Device and method for protecting source code

A source code, code technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as complex processes

Inactive Publication Date: 2010-05-12
LOONGSON TECH CORP
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that the code needs to be restored in the process of processing, and the pro...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device and method for protecting source code
  • Device and method for protecting source code
  • Device and method for protecting source code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described in detail below in conjunction with the accompanying drawings, so that those skilled in the art can implement it with reference to the description.

[0022] The source code protection device of the present invention, such as figure 1 shown, including:

[0023] Keyword information storage unit, non-replaceable identifier information storage unit, identifier replacement information storage unit, identifier selection unit, and identifier replacement unit.

[0024] Wherein, the keyword information storage unit is used for storing preset keyword information in the source code, generally speaking, the keyword in the source code is not allowed to be replaced.

[0025] The non-replaceable identifier information storage unit is used for storing non-replaceable identifier information in the preset source code. Generally speaking, the identifiers corresponding to the preset non-replaceable identifier information cannot be replaced....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device and a method for protecting a source code. The device comprises a keyword information storage unit, an irreplaceable identifier information storage unit, an identifier replacing information storage unit, an identifier selecting unit, and an identifier replacing unit. The method comprises the following steps: prestoring keyword information, irreplaceable identifier information, and identifier information before and after an identifier is replaced, and executing the following steps: selecting the corresponding identifier in the source code according to a preset rule; comparing the selected identifier with the keyword information and the irreplaceable identifier information; and replacing the identifier different from the keyword information and the irreplaceable identifier information according to the identifier information before and after the identifier is replaced. In the invention, the identifier obtained after replacing the specific identifier in the source code contains no meaning or information. Therefore, the source code of which the identifier is replaced is protected well.

Description

technical field [0001] The invention relates to a computer program protection device and method, in particular to a source code protection device and method. Background technique [0002] Source code means uncompiled text code. is a series of human-readable computer language instructions. In modern programming languages, the source code may appear in the form of a book or tape, but the most common format is a text file. The purpose of this typical format is to compile a computer program. The ultimate goal of computer source code is to translate human-readable text into binary instructions that a computer can execute. [0003] The main functions of the source code are as follows: generating object code, that is, a code that can be recognized by a computer; and, explaining the software, that is, explaining the writing of the software. [0004] Software developers who support the concept of open source believe that by allowing interested parties to modify the source code, ap...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F21/12
Inventor 李祖松许彤杨耀武
Owner LOONGSON TECH CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products