Cyclically dependent checks for software tamper-proofing

    公开(公告)号:US11698950B2

    公开(公告)日:2023-07-11

    申请号:US17391804

    申请日:2021-08-02

    Applicant: Snap Inc.

    CPC classification number: G06F21/14 G06F8/443 G06F8/51

    Abstract: Embodiments of the present disclosure relate to anti-tamper computer systems, in particular to methods and systems which can embed protection code into software. Among other things, the protection code helps prevent (and make it more costly) to reverse engineer to tamper with the protected software with malicious intent, such as, but not restricted to: the removal of a license protection mechanism; the removal of code displaying advertisements; the injection of a malicious thread into the program memory space; illicit usage; or any other kind of unauthorized modification of the software.

    Cyclically dependent checks for software tamper-proofing

    公开(公告)号:US11080373B1

    公开(公告)日:2021-08-03

    申请号:US16653631

    申请日:2019-10-15

    Applicant: Snap Inc.

    Abstract: Embodiments of the present disclosure relate to anti-tamper computer systems, in particular to methods and systems which can embed protection code into software. Among other things, the protection code helps prevent (and make it more costly) to reverse engineer to tamper with the protected software with malicious intent, such as, but not restricted to: the removal of a license protection mechanism; the removal of code displaying advertisements; the injection of a malicious thread into the program memory space; illicit usage; or any other kind of unauthorized modification of the software.

    CYCLICALLY DEPENDENT CHECKS FOR SOFTWARE TAMPER-PROOFING

    公开(公告)号:US20220058243A1

    公开(公告)日:2022-02-24

    申请号:US17391804

    申请日:2021-08-02

    Applicant: Snap Inc.

    Abstract: Embodiments of the present disclosure relate to anti-tamper computer systems, in particular to methods and systems which can embed protection code into software. Among other things, the protection code helps prevent (and make it more costly) to reverse engineer to tamper with the protected software with malicious intent, such as, but not restricted to: the removal of a license protection mechanism; the removal of code displaying advertisements; the injection of a malicious thread into the program memory space; illicit usage; or any other kind of unauthorized modification of the software.

Patent Agency Ranking