Use of code obfuscation to inhibit generation of non-use-restricted versions of copy protected software applications
First Claim
1. A method of protecting a software application from unauthorized use, the method comprising:
- providing a code module which implements at least one function of a use-restriction scheme, the use-restriction scheme using an electronic security device (ESD) to prevent an unauthorized use of the application;
processing at least a portion of said code module with an obfuscation tool to controllably increase a quantity of code used to implement the function of the use-restriction scheme, obfuscation tool generating obfuscated code; and
imbedding the obfuscated code within the application;
wherein the obfuscated code inhibits the generation of a non-use-restricted version of the application.
7 Assignments
0 Petitions
Accused Products
Abstract
Three methods are disclosed for protecting software applications from unauthorized distribution and use (piracy). The first method involves using values generated by a conventional ESD (Electronic Security Device) to encrypt and/or decrypt user data (such as a file) that is generated and used by the application. In a preferred embodiment, the user data is encrypted (such as during a write to memory) using values returned by the ESD, and the user data is later decrypted using like values returned by a software-implemented ESD simulator. The second and third methods involve the use of special development tools that make the task of analyzing the application'"'"'s copy protection code (such as the code used to encrypt and/or decrypt user data) significantly more difficult. Specifically, the second method involves using pseudocode to implement some or all of the application'"'"'s copy protection functions. The pseudocode for a given function is generated (preferably in encrypted form) from actual code using a special development tool, and is then imbedded within the application together with a corresponding pseudocode interpreter. The interpreter fetches, decrypts and executes the pseudocode when the function is called. Because no disassemblers or other development tools exist for analyzing the pseudocode, the task of analyzing the copy protection functions becomes significantly more complex. The third method involves the use of a special obfuscation tool to convert the code for selected copy-protection functions into unnecessarily long, inefficient sequences of machine code. In one implementation of the obfuscation tool, the developer can control the quantity of code that is generated by specifying one or more control parameters. The three methods can also be used to protect software license management systems from security attacks.
151 Citations
48 Claims
-
1. A method of protecting a software application from unauthorized use, the method comprising:
-
providing a code module which implements at least one function of a use-restriction scheme, the use-restriction scheme using an electronic security device (ESD) to prevent an unauthorized use of the application;
processing at least a portion of said code module with an obfuscation tool to controllably increase a quantity of code used to implement the function of the use-restriction scheme, obfuscation tool generating obfuscated code; and
imbedding the obfuscated code within the application;
wherein the obfuscated code inhibits the generation of a non-use-restricted version of the application. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 40)
-
-
10. On a computer-readable medium, an application that is protected from unauthorized use, the application generated by performing at least the following steps:
-
providing a code module which implements at least one function of a use-restriction scheme, the use-restriction scheme using an electronic security device (ESD) to prevent an unauthorized use of the application;
processing at least a portion of said code module with an obfuscation tool to controllably increase a quantity of code used to implement the function of the use-restriction scheme, the obfuscation tool generating obfuscated code; and
imbedding the obfuscated code within the application;
wherein the obfuscated code inhibits the generation of a non-use-restricted version of the application. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 41)
-
-
20. A copy-protected software application, comprising:
-
application code which provides end-user functionality; and
copy protection code that implements a use-restriction scheme to control execution of the application code, the copy protection code comprising obfuscated machine code, the obfuscated machine code generated using an obfuscation tool which controllably increases a quantity of instructions within an input code sequence while preserving a function performed by the code sequence, the obfuscation tool thereby making the task of evaluating machine-level copy protection code more complex, such that the obfuscated machine code inhibits disablement of the use-restriction scheme. - View Dependent Claims (21, 22, 23, 24, 25, 26, 42, 43)
-
-
27. A method of protecting a software application from unauthorized use, the method comprising:
-
providing a code module which implements at least one function of a use-restriction scheme, the use-restriction scheme using a license management system (LMS) to prevent an unauthorized use of the application;
processing at least a portion of said code module with an obfuscation tool to controllably increase a quantity of code used to implement the function of the use-restriction scheme, the obfuscation tool generating obfuscated code; and
imbedding the obfuscated code within the application;
wherein the obfuscated code inhibits the generation of a non-use-restricted version of the application. - View Dependent Claims (28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 44)
-
-
45. A method of protecting a software application from unauthorized use, the method comprising:
-
intermingling a copy protection function with a non-copy-protection function within a code module, wherein the copy protection function implements at least a portion of a use-restriction scheme to control use of the software application, and the non-copy-protection function provides application-level functionality;
processing the code module with an obfuscation tool to controllably increase a quantity of executable code used to implement at least the intermingled copy protection and non-copy-protection functions, to thereby generate obfuscated code that implements the intermingled copy protection and non-copy-protection functions; and
incorporating the obfuscated code into the software application. - View Dependent Claims (46, 47, 48)
-
Specification