Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for protecting java source code

A technology of source code and byte code, applied in the field of software protection, can solve problems such as plagiarism of labor results, product tampering, failure to realize Java source code protection, etc., and achieve the effect of preventing decompilation operations and protecting source code logic

Active Publication Date: 2021-07-30
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the bytecode file is very self-describing and retains many symbols and compilation information, the Java source code is easily decompiled into a highly readable source code, resulting in the plagiarism of the developer's work or the tampering of the product.
In the existing technology, the protection of Java source code can be achieved by obfuscating variables, obfuscating function identification information, disrupting the code execution process or hiding key information, but third parties can still decompile and deobfuscate and other technologies to view the key information and logic in the code, which cannot achieve effective Java source code protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting java source code
  • Method and device for protecting java source code
  • Method and device for protecting java source code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0037] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms refer to the same or similar elements. The implementations described in the following exemplary embodiments do not represent all implementations consistent with ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application provides a method and device for protecting Java source codes. The method includes: using a target encryption algorithm to encrypt a bytecode file to obtain an encrypted bytecode; encrypting the encrypted bytecode and the target encryption algorithm The association information generates a distributable file, wherein the file structure of the distributable file differs from the file structure of the bytecode file. The technical solution of the present application can obtain the encrypted bytecode by encrypting the compiled bytecode file, and then generate the associated information of the encrypted bytecode and the encryption algorithm into a releasable file with a custom file structure for publishing, The releasable file of the custom file structure can prevent decompilation operation, and protect the source code logic and key information of the Java source code therein.

Description

technical field [0001] The present application relates to the technical field of software protection, in particular to a Java source code protection method and device. Background technique [0002] The Java source code is compiled to generate a bytecode file (file with the suffix .class), and the generated bytecode file is interpreted and executed in the Java virtual machine. [0003] Since the bytecode file is very self-describing and retains many symbols and compilation information, the Java source code is easily decompiled into a highly readable source code, resulting in the plagiarism of the developer's work or the tampering of the product. . In the existing technology, the protection of Java source code can be achieved by obfuscating variables, obfuscating function identification information, disrupting the code execution process or hiding key information, but third parties can still decompile and deobfuscate and other technologies to view the key information and logi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 李瑜
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products