US 12,113,899 B2
On demand code decryption
Laurent Dore, Cheseaux-sur-Lausanne (CH); Eric Piret, Cheseaux-sur-Lausanne (CH); Yasser Belaidi, Cheseaux-sur-Lausanne (CH); and Brecht Wyseur, Cheseaux-sur-Lausanne (CH)
Assigned to Nagravision Sàrl, Cheseaux-sur-Lausanne (CH)
Filed by Nagravision Sàrl, Cheseaux-sur-Lausanne (CH)
Filed on Apr. 19, 2022, as Appl. No. 17/723,998.
Application 17/723,998 is a continuation of application No. 16/313,273, granted, now 11,336,448, previously published as PCT/EP2017/066198, filed on Jun. 29, 2017.
Claims priority of application No. 16305797 (EP), filed on Jun. 29, 2016.
Prior Publication US 2022/0360442 A1, Nov. 10, 2022
Int. Cl. H04L 9/32 (2006.01); G06F 21/14 (2013.01); G06F 21/56 (2013.01); G06F 21/60 (2013.01)
CPC H04L 9/32 (2013.01) [G06F 21/14 (2013.01); G06F 21/56 (2013.01); G06F 21/602 (2013.01); G06F 2221/033 (2013.01)] 13 Claims
OG exemplary drawing
 
1. A method of protecting code comprising:
identifying code to be protected in an input object file;
extracting the identified code to be protected from the input object file;
deleting the identified code from the input object file;
replacing the identified code with fake junk code to generate a first output object file, the fake junk code being non-randomized code, the first output object file including markers identifying the fake junk code; and
injecting the identified code into a second output object file,
such that decryption is avoided in a compilation process and wherein the identified code is encrypted or obscured prior to injection into the second output object file.