Method and device for code protection based on VEH

A protection device and code technology, applied in program/content distribution protection, electrical digital data processing, instruments, etc., can solve the problems of low safety factor, large resource occupation, weak anti-static analysis ability, etc.

Active Publication Date: 2016-10-26
福建多多云科技有限公司
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, it is necessary to provide a VEH-based code protection technical solution to solve the problems of existing ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for code protection based on VEH
  • Method and device for code protection based on VEH

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0045] see figure 1 , is a flowchart of a VEH-based code protection method related to an embodiment of the present invention. The method can be applied to protect key software code segments and effectively improve the anti-static analysis capability of software codes. The method includes the following steps:

[0046] First enter step S101 to add identification information to the code segment to be protected in the first process. Specifically, two macros, ProtectBegin and ProtectEnd, may be added at the beginning and end of the code segment to be protected, representing the start of protection and the end of protection respectively. The identification information is an identification identifying the code to be protected, and in other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for code protection based on VEH. The method comprises the steps that at first, identification information is added to a to-be-protected code segment in a first process; the to-be-protected code segment is then acquired and encrypted, an encrypted code is obtained, and the encrypted code is stored in a second process; the to-be-protected code segment is pre-processed, so that exception interruption can take place to the to-be-protected code segment during running; the second process then receives a first signal sent by the first process, the encrypted code is decrypted, and the to-be-protected code segment corresponding to the first signal is sent to the first process; and then the first process establishes a new to-be-protected code segment and executes the code segment in corresponding memory space, and releases the memory space corresponding to the newly established to-be-protected code segment after execution. The method can effective enhance dependence between the first process and the second process and increases the decryption difficulty degree.

Description

technical field [0001] The invention relates to the field of computer software anti-cracking, in particular to a VEH-based code protection method and device. Background technique [0002] With the development of science and technology, the application of software is becoming wider and wider. At present, the software on the market has been cracked by some commonly used cracking tools. For this reason, it is necessary to process the key codes in the software program so that the reverse tools cannot normally recognize the codes and increase the difficulty of cracking. [0003] Existing software-related anti-cracking technologies mainly include: code virtualization, setting fancy instructions, and code compression and encryption. However, these anti-cracking technologies all have deficiencies. Taking code virtualization as an example, while protecting the code intensively, it will also greatly increase the occupation of the original program, reduce the efficiency of code exec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
CPCG06F21/14G06F21/106
Inventor 李琦李玮汪小烽高居忠连寿哲朱龙彬
Owner 福建多多云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products