会员体验
专利管家(专利管理)
工作空间(专利管理)
风险监控(情报监控)
数据分析(专利分析)
侵权分析(诉讼无效)
联系我们
交流群
官方交流:
QQ群: 891211   
微信请扫码    >>>
现在联系顾问~
热词
    • 63. 发明公开
    • Verfahren und Computersystem zum Schutz eines Computerprogramms gegen Beeinflussung
    • Verfahren und Computersystem zum Schutz eines计算机程序gegen Beeinflussung
    • EP2913772A1
    • 2015-09-02
    • EP14180795.8
    • 2014-08-13
    • Wibu-Systems AG
    • Kügler, RüdigerDr. Wichmann, Peer
    • G06F21/12G06F21/14
    • G06F21/125G06F21/123G06F21/14G06F21/602G06F21/72
    • Verfahren zum Schutz eines Computerprogramms gegen Beeinflussung durch ein Eindringprogramm oder durch eine Manipulationssoftware zur Manipulation von Computerprogrammen auf einem Computersystem mit einem Prozessor, einem Hauptspeicher und einem Speichermedium.
      Das Verfahren beruht auf dem Kerckhoffschen Prinzip. Teile des Computerprogramms sind verschlüsselt, um eine statische Analyse des Computerprogramms ohne eine Ausführung des Computerprogramms durch den Prozessor zu verhindern, wobei ein zur Entschlüsselung des verschlüsselten Teils des Computerprogramms notwendiger Schlüssel in einem sicheren Schlüsselspeicher, der mit dem Computer kommuniziert, abgelegt ist.
    • 本发明涉及一种用于保护计算机程序不受侵入程序的影响或用于在包括处理器,主存储单元和存储介质的计算机系统上操纵计算机程序的操纵软件的方法。 该方法涉及Kerckhoffs的原理,使得受保护的计算机程序可以自由访问,并且可以由侵入程序或操纵软件读取。 作为计算机程序专业化的结果,受保护的计算机程序的一部分被多次提供在受保护的计算机程序的程序代码中。 计算机程序的一部分被加密以防止计算机程序的统计分析,而没有运行计算机程序的处理器,其中将计算机程序的加密部分解密所需的密钥存储在受保护密钥存储单元中,该保护密钥存储单元 与电脑通讯。
    • 65. 发明公开
    • DEVICE FOR OBFUSCATING APPLICATION CODE AND METHOD FOR SAME
    • 设备用于隐藏的应用代码及其方法
    • EP2897073A1
    • 2015-07-22
    • EP13891630.9
    • 2013-09-30
    • Soongsil University Research Consortium Techno-Park
    • YI, Jeong HyunJUNG, Jin Hyuk
    • G06F21/12G06F21/14
    • G06F21/14G06F21/125G06F21/602
    • The present invention relates to an apparatus for tamper protection of an application and a method thereof. An apparatus for tamper protection of an application according to the present invention includes: an input unit that receives codes to be used in an application; a code separator that separates the inputted code into sensitive codes requiring application tamper protection and general codes including calling codes for calling the sensitive codes; a code converter that converts the sensitive code into the format of a native code; an encoder that encrypts the sensitive codes and inserts the address of a sensitive code connector storing the address information of the sensitive codes; a controller that separates the calling codes from the general code and registers the calling codes on a management server, and adds a calling code loading routine for requesting the calling codes and a vector table loading routine for requesting a vector table including vector information of the called sensitive codes; and a code combiner that creates an application by combining the obfuscated general codes with the sensitive codes.
      According to the present invention, it is possible to compensate vulnerability to reverse engineering of a managed code by converting a sensitive code in the codes of an application into a native code and performing encryption of a code protection scheme based of self modification on the converted sensitive code. Accordingly, it is possible to increase security against forgery of an application.
      Further, since the control flow is changed by a dynamic vector and a calling code for calling a sensitive code converted into a native code and a vector table connecting the calling code are separately managed to be dynamically loaded when an application is executed, it is possible to enhance reverse engineering analysis resistance.