System and method for cloaking software

  • US 6,192,475 B1
  • Filed: 03/25/1998
  • Issued: 02/20/2001
  • Est. Priority Date: 03/31/1997
  • Status: Expired due to Term
First Claim
Patent Images

1. A method for utilizing a data processor to protect a software program, comprising:

  • a) inputting said program;

    b) analyzing said program to gather symbol information on one or more original variables used within said program;

    c) using said symbol information to compute cloaked variables, with new addressing expressions, corresponding to one or more of said original variables, such that said cloaked variables use dynamic addressing, which changes at runtime, rather than fixed constant addressing;

    d) replacing a plurality of said original variables by said cloaked variables, updating said program and thereby creating a protected program;

    e) outputting said protected program;

    whereby it becomes difficult to determine when two variables refer to the same or different actual memory locations in said protected program and whereby the flow of values through said protected program becomes hidden.

View all claims

    Thank you for your feedback