CN110059455A - Code encryption method, apparatus, electronic equipment and computer readable storage medium - Google Patents
Code encryption method, apparatus, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110059455A CN110059455A CN201910283828.5A CN201910283828A CN110059455A CN 110059455 A CN110059455 A CN 110059455A CN 201910283828 A CN201910283828 A CN 201910283828A CN 110059455 A CN110059455 A CN 110059455A
- Authority
- CN
- China
- Prior art keywords
- character string
- instruction
- encryption
- bytecode
- code
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000003860 storage Methods 0.000 title claims abstract description 14
- 238000012545 processing Methods 0.000 claims abstract description 21
- 239000000284 extract Substances 0.000 claims abstract description 4
- 238000000605 extraction Methods 0.000 claims description 7
- 238000001914 filtration Methods 0.000 claims description 6
- 238000003780 insertion Methods 0.000 claims description 6
- 230000037431 insertion Effects 0.000 claims description 6
- 230000005055 memory storage Effects 0.000 claims 1
- 238000004590 computer program Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- QEVHRUUCFGRFIF-UHFFFAOYSA-N 6,18-dimethoxy-17-[oxo-(3,4,5-trimethoxyphenyl)methoxy]-1,3,11,12,14,15,16,17,18,19,20,21-dodecahydroyohimban-19-carboxylic acid methyl ester Chemical compound C1C2CN3CCC(C4=CC=C(OC)C=C4N4)=C4C3CC2C(C(=O)OC)C(OC)C1OC(=O)C1=CC(OC)=C(OC)C(OC)=C1 QEVHRUUCFGRFIF-UHFFFAOYSA-N 0.000 description 3
- 101100533283 Dictyostelium discoideum serp gene Proteins 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000005336 cracking Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 230000007257 malfunction Effects 0.000 description 1
- 230000002787 reinforcement Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Multimedia (AREA)
- Technology Law (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides code encryption method, apparatus, electronic equipment and computer readable storage mediums.Code encryption method includes: to be compiled to source code, generates original intermediate file;Extract the bytecode information in original intermediate file, wherein bytecode information includes one or more presumptive instruction;Intercept one or more presumptive instruction in bytecode information, according to the instruction features for the constant character string being obtained ahead of time, one or more presumptive instruction is filtered, plaintext constant character string corresponding to the presumptive instruction in one or more presumptive instruction comprising instruction features is obtained;It performs encryption processing to plaintext constant character string, obtains encryption constant character string;Plaintext constant character string is replaced using encryption constant character string, and is inserted into the code of decryption processing corresponding with encryption, obtains encrypted intermediate file.The embodiment of the present invention improves the security level of application program, improves the efficiency for searching encryption.
Description
Technical field
This invention relates generally to computer software programs, relate more specifically to code encryption method, apparatus, electronic equipment
And computer readable storage medium.
Background technique
With the development of science and technology with the promotion of technical industry application level, the application program of mobile terminal is increasingly
It is universal.Due to there is huge interests to lure, for cracking and attack also more and more fiercely for application program.More especially it is related to
Application program to types such as payment, recognition of face, secrets becomes the object of attack stood in the breach.
Currently, computer program product source code encipherment scheme usually carries out source code by third-party reinforcement tools
Reinforce and obscure, and do it is some it is anti-intercept, the strategy of anti-debugging, it is therefore an objective to prevent from being cracked or to cracking increase difficulty.
However, the character string being much present in user interface and programmed logic exists in the form of plaintext, can be exposed after decompiling
Product Logic brings great convenience to cracking.Cracker can quickly be positioned by global search constant character string information
Want the place looked for.
In order to solve this problem, manually the character string in program product can be encrypted, however this
Kind mode low efficiency is easy to omit or malfunction.
Summary of the invention
In order to solve the above-mentioned problems in the prior art, the embodiment of the invention provides code encryption method, apparatus,
Electronic equipment and computer readable storage medium.
