Code encryption and decryption methods and devices, computer device and storage medium

A code encryption and encryption key technology, applied in decryption methods, devices, computer equipment and storage media, in the field of code encryption, can solve the problems of low code security, easy to be disassembled, illegal reading or tampering, etc.

Inactive Publication Date: 2018-08-10
PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
View PDF11 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of information technology, there are more and more applications, and more and more codes are generated. At present, the codes of many applications are written in high-level abstract languages ​​such as java, which are easily disassembled and thus illegally read or read. Tampering, low code security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code encryption and decryption methods and devices, computer device and storage medium
  • Code encryption and decryption methods and devices, computer device and storage medium
  • Code encryption and decryption methods and devices, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0026] The code encryption method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. The application program is installed on the terminal 102, and the core code in the application can be separated into an independent plug-in file by using plug-in technology and stored in the server 104. When the application program is running on the terminal 102, if the target plug-in needs to be run, the terminal 102 sends a plug-in acquisition request to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to code encryption and decryption methods and devices, a computer device and a storage medium. The code encryption method comprises the steps of acquiring a to-be-encrypted target code, and acquiring an encryption key sequence for encrypting the target code, wherein the encryption key sequence comprises multiple encryption keys; acquiring a current to-be-encrypted byte from the target code according to a byte sequence of the target code, and acquiring a current encryption key from the encryption key sequence according to the key sequence of the encryption key sequence; encrypting the current to-be-encrypted byte according to the current encryption key, so as to obtain a corresponding current byte ciphertext; returning to the step of acquiring the current to-be-encrypted byte from the target code according to the byte sequence of the target code and acquiring the current encryption key from the encryption key sequence according to the key sequence of the encryptionkey sequence till all to-be-encrypted bytes of the target code are encrypted; and combining all obtained byte ciphertexts, so as to obtain a code ciphertext corresponding to the target code. The method can improve the code security.

Description

technical field [0001] The present application relates to the technical field of encryption, in particular to a code encryption and decryption method, device, computer equipment and storage medium. Background technique [0002] With the development of information technology, there are more and more applications, and more and more codes are generated. At present, the codes of many applications are written in high-level abstract languages ​​such as java, which are easily disassembled and thus illegally read or read. Tampering, low code security. Contents of the invention [0003] Based on this, it is necessary to provide a code encryption and decryption method, device, computer equipment, and storage medium for the above technical problems, which can combine the byte order of the target code byte and the encryption key sequence including multiple encryption keys. The key sequence encrypts the target code, and the code is encrypted in units of bytes. Therefore, it is difficu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/14H04L9/06H04L29/06H04L29/08G06F21/12
CPCH04L9/0643H04L9/14H04L63/0428H04L67/34G06F21/125
Inventor 林晓然彭东远
Owner PINGAN PUHUI ENTERPRISE MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products