COMPUTER PROTOCOL GENERATION AND OBFUSCATION
First Claim
Patent Images
1. A method of obfuscating a computer protocol including at least one data structure, comprising the acts of:
- receiving a definition of the protocol at a port;
storing the received definition in a first computer readable storage coupled to the port;
at a processor coupled to the first computer readable storage, converting the definition to a computer source code file which includes the data structure;
obfuscating the source code file; and
storing the obfuscated source code file in a second computer readable storage.
1 Assignment
0 Petitions
Accused Products
Abstract
In the field of computer science, communications protocols (such as computer network protocols) are hardened (secured) against reverse engineering attacks by hackers using a software tool which is applied to a high level definition of the protocol. The tool converts the definition to executable form, such as computer source code, and also applies reverse-engineering countermeasures to the protocol definition as now expressed in source code, to prevent hackers from recovering useful details of the protocol. This conversion process also allows preservation of backwards version compatibility of the protocol definition.
-
Citations
22 Claims
-
1. A method of obfuscating a computer protocol including at least one data structure, comprising the acts of:
-
receiving a definition of the protocol at a port; storing the received definition in a first computer readable storage coupled to the port; at a processor coupled to the first computer readable storage, converting the definition to a computer source code file which includes the data structure; obfuscating the source code file; and storing the obfuscated source code file in a second computer readable storage. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. Apparatus for obfuscating a computer protocol including at least one data structure, comprising:
-
a port adapted to receive a definition of the protocol; a first computer readable storage coupled to the port and adapted to store the received definition; a processor coupled to the first computer readable storage, and which converts the definition to a computer source code file which includes the data structure; wherein the processor obfuscates the source code file; and a second computer readable storage adapted to store the obfuscated source code file. - View Dependent Claims (14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification