Supercharge Your Innovation With Domain-Expert AI Agents!

Java program execution method and device

A program execution and program technology, applied in the field of Java program execution methods and devices, can solve problems such as inability to effectively protect Java programs, and achieve the effect of preventing decompilation and theft

Active Publication Date: 2019-02-12
BEIJING SENSESHIELD TECH
View PDF16 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, when a Java program is executed, the Java execution environment automatically decrypts the encrypted Java program, exposing the plaintext of the Java program, which is easy to be accessed and stolen by malicious programs, and cannot effectively protect the Java program.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Java program execution method and device
  • Java program execution method and device
  • Java program execution method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] figure 1 It is a flowchart of a method for executing a Java program provided in Embodiment 1 of the present invention. This embodiment is applicable to the Java platform, and the method can be executed by a Java program execution device, which can be composed of hardware and / or software. Such as figure 1 As shown, it specifically includes the following steps:

[0021] S110. The first process starts the Java execution environment as a child process.

[0022] Optionally, before the first process starts the Java execution environment as a child process, it further includes: injecting the first process, the Java execution environment and a security verification module. The embodiment of the present invention does not modify the Java execution environment.

[0023] After the first process is started, the Java execution environment is started as a child process.

[0024] S120. The first process loads the security verification module in the Java execution environment.

[...

Embodiment 2

[0035] figure 2 It is a flow chart of a Java program execution method provided by Embodiment 2 of the present invention. On the basis of the optional implementation modes of the above-mentioned embodiments, this embodiment will "verify the intercepted Java program through the security verification module as a valid Trusted program" is optimized to "determine that the Java program to be processed is a trusted program when the security verification module verifies that the Java program to be processed is an encrypted program of a trusted party or is a program in the white list". Such as figure 2 As shown, it specifically includes the following steps:

[0036] S210. The first process starts the Java execution environment as a child process.

[0037] S220. The first process loads the security verification module in the Java execution environment.

[0038] S230. Intercept the Java program to be processed in the Java execution environment through the security verification modul...

Embodiment 3

[0052] image 3 It is a flow chart of a Java program execution method provided by Embodiment 3 of the present invention, which is further optimized on the basis of each optional implementation mode of the above-mentioned embodiments, and specifically "verifies and intercepts the Java program to be processed through the security verification module as Trusted program is "optimized to" through the security verification module to determine whether the Java program to be processed is an encryption program of a trusted party, and if the Java program to be processed is an encryption program of an untrusted party, verify whether the Java program to be processed is a whitelist program in the program; if it is verified that the Java program to be processed is a program in the whitelist, it is determined that the Java program to be processed is a trusted program". Such as image 3 As shown, it specifically includes the following steps:

[0053] S310. The first process starts the Java ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a Java program execution method and device. The method comprises the following steps that a first process starts a Java execution environment as a child process; the first process loads a security authentication module in the Java execution environment; the security verification module intercepts the Java program to be processed of the Java execution environment, and executes the Java program to be processed after verifying the intercepted Java program to be processed is a trusted program. The method provided by the embodiment of the invention can prohibit the execution of the untrusted program, thereby effectively preventing the Java program from being decompiled and stolen.

Description

technical field [0001] The embodiment of the present invention relates to the field of software security, in particular to a Java program execution method and device. Background technique [0002] Computer software reverse engineering (Reverse engineering), also known as decompilation, refers to the work of "reverse analysis and research" on the target program (such as executable program) of other people's software to deduce the ideas used by other people's software products , principles, structures, algorithms, processing procedures, operating methods and other design elements, the source code may be deduced in some specific cases. Once the program is decompiled, it will bring serious losses to the owner of the program copyright. [0003] Theoretically, executable programs of various systems may be decompiled, especially for the Java platform, because Java programs are decompilable, they are easier to be copied and decompiled, thus losing the copyright of the original prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52
CPCG06F21/52
Inventor 孙吉平荣国枫
Owner BEIJING SENSESHIELD TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More