Method for compiling and compiler

A compiling method and compiler technology, applied in the direction of instruments, memory systems, program control design, etc., can solve problems such as passwords are easy to be cracked, target programs cannot get better copyright protection, etc., to reduce workload, improve copyright protection, The effect of improving work efficiency

Active Publication Date: 2009-06-03
FEITIAN TECHNOLOGIES
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In realizing the above-mentioned compiling process, the inventors have found that at least the following problems exist in the prior art: after the target program is compiled from the source program, any computer with machine language processing capability can execute the target program, so that the compiled target program Better copyright protection cannot be obtained; even if a corresponding password is set for the target program, since these passwords are set by software, the password of the target program is easy to be cracked, and the compiled target program cannot be better protected by copyright

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for compiling and compiler
  • Method for compiling and compiler
  • Method for compiling and compiler

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] In order to ensure that the copyright of the compiled object code is better protected, the embodiment of the present invention provides a compiling method, such as figure 1 As shown, the method includes:

[0028] 101. The compilation process needs to preprocess the source program, and perform lexical analysis, syntax analysis, and semantic analysis on the preprocessed source program, and then convert the source program into intermediate code. This embodiment also needs to follow the preset Rules determine the insertion point of the security device verification code in the intermediate code of the source program;

[0029] Wherein, the above preset rule is to perform lexical analysis, syntax analysis and semantic analysis on the source program during the process of converting the source program into the intermediate code, so as to determine the insertion point of the security device verification code in the intermediate code of the source program.

[0030] 102. After det...

Embodiment 2

[0036] In order to introduce the technical solution adopted by the present invention more clearly, the present invention will be further described in detail in conjunction with the compiling process under the situation of adopting USB Key as the security device below, but the present invention can also include the embodiments of other security devices. The examples are not intended to limit the present invention.

[0037] In this embodiment, the USB Key verification code is inserted in the process of converting the intermediate code into assembly code to achieve the purpose of making the compiled object code protected by the USB Key, such as image 3 As shown, the specific implementation includes the following:

[0038] 301. Perform preprocessing on the source program. The preprocessing process mainly analyzes header files and precompiled statements included in the source program to obtain a preprocessed source program. The source program may be a source program written in a ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for compiling and a compiler, relates to the technical field of computers and solves the problem that the copyright of a compiled object program can not be protected securely in the prior art. The method for compiling comprises the following steps: confirming the insertion point of the authentication code of a safety device in the intermediate code of a source program; and inserting the authentication code of the safety device in the corresponding position of the inserting point in the object program during the process of converting the intermediate code of the source program into the assembly code to acquire the object program. The compiler module of the compiler comprises a confirming unit used for confirming the insertion point of the authentication code of the safety device in the intermediate code of the source program, and an inserting unit used for inserting the authentication code of the safety device in the corresponding position of the inserting point in the object program during the process of converting the intermediate code of the source program into the assembly code to acquire the object program. The embodiment of the invention is mainly applicable to computer programming, in particular to compiling of various advanced languages.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a compilation method and a compiler. Background technique [0002] The compilation process refers to the process of translating a source program written in a high-level language into a target program. The target program is written in a low-level language (assembly language or machine language) recognizable by a computer, and the functions of the translated target program are the same as those of the original The source program functions are the same. Finally, the computer obtains the processing result by executing the target program. [0003] The process of translating a source program into an object program is divided into five stages: lexical analysis, syntax analysis, semantic checking and intermediate code generation, code optimization, and object code generation. The lexical analysis and grammatical analysis are collectively referred to as source program analysis. If a g...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/45
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products