Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A veh-based code protection method and device

A protection device and code technology, applied in program/content distribution protection, instrument, electrical digital data processing, etc., can solve problems such as low safety factor, large resource occupation, weak anti-static analysis ability, etc.

Active Publication Date: 2019-04-02
福建多多云科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Therefore, it is necessary to provide a VEH-based code protection technical solution to solve the problems of existing software program anti-cracking methods, such as large resource occupation, weak anti-static analysis ability, and low safety factor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A veh-based code protection method and device
  • A veh-based code protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to explain in detail the technical content, structural features, achieved goals and effects of the technical solution, the following will be described in detail in conjunction with specific embodiments and accompanying drawings.

[0045] see figure 1 , is a flowchart of a VEH-based code protection method related to an embodiment of the present invention. The method can be applied to protect key software code segments and effectively improve the anti-static analysis capability of software codes. The method includes the following steps:

[0046] First enter step S101 to add identification information to the code segment to be protected in the first process. Specifically, two macros, ProtectBegin and ProtectEnd, may be added at the beginning and end of the code segment to be protected, representing the start of protection and the end of protection respectively. The identification information is an identification identifying the code to be protected, and in other...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a code protection method and device based on VEH. The method comprises the following steps: firstly, adding identification information to the code segment to be protected in the first process; then acquiring and encrypting the code segment to be protected to obtain the encrypted code, and save the encrypted code in the second process; then preprocess the code segment to be protected, so that the code segment to be protected is abnormally interrupted during operation; then the second process receives the first signal sent by the first process, and Decrypt the encrypted code, send the code segment to be protected corresponding to the first signal to the first process; then the first process creates and executes the code segment to be protected in its corresponding memory space, and releases the newly created code segment after the execution is completed. The memory space corresponding to the code segment to be protected. The method can effectively enhance the dependence between the first process and the second process, and increase the difficulty of cracking.

Description

technical field [0001] The invention relates to the field of computer software anti-cracking, in particular to a VEH-based code protection method and device. Background technique [0002] With the development of science and technology, the application of software is becoming wider and wider. At present, the software on the market has been cracked by some commonly used cracking tools. For this reason, it is necessary to process the key codes in the software program so that the reverse tools cannot normally recognize the codes and increase the difficulty of cracking. [0003] Existing software-related anti-cracking technologies mainly include: code virtualization, setting fancy instructions, and code compression and encryption. However, these anti-cracking technologies all have deficiencies. Taking code virtualization as an example, while protecting the code intensively, it will also greatly increase the occupation of the original program, reduce the efficiency of code exec...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14G06F21/106
Inventor 李琦李玮汪小烽高居忠连寿哲朱龙彬
Owner 福建多多云科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products