Secure calling convention system and methods

A technology of API calling and application programming interface, which is applied in transmission systems, digital transmission systems, secure communication devices, etc., and can solve problems such as infeasibility, API not being hidden, and inability to protect licensed functions, etc.

Pending Publication Date: 2021-06-29
阿韦瓦软件有限责任公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] b. Disadvantage: The impact on performance cannot be controlled, which means that it is not feasible to use such tools to protect performance critical products
[0024] b. Disadvantage: APIs are not hidden, which is an important issue when securing licensed APIs, since they must be hidden
[0030] As can be seen from the examples above, selective protection, while it does protect the actual implementation logic and any intellectual property inside the licensed API, does nothing to protect the licensed functionality

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure calling convention system and methods
  • Secure calling convention system and methods
  • Secure calling convention system and methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Embodiments of the present disclosure relate to systems and methods for using SCCs to protect information passed between a caller of an API and logic contained within the API.

[0056] To this end, in various embodiments, protecting information includes information that has undergone cryptographic operations. According to some embodiments, a "cryptographic operation" includes, but is not limited to, a set of instructions stored on a transitory and / or non-transitory computer-readable medium that, when executed, results in encryption of information or one or more portions thereof. Encrypt or decrypt.

[0057] As used herein, according to some embodiments, "encryption" is the process of transforming information from its original form into a form in which the original form can no longer be observed. In some embodiments, encryption requires the use of encryption keys used to manage transformations. As used herein, in various embodiments, an "encryption key" is a value used...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure is directed to systems and methods for protecting software application information that is passed between a caller of an API and the logic contained within the API by using a Secure Calling Convention (SCC). The SCC involves performing a cryptographic operation on the information such that the true nature of the information is obfuscated. The SCC prevents a hacker from using the information to reverse-engineer the software application to behave as desired.

Description

[0001] Cross References to Related Applications [0002] This application claims the benefit of and priority to U.S. Provisional Patent Application No. 62 / 729,334, filed September 10, 2018, entitled "SECURE CALLING CONVENTION SYSTEM AND METHOD," which is incorporated by reference for all purposes. Background technique [0003] Existing cryptographic systems and methods for securing software suffer from a number of disadvantages. A major disadvantage is that existing cryptographic systems and methods make software vulnerable. One of the most common attacks involves modifying software to gain access to unlicensed versions of software applications. Hackers can use unencrypted parts of an application to determine how encrypted parts of the software behave. The unencrypted portion of the application is usually part of the calling convention of the Application Programming Interface (API). Unprotected values ​​passed to or returned from APIs provide hackers with the opportunity to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14G06F21/60H04L9/06
CPCH04L9/0861G06F21/602G06F21/14G06F21/1066G06F9/54
Inventor I·P·G·斯蒂尔
Owner 阿韦瓦软件有限责任公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products