Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Compile method

A compilation method and grammatical analysis technology, applied in the fields of instruments, electronic digital data processing, platform integrity maintenance, etc., can solve the problems of complicated copyright protection methods and the target program cannot be well protected by copyright, so as to reduce the complexity and difficulty. Effect

Active Publication Date: 2011-12-28
FEITIAN TECHNOLOGIES
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In realizing the above-mentioned compiling process, the inventors have found that at least the following problems exist in the prior art: after the target program is compiled from the source program, any computer with machine language processing capability can execute the target program, so that the compiled target program Better copyright protection cannot be obtained; and the existing copyright protection method is also particularly complicated, requiring the user to manually add the code for verifying the smart key device to the source program, and also requires the user to learn how to use the smart key device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Compile method
  • Compile method
  • Compile method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] In order to simplify and reduce the complexity and difficulty of copyright protection, the embodiment of the present invention provides a compiling method, such as figure 1 As shown, the method includes:

[0027] 101. Perform preprocessing on the source program code, and perform lexical analysis and syntax analysis on the preprocessed source program code; determine the insertion point of the verification code in the source program code according to preset rules.

[0028] Wherein, the verification code can be a code for verifying the smart key device, and the verification code can also be a function call, and the function completes the function of verifying the smart key device, and the function can be implemented in a compiled library, or, the function is placed in the source program code in the form of source code;

[0029] The method for determining the insertion point of the verification code in the source program code is to determine the insertion point of the veri...

Embodiment 2

[0037] In order to introduce the technical solution adopted by the present invention more clearly, below in conjunction with the compiling process under the situation that adopts USB Key as the intelligent key device, further describe the present invention in detail, but, the present invention can also include other intelligent key devices Examples, this example is not intended to limit the present invention.

[0038] In this embodiment, the verification code is inserted into the corresponding position of the insertion point in the source program code to achieve the purpose of making the compiled target program code protected by the USB Key, such as image 3 As shown, the specific implementation includes the following:

[0039]301. In the process of compiling, it is first necessary to preprocess the source program code. The preprocessing process mainly analyzes the header files and precompiled statements contained in the source program code to obtain the preprocessed source pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a compiling method and a compiler, relating to the field of computer technology and solving the problem of the prior art that the compiled target program copy right can not be safeguarded. The compiling method comprises: determining an insertion point of an identifying code in a source program code according to the preset rule; inserting the identifying code into the correspondent position of the insertion point in the source program code; and converting the source program code inserted with the intelligent key device identifying code into a target program code. The embodiment of the invention is mainly used in the computer programming, in particular in compiling various high level languages.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a compilation method and a compiler. Background technique [0002] The smart key device is a small hardware device with a processor and memory, which is connected to the host computer through the data communication interface of the computer. It has functions such as key generation, safe storage of keys, and preset encryption algorithms. The operation related to the key of the smart key device is completely run inside the device, and it has the characteristics of anti-attack, and the security is extremely high. Smart key device manufacturers, software system developers or end users can store some important information in the smart key device to ensure information security or prevent forgetting. [0003] At present, higher-end smart key devices are programmable, that is, program codes stored in advance can be run in the smart key device. The smart key device compiles the progr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/22G06F9/44G06F21/52
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products