Method for generating executable file, execution method and electronic equipment

A technology for executing files and electronic devices, applied in the computer field, can solve problems such as increasing development complexity and affecting user experience, and achieve the effects of reducing development complexity, reducing application costs, and ensuring code security

Active Publication Date: 2018-08-14
北京顶象技术有限公司
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] With the popularization of the Internet, the spread of applications is becoming more and more extensive. How to ensure the security of applications in the process of spreading, so that the applications are not easy to be tampered with and cracked, is a concern of the majority of application providers. Security protection is usually to encrypt the source code of the application, which needs to be carried out during the source code development process, which increases the development complexity. At the same time, when the user runs the executable file of the application, he must obtain the corresponding decryption algorithm to ensure The continuous operation of the application increases the user's application cost and affects the user experience. At the same time, the decryption algorithm is easily visible to the user, and there is a security risk of being cracked

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating executable file, execution method and electronic equipment
  • Method for generating executable file, execution method and electronic equipment
  • Method for generating executable file, execution method and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0067]

[0068] In this embodiment, a method for generating an executable file is provided, such as figure 2 As shown, it includes: steps S2100-S2200.

[0069] The executable file refers to a file that can be loaded and executed by the operating system. Executable files are presented differently under different operating system environments. Under the Windows operating system, the executable file can be a type of file such as .exe / .sys / .com.

[0070] Step S2100, compiling the acquired target source code to obtain a corresponding compiled file.

[0071] The target source code is code developed based on a certain programming language to provide corresponding application functions. Usually code development can be based on a certain programming platform. For example, the target source code can be code developed based on UCDA platform. CUDA (Compute Unified Device Architecture) is a computing platform launched by graphics card manufacturer NVIDIA. It adopts a general parallel...

no. 2 example

[0127]

[0128] In this embodiment, a method for running an executable file is provided, such as Figure 5 As shown, it includes: steps S3100-S3200.

[0129] Step S3100, obtaining the target executable file.

[0130] The target executable file is generated by the method for generating an executable file provided in the first embodiment, which will not be repeated here.

[0131] Step S3200, run the decryption module in the target executable file, implement the corresponding target decryption algorithm through the decryption module, and decrypt the part contained in the target executable file that is encrypted based on the target encryption algorithm corresponding to the target decryption algorithm content to get the decrypted target executable file and run it.

[0132] The target executable file contains identification information indicating part of the encrypted content, such as the function name, file name or specific storage location of the target source code correspondi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for generating an executable file, an execution method and a piece of electronic equipment. The generating method comprises the followings steps of: compiling the acquired target source code to obtain a corresponding compiled file; acquiring a decryption module implementing the target decryption algorithm, compiling the decrypted module and the compiled file together to obtain an intermediate executable file; and encrypting at least part of the content corresponding to the compiled file in the intermediate executable file based on the target encryption algorithm corresponding to the target decryption algorithm to generate a corresponding target executable file. According to the invention, the target source code can be cryptographically protected independently of the development process of the target source code, and the development complexity is reduced under the premise of ensuring code security. At the same time, the executable file decryption processis invisible to the user, thereby reducing the application cost of the user and avoiding the security risk of being cracked.

Description

technical field [0001] The present invention relates to the technical field of computers, and more specifically, to a method for generating an executable file, an execution method and an electronic device. Background technique [0002] Application programs developed based on computer languages ​​are usually in the form of executable files, run in corresponding operating systems, and provide users with corresponding application services. [0003] With the popularization of the Internet, the spread of applications is becoming more and more extensive. How to ensure the security of applications in the process of spreading, so that the applications are not easy to be tampered with and cracked, is a concern of the majority of application providers. Security protection is usually to encrypt the source code of the application, which needs to be carried out during the source code development process, which increases the development complexity. At the same time, when the user runs the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F8/41
CPCG06F8/41G06F21/125
Inventor 梁家辉
Owner 北京顶象技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products