a particular function call step of calling a particular function within an application calling a particular module in a secure logic DLL including one or more modules while an application is loaded and executed in a main memory; a DDL request step of making a request for a secure logic DLL to a secure module plug-in for encrypting and storing the secure logic DLL; a DLL generation step of generating a secure logic DLL by decrypting the encrypted DLL in the secure module plug-in; a step of transmitting the secure log DLL to the particular function within the application; and a DLL module call step of calling the particular module included in the secure logic DLL.

Description

technical field [0001] The present invention relates to a method of providing security for programs based on common intermediate language. Background technique [0002] It should be pointed out that the following content only provides background information related to each embodiment but does not constitute prior art. [0003] Although doing the same job, the application should be developed separately to match the hardware or operating system. In other words, each application can execute the game program in various environments such as personal computer (PC), Mac, web browser, flash, Android (Android) mobile phone, and iPhone. However, development cannot be performed by reusing source codes of game programs and these applications have to be developed individually according to platforms. Therefore, the development and maintenance costs of the game program are increased. If one source code can be used independently of hardware or operating system, development and maintenanc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/52G06F11/28
CPCG06F21/52G06F11/28G06F8/65G06F12/1408G06F2212/1052
Inventor 南在玟朴正根洪晙豪吴埈硕金正洙
Owner INKA ENTWORKS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products