Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

.Net program protection method and system

A program protection and program technology, applied in the field of information security, can solve problems such as heavy workload, high cost, and tedious development cycle, and achieve the effects of reducing development cost, improving development efficiency, and simplifying the development process

Active Publication Date: 2007-07-11
FEITIAN TECHNOLOGIES
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0032] In order to solve the problems in the prior art that .Net program protection requires programmers to manually participate in rewriting the program, the workload is heavy, cumbersome, the development cycle is long, and the cost is high, the present invention provides a method for .Net program protection. The method specifically includes :

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • .Net program protection method and system
  • .Net program protection method and system
  • .Net program protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] In the present embodiment, the information security device can realize the c51 virtual machine function. Referring to FIG. 1, the present invention provides a method for .Net program protection, first perform the following steps:

[0065] Step 101: using a program protection tool to automatically separate a part of the compiled protected .Net program;

[0066] The separation refers to automatically searching and separating the qualified program segments according to the class or function name, and the separated program segments are part of the compiled .Net program (which contains the IL instruction text); conditional block;

[0067] Step 102: The program protection tool decompiles the separated program into a C# program, and can also be decompiled into other programs based on the .Net architecture, such as C++.net, J#, VB.net, etc.;

[0068] Step 103: the program protection tool converts the C# program into a high-level language C program using a syntax analyzer;

[...

Embodiment 2

[0142] In this embodiment, the information security device can realize the x86 virtual machine function. Referring to FIG. 2, the present invention also provides a method for .Net program protection, first perform the following steps:

[0143] Step 201: using a program protection tool to automatically separate a part of the compiled protected .Net program;

[0144] The separation refers to automatically searching and separating the qualified program segments according to the class or function name, and the separated program segments are part of the compiled .Net program (which contains the IL instruction text); conditional block;

[0145] Step 202: The program protection tool decompiles the separated program into a C# program, and can also be decompiled into other programs based on the .Net architecture, such as C++.net, J#, VB.net, etc.;

[0146] Step 203: the program protection tool converts the C# program into a high-level language C program using a syntax analyzer;

[01...

Embodiment 3

[0159] In this embodiment, the information security device can realize the c51 virtual machine function. Referring to FIG. 3, the present invention also provides a method for .Net program protection, first perform the following steps:

[0160] Step 301: using a program protection tool to automatically separate a part of the compiled protected .Net program;

[0161] The separation refers to automatically searching and separating the qualified program segments according to the class or function name, and the separated program segments are part of the compiled .Net program (which contains the IL instruction text); conditional block;

[0162] Step 302: the program protection tool decompiles the separated program into an IL assembly instruction file;

[0163] Step 303: the program protection tool converts the IL assembly instruction file into a c51 assembly instruction file by using a syntax analyzer;

[0164] Step 304: the program protection tool uses the keil c51 compiler to co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a . net program protection method and system. It aims to solve the issue of hand modification, large volume of workload, complexity, and long development cycle, high cost, with the program protection tools dividing a part of the program to the coded . Net program, storing to the information safety equipment after conversion, writing the communication order to the separated . Net program for execution. It also provides a . Net program protection system which comprises automatic separation storage module and execution module. Due to the avoidance of hand modification progress, it greatly simplifies the development progress, improves development efficiency, and reduces development cost.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a method and system for protecting .Net programs. Background technique [0002] At present, with the development of computer technology, related technologies based on the Internet are getting more and more attention. Among them, Microsoft's .Net framework is a brand-new cross-language software development platform, which conforms to the major trends of today's software industry, such as distributed computing, component-oriented, enterprise-level applications, software as a service, and Web-centric. [0003] Information security equipment is a small hardware device with a processor and a memory, which can be connected to a computer through a computer's data communication interface, usually through a USB interface, and is usually called a USB KEY or USB Token. [0004] When using information security equipment to protect software, a part of the program can be written ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/22G06F21/10
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products