Method and system for protecting software applications against static and dynamic software piracy techniques
First Claim
Patent Images
1. A method for protecting a software application module, comprising:
- rewriting the application module by overwriting executable code at identified authorization points with control transfers to a managed challenge system such that a rewritten application module results;
constructing the managed challenge system to include the overwritten executable code, the managed challenge system performing an authorization check upon acquiring control from an authorization point; and
linking the managed challenge system to the rewritten application module.
3 Assignments
0 Petitions
Accused Products
Abstract
An application module is rewritten by overwriting executable code at identified authorization points with control transfers to a managed challenge system such that a rewritten application module results. The managed challenge system is constructed to include the overwritten executable code, and performs an authorization check upon acquiring control from an authorization point. The managed challenge system is linked to the rewritten application module.
-
Citations
86 Claims
-
1. A method for protecting a software application module, comprising:
-
rewriting the application module by overwriting executable code at identified authorization points with control transfers to a managed challenge system such that a rewritten application module results;
constructing the managed challenge system to include the overwritten executable code, the managed challenge system performing an authorization check upon acquiring control from an authorization point; and
linking the managed challenge system to the rewritten application module. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43)
-
-
44. A system for protecting a software application module, comprising:
-
a coupling tool which rewrites the application module to form a modified application module by overwriting executable code at identified authorization points with control transfers to a managed challenge system, creates the managed challenge system which comprises;
the overwritten executable code, executable code from a challenge system, a runtime task table associating the identified authorization points with authorization check data and with the overwritten code, the authorization check data describing an authorization check from the challenge system to be performed upon control reaching the associated authorization point, and a coupling agent specialized from a coupling agent template, the coupling agent managing the managed challenge system, and links the managed challenge system to the rewritten application module; and
said coupling agent template. - View Dependent Claims (45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84)
-
-
85. A system for protecting a software application module, comprising:
-
means for rewriting the application module by overwriting executable code at identified authorization points with control transfers to a managed challenge system;
means for constructing the managed challenge system to include the overwritten executable code, the managed challenge system performing an authorization check upon acquiring control from an authorization point; and
means for linking the managed challenge system to the rewritten application module.
-
-
86. A computer program product for protecting a software application module, the computer program product comprising a computer usable medium having computer readable code thereon, including program code which:
-
rewrites the application module by overwriting executable code at identified authorization points with control transfers to a managed challenge system;
constructs the managed challenge system to include the overwritten executable code, the managed challenge system performing an authorization check upon acquiring control from an authorization point; and
links the managed challenge system to the rewritten application module.
-
Specification