In a first aspect, the embodiment of the present invention provides a kind of code encryption method, this method comprises: code compilation step, right
Source code is compiled, and generates original intermediate file;Bytecode information extracting step extracts the bytecode in original intermediate file
Information, wherein bytecode information includes one or more presumptive instruction;Instruction intercepts and filtration step, intercepts bytecode information
In one or more presumptive instruction, according to the instruction features for the constant character string being obtained ahead of time, to one or more original finger
Order is filtered, and obtains plaintext constant character corresponding to the presumptive instruction in one or more presumptive instruction comprising instruction features
String;Character string encrypting step performs encryption processing to plaintext constant character string, obtains encryption constant character string;Replacement insertion step
Suddenly, plaintext constant character string is replaced using encryption constant character string, and is inserted into decryption processing corresponding with encryption
Code obtains encrypted intermediate file.
In one example, instruction features include load constant instruction features.
In one example, original intermediate file includes class file.
In one example, bytecode information extracting step includes: and decomposes order using bytecode plug-in unit or intermediate file to mention
Take the bytecode information in original intermediate file.
In one example, it is held using any one of bytecode control frame, bytecode editor class libraries and bytecode engineering library
Line character string encrypting step and replacement inserting step.
In one example, execution character string encrypting step and replacement inserting step in intermediate file initialization procedure.
Second aspect, the embodiment of the present invention provide a kind of code encryption device, which includes: code compilation module, match
It sets for being compiled to source code, generates original intermediate file;Bytecode information extraction modules are configured to extract in original
Between bytecode information in file, wherein bytecode information includes one or more presumptive instruction;Instruction intercepts and filter module
Block is configured to intercept one or more presumptive instruction in bytecode information, according to the finger for the constant character string being obtained ahead of time
Feature is enabled, one or more presumptive instruction is filtered, obtains the original in one or more presumptive instruction comprising instruction features
Begin the corresponding plaintext constant character string of instruction;Character string encrypting module is configured to execute encryption to plaintext constant character string
Processing obtains encryption constant character string;Replacement insertion module is configured to replace plaintext constant word using encryption constant character string
Symbol string, and it is inserted into the code of decryption processing corresponding with encryption, obtain encrypted intermediate file.
The third aspect, the embodiment of the present invention provide a kind of electronic equipment, which includes: memory, for storing
Instruction;And processor, the instruction execution above method for calling memory to store.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, and computer readable storage medium is deposited
Computer executable instructions are contained, computer executable instructions when executed by the processor, execute the above method.
Code encryption method, apparatus, electronic equipment and computer readable storage medium provided in an embodiment of the present invention pass through
Instruction in bytecode information is intercepted, filtered and encrypted, and replaces plaintext string using encrypted characters string, is provided
A method of the character string based on automatic script is searched, filters, encrypts and is replaced automatically.It solves plaintext string and is easy band
The security risk problem come, substantially increases the security level of application program;Simultaneously solve manual encrypted characters string efficiency it is low,
Heavy workload is easy the problem of error, improves the efficiency for searching encryption.
Detailed description of the invention
The following detailed description is read with reference to the accompanying drawings, above-mentioned and other purposes, the feature of embodiment of the present invention
It will become prone to understand with advantage.In the accompanying drawings, several implementations of the invention are shown by way of example rather than limitation
Mode, in which:
Fig. 1 shows the flow chart of the code encryption method of embodiment according to the present invention;
Fig. 2 shows the block diagrams of the code encryption device of embodiment according to the present invention;
Fig. 3 shows the block diagram of the electronic equipment of embodiment according to the present invention.
In the accompanying drawings, identical or corresponding label indicates identical or corresponding part.
Specific embodiment
The principle and spirit of the invention are described below with reference to several illustrative embodiments.It should be appreciated that providing this
A little embodiments are used for the purpose of making those skilled in the art can better understand that realizing the present invention in turn, and be not with any
Mode limits the scope of the invention.
As shown in Figure 1, an embodiment of the invention provides a kind of code encryption method 100.Method 100 includes step
Rapid S101-S105.
S101 is code compilation step, is compiled to source code, and original intermediate file is generated.
S102 is bytecode information extracting step, extracts the bytecode information in original intermediate file, wherein bytecode letter
Breath includes one or more presumptive instruction.
S103 is instruction interception and filtration step, one or more presumptive instruction in bytecode information is intercepted, according to pre-
The instruction features of the constant character string first obtained are filtered one or more presumptive instruction, and it is original to obtain one or more
Plaintext constant character string corresponding to presumptive instruction in instruction comprising instruction features.
