Unlock instant, AI-driven research and patent intelligence for your innovation.

Software Protection Method Based on Vectorized Exception Handling

An exception handling and software protection technology, which is applied in software maintenance/management, digital data protection, electrical digital data processing, etc., can solve problems such as code execution logic that cannot be determined, and achieve the effect of increasing protection and ensuring compatibility

Active Publication Date: 2022-03-18
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] For those programs that modify their own code during operation, because the execution logic of the modified code cannot be determined, it cannot be transferred to the shell

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software Protection Method Based on Vectorized Exception Handling
  • Software Protection Method Based on Vectorized Exception Handling
  • Software Protection Method Based on Vectorized Exception Handling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0091] Embodiment 1, software protection method based on vectorized exception handling, such as Figure 1-4 shown, including the following steps:

[0092] 1. Packing;

[0093] Step 1 explains how to apply protection to software (executable files). This step is a process of assembling code, that is, the shell code, exception handling code, encryption and decryption functions and keys used in the following steps, and the original software code. etc., assembled according to the format required by a normal executable file, and ensure that the shell code is run first. The sections obtained in this step, as well as the executable file composed of sections, are for the purpose of allowing the operating system to execute the software normally.

[0094] 2. The specific implementation of the executable file loading process;

[0095] Step 2 describes how the executable file is loaded from the file into the memory after the software runs. The loading process is first the work of the o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a software protection method based on vectorization exception processing, which includes the following steps: 1. packing executable files; 2. loading executable files; 3. performing vectorization exception processing if vectorization exceptions occur. The invention proposes a method for encrypting and decrypting data in blocks without changing original program codes and memory locations. By modifying the memory protection attribute, a certain page of memory is inaccessible, and an exception occurs when the program jumps to the address in the memory page or accesses the data in the memory page. This method enables the shell code to control both program execution and data access without changing the memory addresses of code and data.

Description

technical field [0001] The invention relates to a software protection method, in particular to a software protection method based on vectorized exception processing. Background technique [0002] When using the general packing method to protect software, in order to ensure the normal operation of the original program, all executable file data is always processed as a whole. Either fully encrypted or fully decrypted. This is because the timing and location of each function code calling each other and accessing data in the program are uncertain. Before the shell code returns the control right of the program to the original program, it must decrypt all the original program, which creates a good opportunity for shelling to intervene. [0003] The present invention controls the whole process of program running through the vectorized exception handling mechanism. The exception handling code obtains control right when each memory page of the original program is executed or acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F8/72G06F21/60
CPCG06F21/12G06F8/72G06F21/602
Inventor 赵康范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD