Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for encrypting and decrypting java source code

An encryption device and source code technology, applied in the network field, can solve the problem that Java language is easy to be decompiled, etc.

Inactive Publication Date: 2015-11-25
ALIBABA GRP HLDG LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] This application provides a method and device for encrypting and decrypting Java source code. The method and device provided by this application solve the problem that the Java language is easily decompiled in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for encrypting and decrypting java source code
  • Method and device for encrypting and decrypting java source code
  • Method and device for encrypting and decrypting java source code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The embodiment of the present application provides a method for encrypting Java source code, the method comprising: performing logic extraction on the program source code to obtain the function call logic in the source code and the Java code that has extracted the function call logic; Insert a randomly named first function at the original calling position of the logic, and encrypt the corresponding relationship between the first function and the function calling logic to generate an authorization file; extract the Java code with the function calling logic and the corresponding The Java class loader sends it to the user terminal, so that the user terminal obtains the authorization file by sending a request, then uses the Java class loader to decrypt the authorization file, and combines the decrypted function call logic with the extracted function call Logical Java code generates source code files.

[0036] Such as figure 1 As shown, the embodiment of the present applica...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for encrypting and decrypting a Java source code and a device for encrypting and decrypting the Java source code, which are applied to the field of a network technique. The method comprises the following steps ofcarrying out logic extracting processing on a program source code to obtain call information of each primary function in the source code and a Java code from which a function call logic is extracted; inserting a randomly-namedfirst function into a call position of each primary function in the program source code, and encrypting a corresponding relation between the first function and the call information of the primary function to generate an authorization document; and transmitting the Java code from which the function call logic is extracted and a corresponding Java loader to a user terminal so that the user terminal decrypts the authorization document and the Java code from which the function call logic is extracted to generate a source code document. Copyright protection and operation control over the existing code can be conveniently and effectively carried out by the method and the device provided by the invention.

Description

technical field [0001] The present application relates to the field of network technology, in particular to a method and device for encrypting and decrypting Java source codes. Background technique [0002] Decompiling (Decompiling) refers to the high-level language source program is compiled into an executable file. Decompilation is the reverse process, but usually the executable file cannot be turned into a high-level language source code, but can only be converted into an assembler. Computer software reverse engineering (Reverseengineering), also known as computer software restoration engineering, refers to deducing the ideas used by other people's software products through "reverse analysis and research" on the target program (executable program) of other people's software , principle, structure, algorithm, processing process, operation method and other design elements, as a reference when developing software by yourself, or directly used in your own software products. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12
Inventor 赵羽佳连博识
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products