The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jun. 16, 2009

Filed:

Apr. 15, 2003
Applicants:

Ariel Futoransky, Buenos Aires, AR;

Carlos Emilio Sarraute Yamada, Buenos Aires, AR;

Diego Ariel Bendersky, Buenos Aires, AR;

Luciano Notarfrancesco, Buenos Aires, AR;

Ariel Waissbein, Buenos Aires, AR;

Inventors:

Ariel Futoransky, Buenos Aires, AR;

Carlos Emilio Sarraute Yamada, Buenos Aires, AR;

Diego Ariel Bendersky, Buenos Aires, AR;

Luciano Notarfrancesco, Buenos Aires, AR;

Ariel Waissbein, Buenos Aires, AR;

Assignee:

Core SDI, Incorporated, Boston, MA (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 9/44 (2006.01); G06F 9/45 (2006.01); G06F 11/30 (2006.01); G06F 17/30 (2006.01); H04L 9/00 (2006.01);
U.S. Cl.
CPC ...
Abstract

A method for protecting software is provided, where source code for the software has a first directive marking an encryption beginning point and a second directive marking an encryption end point. The method contains the steps of: processing the source code to identify a block of code between the first and second directives; compiling the source code to produce a binary file; generating a valid key and a random string; encrypting the random string with the key to obtain a first encrypted value; encrypting a portion of the binary file corresponding to the block of code with the valid key to obtain a second encrypted value; and replacing the portion of the binary file corresponding to the block of code with the second encrypted value and code that can decrypt the second encrypted value during execution of the software.


Find Patent Forward Citations

Loading…