In some embodiments, traversal interception can be carried out to the presumptive instruction in bytecode information, that is, intercept wherein
Each presumptive instruction.It is of course also possible to intercept a part instruction therein according to demand.
It should be noted that " constant character string " concept is used in description of the invention, in reality for consistency of composing a piece of writing
In, constant character string is referred to as constant field, constant character string information, constant information etc..
It in some embodiments, can be constant character after by intercepting and filtering acquisition plaintext constant character string
The value of string saves, and prepares subsequent operation.For example, the value of plaintext constant character string can be stored in dictionary.
S104 is character string encrypting step, is performed encryption processing to plaintext constant character string, and encryption constant character string is obtained.
In some embodiments, encryption can be preset.In addition, encryption may include a variety of adds
Close algorithm, for example, the conventional encryption algorithms such as Base64, AES, can choose at random according to demand, as long as allowing constant character string can not
It is directly visible and searches.
It in some embodiments, can be opposite with the value of plaintext constant character string by the value of encrypted constant character string
It is stored in dictionary with answering, is convenient for subsequent index and use.
S105 is to replace inserting step, replaces plaintext constant character string using encryption constant character string, and be inserted into and add
The close code for handling corresponding decryption processing, obtains encrypted intermediate file.
It in some embodiments, can be by retrieving plaintext constant in dictionary when carrying out the replacement of constant character string
The corresponding encryption constant character string of character string, to be replaced.
In some embodiments, the corresponding decryption processing of encryption can be inserted into the initialization of intermediate file
In method, to guarantee being normally carried out for programmed logic.
The code encryption method 100 that embodiments of the present invention propose is by extracting the bytecode letter in original intermediate file
Breath helps to search constant character string, has some common instructions because there is the instruction of constant character string in bytecode information
Feature.By the way that the instruction in bytecode information is intercepted, filtered and is encrypted, and in plain text using the replacement of encryption constant character string
Constant character string provides a kind of method that the character string based on automatic script is searched, filters, encrypts and replaced automatically.This hair
The code encryption method 100 that bright embodiment proposes solves the problems, such as that plaintext string is easy bring security risk, significantly
Improve the security level of application program;It solves low manual encrypted characters string efficiency simultaneously, heavy workload, be easy asking for error
Topic improves the efficiency for searching encryption.
As an embodiment of the invention, instruction features may include load constant instruction features.With Java system language
For speech, the instruction of usual defconstant character string is usually to load constant (Load Constant, LDC) instruction, and LDC is referred to
The instruction features as constant character string are enabled, constant character string can easily, be rapidly found.
As an embodiment of the invention, by taking Java system language as an example, original intermediate file may include class file,
That is, the file of .class suffix.
As an embodiment of the invention, bytecode information extracting step includes: to utilize bytecode (Bytecode)
Plug-in unit or intermediate file decompose the bytecode information in the original intermediate file of order extraction.In some embodiments, intermediate
It may include javap order that file, which decomposes order, can decompose class (.class) file, carry out decompiling to intermediate file,
Check bytecode information.
As an embodiment of the invention, bytecode control frame, bytecode editor class libraries and byte can use
Any execution character string encrypting step S104 in code engineering library (Byte Code Engineering Library, BCEL)
With replacement inserting step S105.
As an embodiment of the invention, can in intermediate file initialization procedure execution character string encrypting step
S104 and replacement inserting step S105.
In some embodiments, bytecode control frame may include ASM tool and SERP tool.Wherein, ASM tool
It is the frame for being dedicated to bytecode operation and analysis, can be used to modify an already present class or dynamic generates one
A new class.ASM provides some general bytecode conversions and parser, can be customized by these algorithms more complicated
Tool.Compared with other bytecode tools, ASM is more concerned about execution efficiency, be designed it is smaller faster.SERP bytecode frame
One group of advanced application programming interface (Application Programming Interface, API) progress can be provided
The operation of bytecode various aspects.
In some embodiments, bytecode editor class libraries may include javassist tool, and javassist tool is
Analysis, editor and the class libraries for creating Java bytecode of one open source.
Above-mentioned ASM tool, javassist tool, BCEL tool, SERP tool can carry out the .class code of generation
After addition and modification, new .class file is generated.It should be noted that embodiments of the present invention are not limited to above-mentioned enumerate
Several tools, under different programming language environment, can using different tool implementation classes like function.
