Information security method and system
a technology of information security and methods, applied in the field of information security systems, can solve the problems of not being statistically able to retrieve the original application source code, different headers of original calls, and not being easily traceabl
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Benefits of technology
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The present invention offers substantial advantages and improvements over existing electronic information security technology with respect to the security features of executable application code and / or data which is generated, stored or manipulated by the application code in order to more effectively prevent unauthorized reproduction, access and / or use of the same. In accordance with various exemplary embodiments disclosed herein, the present invention operates to protect standard or custom compiled code using a polymorphic engine which randomly alters the standard executable code of a compiled application while conserving the application's original operational and functional characteristics. Other methods and systems for protecting data traffic to and from the polymorphed application and the polymorphic engine itself are also described.
[0041] The following descriptions are of exemplary embodiments of the invention only, and are not intended to limit the scope, applicability...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


