Encrpytion techniques for storing transformation directive
A technology for transforming instructions and techniques, applied in the direction of instruments, electrical digital data processing, digital data processing components, etc., can solve problems such as destroying disassembly
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] This technique can be coded in various ways. The most direct way is to make it into a tool for users to use: after the user completes the software EXE program, specify the code range to be encrypted in the tool, and then use this tool to encrypt the software. The tool will encrypt the specified code range, and then increase the space of the original EXE program to write the generated encrypted data and processing program, and clear the encrypted range, and then write up and jump to the decryption processing program code. When the runtime reaches this code interval, it will enter the processing program, decrypt and run the program until it runs out of this interval.
[0031] The specific operation process of its encryption and decryption is described in detail below:
[0032] For the code segment specified by the user to be encrypted, all the instructions in it are first compiled, and then a large number of fancy instructions that do not affect the running of the progr...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 