As shown in Fig. 2, an embodiment of the invention provides a kind of code encryption device 200.Device 200 includes mould
Block 201-205.
Code compilation module 201 may be configured to be compiled source code, generate original intermediate file;
Bytecode information extraction modules 202 may be configured to extract the bytecode information in original intermediate file, wherein
Bytecode information includes one or more presumptive instruction.
Instruction intercepts and filtering module 203 may be configured to intercept one or more original finger in bytecode information
Enable, according to the instruction features for the constant character string being obtained ahead of time, one or more presumptive instruction is filtered, obtain one or
Plaintext constant character string corresponding to presumptive instruction in a plurality of presumptive instruction comprising instruction features.
Character string encrypting module 204 may be configured to perform encryption processing to plaintext constant character string, and it is normal to obtain encryption
Measure character string.
Replacement insertion module 205 may be configured to replace plaintext constant character string using encryption constant character string, and
It is inserted into the code of decryption processing corresponding with encryption, obtains encrypted intermediate file.
As an embodiment of the invention, instruction features may include load constant instruction features.
As an embodiment of the invention, original intermediate file may include class file.
As an embodiment of the invention, bytecode information extraction modules can also be configured to: utilize bytecode
(Bytecode) plug-in unit or intermediate file decompose the bytecode information in the original intermediate file of order extraction.
As an embodiment of the invention, bytecode control frame, bytecode editor class libraries and byte can use
The operation of any execution character string encrypting module 204 and replacement insertion module 205 in code engineering library (BCEL).
As an embodiment of the invention, can in intermediate file initialization procedure execution character string encrypting module
204 are inserted into the operation of module 205 with replacement.
The function that modules in device are realized is corresponding with the step in method as described above, specific implementation
The description for method and step above is referred to technical effect, details are not described herein.
As shown in figure 3, an embodiment of the invention provides a kind of electronic equipment 300.Wherein, the electronic equipment
300 include memory 301, processor 302, input/output (Input/Output, I/O) interface 303.Wherein, memory 301,
For storing instruction.Processor 302, the code encryption of the instruction execution embodiment of the present invention for calling memory 301 to store
Method.Wherein, processor 302 is connect with memory 301, I/O interface 303 respectively, for example, can by bus system and/or other
Bindiny mechanism's (not shown) of form is attached.Memory 301 can be used for storing program and data, including the embodiment of the present invention
Involved in code encryption program, processor 302 is stored in the program of memory 301 by operation thereby executing electronic equipment
300 various function application and data processing.
Processor 302 can use digital signal processor (Digital Signal in the embodiment of the present invention
Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable patrol
At least one of volume array (Programmable Logic Array, PLA) example, in hardware realizes, the processor 302
It can be central processing unit (Central Processing Unit, CPU) or there is data-handling capacity and/or instruction
The combination of one or more of the processing unit of other forms of executive capability.
Memory 301 in the embodiment of the present invention may include one or more computer program products, the computer
Program product may include various forms of computer readable storage mediums, such as volatile memory and/or non-volatile deposit
Reservoir.The volatile memory for example may include random access memory (Random Access Memory, RAM) and/
Or cache memory (Cache) etc..The nonvolatile memory for example may include read-only memory (Read-Only
Memory, ROM), flash memory (Flash Memory), hard disk (Hard Disk Drive, HDD) or solid state hard disk
(Solid-State Drive, SSD) etc..
In the embodiment of the present invention, I/O interface 303 can be used for receiving input instruction (such as number or character information, and
Generate key signals input related with the user setting of electronic equipment 300 and function control etc.), it can also be output to the outside various
Information (for example, image or sound etc.).In the embodiment of the present invention I/O interface 303 may include physical keyboard, function button (such as
Volume control button, switch key etc.), mouse, operating stick, trace ball, microphone, one in loudspeaker and touch panel etc.
It is a or multiple.
In some embodiments, the present invention provides a kind of computer readable storage medium, the computer-readable storages
Media storage has computer executable instructions, and computer executable instructions when executed by the processor, execute described above appoint
Where method.
