Method of securing software against reverse engineering

作者: Miki Mullor

DOI:

关键词:

摘要: A method of securing software against reverse engineering replaces portions code with tokens. key is created in which the functionality each such token indicated. The stored memory, separate from software. may be encrypted for added security. When an authorized user seeks to run software, recalled memory and decrypted, if previously encrypted. corresponding functionalities indicated by are substituted whenever tokens encountered.

参考文章(20)
Stanley Taihai Chow, Yuan Xiang Gu, Harold Joseph Johnson, Becky Laiping Chan, ***WITHDRAWN PATENT AS PER THE LATEST USPTO WITHDRAWN LIST***Encoding technique for software and hardware ,(1998)
Brian Anderson Wichmann, Graeme Iain Papworth Parkin, Simon Mays Elsom, Bernard John Chorley, Software protection device ,(1985)
Kevin G. Curran, Steven Eric Golson, Christian S. Rode, Software protection methods and apparatus ,(1983)
Edward Tang Kwai Ma, Wendell L. Little, Stephen N. Grider, Encryption-based security protection for processors ,(2001)
Michael S. Bahorich, Steven L. Farmer, Method of Seismic Signal Processing and Exploration ,(1995)