Operation method and device for obfuscated code
An operating method and operating device technology, applied in the field of code encryption, can solve the problems of low difficulty in code cracking and poor code security, and achieve the effect of code obfuscation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0063] In order to make the above objects, features and advantages of the present invention more comprehensible, the present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0064] refer to figure 1 , which shows a flow chart of the steps of an embodiment of an obfuscated code operating method according to the present invention, which may specifically include the following steps:
[0065] Step 101, calculating the calculation result of each value of the parameter in the preset calculation function and the known value in the preset calculation function;
[0066] Wherein, the preset operation function includes, but is not limited to, any one or a combination of addition operation function, multiplication operation function, and XOR operation function. Also, the addition function may be continuous addition, such as a+b+2. Similar to multiplication and XOR operation, it can also be a continuous operatio...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com