Although description operation in a particular order in the accompanying drawings should not be construed as requiring specific shown in
Sequence or serial order operate to execute these operations, or shown in requirement execution whole to obtain desired result.?
In specific environment, multitask and parallel processing be may be advantageous.
Methods and apparatus of the present invention can be completed using standard programming technology, using rule-based logic or its
His logic realizes various method and steps.It should also be noted that herein and the terms used in the claims " device "
" module " is intended to include using the realization of a line or multirow software code and/or hardware realization and/or for receiving input
Equipment.
One or more combined individually or with other equipment can be used in any step, operation or program described herein
A hardware or software module are executed or are realized.In one embodiment, software module use includes comprising computer program
The computer program product of the computer-readable medium of code is realized, can be executed by computer processor any for executing
Or whole described step, operation or programs.
For the purpose of example and description, the preceding description that the present invention is implemented is had been presented for.Preceding description is not poor
Also not the really wanting of act property limits the invention to exact form disclosed, according to the above instruction there is likely to be various modifications and
Modification, or various changes and modifications may be obtained from the practice of the present invention.Select and describe these embodiments and be in order to
Illustrate the principle of the present invention and its practical application, so that those skilled in the art can be to be suitable for the special-purpose conceived
Come in a variety of embodiments with various modifications and utilize the present invention.
Claims (9)
1. a kind of code encryption method, which comprises
Code compilation step, is compiled source code, generates original intermediate file;
Bytecode information extracting step extracts the bytecode information in the original intermediate file, wherein the bytecode information
Including one or more presumptive instruction;
Instruction intercepts and filtration step, one or more presumptive instruction in the bytecode information is intercepted, according to preparatory
The instruction features of the constant character string of acquisition are filtered one or more presumptive instruction, obtain described one or more
Plaintext constant character string corresponding to presumptive instruction in presumptive instruction comprising described instruction feature;
Character string encrypting step performs encryption processing to the plaintext constant character string, obtains encryption constant character string;
Replace inserting step, replace the plaintext constant character string using the encryption constant character string, and insertion with it is described
The code of the corresponding decryption processing of encryption, obtains encrypted intermediate file.
2. according to the method described in claim 1, wherein, described instruction feature includes load constant instruction features.
3. according to the method described in claim 1, wherein, the original intermediate file includes class file.
4. according to the method described in claim 1, wherein, the bytecode information extracting step includes:
The bytecode information in the order extraction original intermediate file is decomposed using bytecode plug-in unit or intermediate file.
5. according to the method described in claim 1, wherein, utilizing bytecode control frame, bytecode editor class libraries and bytecode
Any one of engineering library executes the character string encrypting step and the replacement inserting step.
6. according to the method described in claim 1, wherein, the character string encryption step is executed in intermediate file initialization procedure
The rapid and replacement inserting step.
7. a kind of code encryption device, described device include:
Code compilation module is configured to be compiled source code, generates original intermediate file;
Bytecode information extraction modules are configured to extract the bytecode information in the original intermediate file, wherein the word
Saving code information includes one or more presumptive instruction;
Instruction intercepts and filtering module, is configured to intercept one or more presumptive instruction in the bytecode information,
According to the instruction features for the constant character string being obtained ahead of time, one or more presumptive instruction is filtered, described in acquisition
Plaintext constant character string corresponding to presumptive instruction in one or more presumptive instruction comprising described instruction feature;
Character string encrypting module is configured to perform encryption processing to the plaintext constant character string, obtains encryption constant character
String;
Replacement insertion module, is configured to replace the plaintext constant character string using the encryption constant character string, and insert
The code for entering decryption processing corresponding with the encryption, obtains encrypted intermediate file.
8. a kind of electronic equipment, the electronic equipment include:
Memory, for storing instruction;And
Processor, for calling the described instruction of the memory storage to execute such as side of any of claims 1-6
Method.
