Unlock instant, AI-driven research and patent intelligence for your innovation.

Encrpytion techniques for storing transformation directive

A technology for transforming instructions and techniques, applied in the direction of instruments, electrical digital data processing, digital data processing components, etc., can solve problems such as destroying disassembly

Inactive Publication Date: 2006-07-05
胡敏
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

After using this technique on the code segment to be encrypted, it can completely destroy the disassembly of the machine code and limit the scope of disassembly to a very small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrpytion techniques for storing transformation directive

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] This technique can be coded in various ways. The most direct way is to make it into a tool for users to use: after the user completes the software EXE program, specify the code range to be encrypted in the tool, and then use this tool to encrypt the software. The tool will encrypt the specified code range, and then increase the space of the original EXE program to write the generated encrypted data and processing program, and clear the encrypted range, and then write up and jump to the decryption processing program code. When the runtime reaches this code interval, it will enter the processing program, decrypt and run the program until it runs out of this interval.

[0031] The specific operation process of its encryption and decryption is described in detail below:

[0032] For the code segment specified by the user to be encrypted, all the instructions in it are first compiled, and then a large number of fancy instructions that do not affect the running of the progr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is a new computer software safety protection technique, mainly changing the mode that the existing software stores instructions in sequence to make the stored instructions disordered and irregular so as to make it difficult to debug the software, therefore it is an anti-debug technique. Because it adds thunkcodes to the instructions before changing their sequence and this disordered storage mode can cooperate with the thunkcodes perfectly to largely enlarge the range that thunkcodes destroy disassemble so that a debugger can not disassemble machine codes of the software, the debugger can not make static analysis; because large number of thunkcodes are added, the work load of dynamic analysis by single step tracking is huge, and thus the dynamic analysis by tracking software is unable to be implemented. Thus the invention achieves an anti-debug purpose.

Description

Technical field: [0001] The invention of the method is used for the security protection of computer software, and is a new encryption protection technology. This technology is aimed at software cracking, which can greatly improve the software's anti-cracking ability. It is implemented by means of a program and can be used on a separate computer. It is currently available on all platforms using the Intel 80×86 instruction set, regardless of the operating system and hardware. Background technique: [0002] In order to protect their own rights and interests, software developers will impose some protective measures on the software, such as using registration codes, encrypting CDs, and so on. However, crackers can illegally remove these protection measures through analysis of the software. Therefore, how to prevent it from being cracked has just formed the encryption protection technology of the software. [0003] Cracking the software is realized by debugging the software, a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F1/00
Inventor 胡敏
Owner 胡敏