摘要 |
An improved software protection mechanism is disclosed whereby both the "asset files" of a software program and the core executable program itself are transformed in such a way that any redistribution of the modified executable program would also require redistribution of the corresponding transformed asset files. In operation, a file transformation module is used to intercept any file activity from the operating system. The file transformation module will perform the required reverse transformation only if the invoking request to the operating system is identified as being for transformed data bound to or from the modified executable program. A protection module containing asset lists, calling process identification information, transformation keys, and optionally other information such as transformation algorithms is used in association with the file transformation module. <IMAGE> |