9. a kind of computer readable storage medium, the computer-readable recording medium storage has computer executable instructions, institute
It states computer executable instructions when executed by the processor, executes such as method of any of claims 1-6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910283828.5A CN110059455A (en) | 2019-04-09 | 2019-04-09 | Code encryption method, apparatus, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910283828.5A CN110059455A (en) | 2019-04-09 | 2019-04-09 | Code encryption method, apparatus, electronic equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110059455A true CN110059455A (en) | 2019-07-26 |
Family
ID=67317622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910283828.5A Pending CN110059455A (en) | 2019-04-09 | 2019-04-09 | Code encryption method, apparatus, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110059455A (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659490A (en) * | 2019-09-20 | 2020-01-07 | 哈尔滨安天科技集团股份有限公司 | Malicious sample processing method and device, electronic equipment and storage medium |
CN111159662A (en) * | 2019-12-25 | 2020-05-15 | 郑州阿帕斯数云信息科技有限公司 | Data processing method and device |
CN111400736A (en) * | 2020-03-17 | 2020-07-10 | 同盾(广州)科技有限公司 | Application program encryption method and device, storage medium and electronic equipment |
CN111460516A (en) * | 2020-06-22 | 2020-07-28 | 腾讯科技(深圳)有限公司 | Non-invasive data protection method, device, terminal and storage medium |
CN112115429A (en) * | 2020-08-25 | 2020-12-22 | 北京基调网络股份有限公司 | Java class encryption and decryption method and computer readable storage medium |
CN112214653A (en) * | 2020-10-29 | 2021-01-12 | Oppo广东移动通信有限公司 | Character string recognition method and device, storage medium and electronic equipment |
CN112256275A (en) * | 2020-10-22 | 2021-01-22 | 北京字节跳动网络技术有限公司 | Code obfuscation method, device, electronic device and medium |
CN113282294A (en) * | 2021-05-19 | 2021-08-20 | 武汉极意网络科技有限公司 | Android platform-based Java character string confusion method and device |
CN113434148A (en) * | 2021-06-30 | 2021-09-24 | 平安普惠企业管理有限公司 | Decryption-preventing client development compiling method and device, electronic equipment and storage medium |
CN113642015A (en) * | 2021-08-02 | 2021-11-12 | 北京奇艺世纪科技有限公司 | File encryption method and device, electronic equipment and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102043932A (en) * | 2010-12-31 | 2011-05-04 | 中国航空工业集团公司第六三一研究所 | Method for preventing Java program from being decompiled |
CN104268444A (en) * | 2014-08-25 | 2015-01-07 | 浪潮电子信息产业股份有限公司 | Cloud OS Java source code protection method |
CN105335151A (en) * | 2014-08-14 | 2016-02-17 | 优视科技有限公司 | Installation file protection method and apparatus |
CN105718765A (en) * | 2016-01-26 | 2016-06-29 | 国家信息技术安全研究中心 | Method for achieving code obfuscation through finite automaton |
CN105930745A (en) * | 2016-04-25 | 2016-09-07 | 北京珊瑚灵御科技有限公司 | Android platform-based character string reinforcement method |
CN109409033A (en) * | 2018-09-11 | 2019-03-01 | 平安科技(深圳)有限公司 | Code encryption method, apparatus, computer installation and storage medium |
-
2019
- 2019-04-09 CN CN201910283828.5A patent/CN110059455A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102043932A (en) * | 2010-12-31 | 2011-05-04 | 中国航空工业集团公司第六三一研究所 | Method for preventing Java program from being decompiled |
CN105335151A (en) * | 2014-08-14 | 2016-02-17 | 优视科技有限公司 | Installation file protection method and apparatus |
CN104268444A (en) * | 2014-08-25 | 2015-01-07 | 浪潮电子信息产业股份有限公司 | Cloud OS Java source code protection method |
CN105718765A (en) * | 2016-01-26 | 2016-06-29 | 国家信息技术安全研究中心 | Method for achieving code obfuscation through finite automaton |
CN105930745A (en) * | 2016-04-25 | 2016-09-07 | 北京珊瑚灵御科技有限公司 | Android platform-based character string reinforcement method |
CN109409033A (en) * | 2018-09-11 | 2019-03-01 | 平安科技(深圳)有限公司 | Code encryption method, apparatus, computer installation and storage medium |
Non-Patent Citations (2)
Title |
---|
孙聪 等编: "《软件逆向工程原理与实践》", 28 February 2018, 西安电子科技大学出版社 * |
