File protection method based on block chain and terminal equipment

A terminal device and blockchain technology, applied in the computer field, can solve problems such as leakage and low data security, and achieve the effects of increasing security, improving security, increasing complexity and difficulty

Active Publication Date: 2018-11-02
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF8 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the embodiment of the present invention provides a blockchain-based file protection method and terminal equipment to solve the problem of low data security in the prior art due to the decompilation of the executable file of the application program and the leak of the source code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File protection method based on block chain and terminal equipment
  • File protection method based on block chain and terminal equipment
  • File protection method based on block chain and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] see figure 1 , figure 1 It is an implementation flowchart of a blockchain-based file protection method provided by an embodiment of the present invention. In this embodiment, the execution subject of the blockchain-based file protection method is a terminal device, which includes but is not limited to mobile terminals such as smart phones, tablet computers, and notebook computers, and may also include desktop computers. The blockchain-based file protection method shown in the figure includes the following steps:

[0027] S101: Obtain the type information of the first file that needs to be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the field of computer technology and provides a file protection method based on a block chain and terminal equipment. The method comprises the steps that type information of a first file needing to be protected is acquired; the type information is used for identifying a program design language adopted by a source file corresponding to the first file; protection information of the first file is determined according to the type information; the protection information is used for preventing decompilation; the protection information is configured to the first file according to a preset configuration strategy to obtain a second file; and execution logic of the second file is the same as execution logic of the first file. According to the method, the protection information is configured for the first file of a data interaction port used for setting up the block chain, content in the first file is confused through the configured protection information, therefore, the data security of the first file can be improved, and the security of user information or user properties in an application corresponding to the first file is improved.

Description

technical field [0001] The invention belongs to the field of computer technology, and in particular relates to a block chain-based file protection method and terminal equipment. Background technique [0002] With the development of the mobile Internet, applications providing various services emerge as the times require. Users can download and install applications on terminals, and use the applications (Application, App) to enjoy corresponding services. For example, blockchain apps, taxi apps, financial apps, etc. [0003] However, after the application is installed on the terminal, it is easy to be attacked by hackers or criminals through decompilation tools to obtain the executable file in the installation package of the application, and decompile the executable file to obtain the source code of the feasible file , Steal the algorithm contained in the source code or tamper with the source code, etc., which will lead to the theft of user information or user property of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14G06F21/62
CPCG06F21/14G06F21/6209
Inventor 谢丹力张宇陆陈一帆
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products