Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Protection method and device for target program, equipment and storage medium

A target program and equipment technology, applied in the field of information security

Active Publication Date: 2018-02-02
BEIJING SENSESHIELD TECH
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this protection method is that the protected program can still view the code at the IL level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and device for target program, equipment and storage medium
  • Protection method and device for target program, equipment and storage medium
  • Protection method and device for target program, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0049] figure 1 It is a flow chart of a method for protecting a target program provided in Embodiment 1 of the present invention. This embodiment is applicable to the protection of a target program, and the method can be executed by the device for protecting a target program provided in the embodiment of the present invention. The device can be realized by means of software and / or hardware, and the device can be integrated in any terminal equipment that requires the protection of the target program, such as figure 1 As shown, the method specifically includes the following steps:

[0050] S110. Obtain an intermediate language corresponding to the operation code of the execution engine.

[0051] Wherein, the intermediate language (IL, Intermediate Language) is an intermediate language derived on the Microsoft platform, and the compilers of various high-level languages ​​(such as C#, VB, F#) on the platform will convert respective codes into IL , which contains various elements...

Embodiment 2

[0071] figure 2 It is a flow chart of a method for protecting a target program in Embodiment 2 of the present invention. This embodiment is optimized on the basis of the foregoing Embodiment 1, and provides a preferred method for protecting a target program. Specifically, the conversion rules include : a subrule for converting the preset intermediate language bytes; converting the corresponding intermediate language in the following manner, including: searching for the preset intermediate language bytes from the corresponding intermediate language; A subrule corresponding to the intermediate language byte is set to convert the corresponding preset intermediate language byte.

[0072] Correspondingly, the method in this embodiment specifically includes the following steps:

[0073] S210. Obtain an intermediate language corresponding to the operation code of the execution engine.

[0074] S220. Search for preset intermediate language bytes from the intermediate language corre...

Embodiment 3

[0094] image 3 It is a schematic structural diagram of an object program protection device according to Embodiment 3 of the present invention. This embodiment can be applied to the protection of the target program, the device can be implemented in the form of software and / or hardware, and the device can be integrated in any device that provides the protection function of the target program, such as image 3 As shown, the device for protecting the target program specifically includes: a first acquisition module 310 , a first conversion module 320 , a compilation module 330 , a second acquisition module 340 and a second conversion module 350 .

[0095] Wherein, the first obtaining module 310 is used to obtain the intermediate language corresponding to the operation code of the execution engine;

[0096] The first conversion module 320 is configured to convert the intermediate language corresponding to the operation code of the execution engine according to conversion rules;

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a protection method and device for a target program, equipment and a storage medium. The method comprises the following steps that: obtaining an intermediatelanguage corresponding to the operation code of an execution engine; converting the intermediate language corresponding to the operation code of the execution engine according to a conversion rule; adopting the operation code corresponding to the converted intermediate language to compile the execution engine to obtain the recompiled execution engine; obtaining the intermediate language corresponding to a target program; and converting the intermediate language corresponding to the target program according to the conversion rule, wherein the converted target program is executed through the recompiled execution engine. Through the technical scheme of the method, the safety protection problem of a unity 3d program can be solved.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of information security, and in particular, to a method, device, device, and storage medium for protecting a target program. Background technique [0002] In the field of information security, software is a valuable asset, and the security of software has attracted more and more attention from units, enterprises and individuals. Unity3d is a professional game engine. The program code compiled by unity3d is stored using IL instructions. Using the open source mono engine as the execution environment, it can run on different platforms. [0003] While using unity3d to provide convenience, the compiled assembly is very easy to be decompiled. For example, using the Reflector tool can almost generate the source code of the program. [0004] At present, the protection of the compiled assembly of unity3d is mainly based on protection methods such as out-of-order obfuscation of methods, such as ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F8/41
CPCG06F8/41G06F21/14
Inventor 孙吉平朱庆芬
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products