尹艳阳 等: "Java软件保护机制的研究与实现", 《现代计算机》 * |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110659490B (en) * | 2019-09-20 | 2023-02-24 | 安天科技集团股份有限公司 | Malicious sample processing method and device, electronic equipment and storage medium |
CN110659490A (en) * | 2019-09-20 | 2020-01-07 | 哈尔滨安天科技集团股份有限公司 | Malicious sample processing method and device, electronic equipment and storage medium |
CN111159662A (en) * | 2019-12-25 | 2020-05-15 | 郑州阿帕斯数云信息科技有限公司 | Data processing method and device |
CN111400736B (en) * | 2020-03-17 | 2022-07-22 | 同盾(广州)科技有限公司 | Application program encryption method and device, storage medium and electronic equipment |
CN111400736A (en) * | 2020-03-17 | 2020-07-10 | 同盾(广州)科技有限公司 | Application program encryption method and device, storage medium and electronic equipment |
CN111460516A (en) * | 2020-06-22 | 2020-07-28 | 腾讯科技(深圳)有限公司 | Non-invasive data protection method, device, terminal and storage medium |
CN112115429A (en) * | 2020-08-25 | 2020-12-22 | 北京基调网络股份有限公司 | Java class encryption and decryption method and computer readable storage medium |
CN112256275A (en) * | 2020-10-22 | 2021-01-22 | 北京字节跳动网络技术有限公司 | Code obfuscation method, device, electronic device and medium |
CN112256275B (en) * | 2020-10-22 | 2023-09-29 | 抖音视界有限公司 | Code confusion method, device, electronic equipment and medium |
CN112214653A (en) * | 2020-10-29 | 2021-01-12 | Oppo广东移动通信有限公司 | Character string recognition method and device, storage medium and electronic equipment |
CN113282294A (en) * | 2021-05-19 | 2021-08-20 | 武汉极意网络科技有限公司 | Android platform-based Java character string confusion method and device |
CN113434148A (en) * | 2021-06-30 | 2021-09-24 | 平安普惠企业管理有限公司 | Decryption-preventing client development compiling method and device, electronic equipment and storage medium |
CN113434148B (en) * | 2021-06-30 | 2024-03-22 | 广东迅维信息产业股份有限公司 | Decryption-preventing client development compiling method and device, electronic equipment and storage medium |
CN113642015A (en) * | 2021-08-02 | 2021-11-12 | 北京奇艺世纪科技有限公司 | File encryption method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110059455A (en) | Code encryption method, apparatus, electronic equipment and computer readable storage medium | |
TWI515668B (en) | Methods and systems for detection in a state machine | |
KR101873619B1 (en) | Boolean logic in a state machine lattice | |
US9104657B2 (en) | Using lexical analysis and parsing in genome research | |
CN107608750B (en) | Device for pattern recognition | |
US10866973B2 (en) | Test data management | |
US8615735B2 (en) | System and method for blurring instructions and data via binary obfuscation | |
CN110825363B (en) | Intelligent contract acquisition method and device, electronic equipment and storage medium | |
CN106575166A (en) | Methods for processing handwritten inputted characters, splitting and merging data and encoding and decoding processing | |
CN108334490A (en) | Keyword extracting method and keyword extracting device | |
Van Gompel et al. | Efficient n-gram, skipgram and flexgram modelling with Colibri Core | |
CN106960156A (en) | Data encryption and access method based on application program, device | |
US9563635B2 (en) | Automated recognition of patterns in a log file having unknown grammar | |
CN106598828A (en) | Method and device for determining invalid class in source code | |
CN109558735A (en) | A kind of rogue program sample clustering method and relevant apparatus based on machine learning | |
US10534755B2 (en) | Word, phrase and sentence deduplication for text repositories | |
Fang et al. | SIFO: secure computational infrastructure using FPGA overlays | |
CN107122636A (en) | A kind of APK reinforcement means and device based on SO files | |
CN110457869A (en) | Program compiles encryption method, device, storage medium and electronic equipment | |
CN102707938A (en) | Table-form software specification manufacturing and supporting method and device | |
CN104615935B (en) | A kind of hidden method towards Xen virtual platforms | |
US9697018B2 (en) | Synthesizing inputs to preserve functionality | |
US9286349B2 (en) | Dynamic search system | |
US10360289B2 (en) | Encoded text data management | |
CN103150401B (en) | A kind of field entirety replacement method based on MapReduce |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190726 |