Security method for enhancing Java distribution software based on JavaAgent and dll

A security and software technology, used in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as weak customizability, inability to decrypt files that can be divided into different ways, etc. effect of difficulty

Inactive Publication Date: 2018-11-27
FOCUS TECH
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The customizability is not strong, and the unified loadclass loading cannot achieve the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security method for enhancing Java distribution software based on JavaAgent and dll

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the technical scheme, technical purpose and technical effect of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments.

[0017] 1. Complete the development of the application according to the normal process, and package it into a jar package or war package to be released.

[0018] Execute the C language encryption program, and pass the packaged jar package or war package path. The encryption program will encrypt the corresponding jar package / war package. Generate encrypted jar package / war package. The encrypted jar package / war package cannot be run directly through java commands or containers, and cannot be decompiled. An encryption program written in C language, which encrypts the jar package to be released;

[0019] 2. Add JavaAgent-related commands in the startup script of the application to decrypt before loading the jvm.

[0020] Modify the application startup scr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Provided is a security method for enhancing Java distribution software based on JavaAgent and dll. The security method comprises the following steps that step 1, an encryption program programmed withC language and jar package offline c language encryption program only needing to be released perform encryption operation; and a to-be-encrypted package jar path is transmitted to the encryption program; step 2, the encrypted jar package adds the JavaAgent into a startup script of an application, and after decryption, the JavaAgent is loaded by a Classloader and then operates. Related commands ofthe JavaAgent are used for carrying out decryption work before a jvm is loaded; the JavaAgent is a program performing intercept and modification on byte codes before Java loads a class file, and is connected to an executable file of a jar package address for decryption in a shared function library through a dll dynamic link library.

Description

technical field [0001] The invention belongs to the field of software security, and specifically relates to a method and a tool for enhancing Java distribution software security based on JavaAgent (a mechanism provided by Java that can intercept and modify bytecodes before loading class files) and dll. Background technique [0002] With the help of bytecode technology, Java can easily achieve cross-platform, so it has been widely used. However, its main application area is enterprise-level development, and it has not made much progress in the desktop application area. One of the reasons is that its bytecode technology is easy to be cracked, so that the developed code is easy to be decompiled, thus being pirated and infringing the intellectual property rights of application developers. [0003] The existing patent CN101814124A is also a method to solve the above problems. CN101814124A is a Java-based method for strengthening software security. The code protection method is u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51G06F21/12
CPCG06F21/12G06F21/51G06F2221/2107
Inventor 张勇何学勇
Owner FOCUS TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products