Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for protecting Java source code

A source code and bytecode technology, applied in the field of software protection, can solve the problems of plagiarism of labor results, inability to achieve Java source code protection, product tampering, etc., and achieve the effect of preventing decompilation operations.

Active Publication Date: 2018-10-16
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the bytecode file is very self-describing and retains many symbols and compilation information, the Java source code is easily decompiled into a highly readable source code, resulting in the plagiarism of the developer's work or the tampering of the product.
In the existing technology, the protection of Java source code can be achieved by obfuscating variables, obfuscating function identification information, disrupting the code execution process or hiding key information, but third parties can still decompile and deobfuscate and other technologies to view the key information and logic in the code, which cannot achieve effective Java source code protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting Java source code
  • Method and device for protecting Java source code
  • Method and device for protecting Java source code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The exemplary embodiments will be described in detail here, and examples thereof are shown in the accompanying drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with the present application. On the contrary, they are only examples of devices and methods consistent with some aspects of the application as detailed in the appended claims.

[0037] The terms used in this application are only for the purpose of describing specific embodiments and are not intended to limit the application. The singular forms used in this application and the appended claims indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method and a device for protecting Java source codes. The method includes the following steps: obtaining an encrypted bytecode by encrypting a bytecode file using a target encryption algorithm; generating a publishable file through the encryption association information of the encrypted bytecode and the target encryption algorithm, wherein the file structure of the publishable file is different from the file structure of the bytecode file. According to the method and device for protecting Java source code, the compiled bytecode file can be encrypted to obtain an encrypted byte code, and then the association information of the encrypted bytecode and the encryption algorithm are generated to generate a publishable file for the published, customized file structure.The publishable file of the custom file structure can prevent compiling operations and protect the source code logic and key information of the Java source code therein.

Description

Technical field [0001] This application relates to the technical field of software protection, and in particular to a method and device for protecting Java source code. Background technique [0002] The Java source code is compiled to generate a bytecode file (file with a .class suffix), and the generated bytecode file is interpreted and executed in the Java virtual machine. [0003] Due to the strong self-descriptive nature of bytecode files, many symbols and compilation information are preserved, the Java source code can easily be decompiled into highly readable source code, leading to the plagiarism of the developer’s labor results or the tampering of the product . In the prior art, the protection of Java source code can be achieved by obfuscating variables, obfuscating function identification information, disrupting the code execution process or hiding key information, etc., but third parties can still decompile and deobfuscate Other technologies to view the key information a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 李瑜
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More