Encrypted code operation method and device, storage medium and terminal

An operation method and code technology, which are applied in the fields of encrypted code operation method and device, terminal, and storage medium, and can solve the problems of original code theft, inability to protect core code, etc.

Inactive Publication Date: 2019-05-03
QI AN XIN SECURITY TECH ZHUHAI CO LTD +1
View PDF8 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides an encryption code operation method, device, storage medium, and terminal. The main purpose is that the existing code protection ca

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encrypted code operation method and device, storage medium and terminal
  • Encrypted code operation method and device, storage medium and terminal
  • Encrypted code operation method and device, storage medium and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided so that the present disclosure will be more thoroughly understood, and will fully convey the scope of the present disclosure to those skilled in the art.

[0058] For code protection, the decrypted original code can be obtained through reverse analysis, so that when the encrypted code needs to be run, it needs to be decoded to obtain the original code for operation, so that the decrypted original code can be obtained through reverse analysis. code, affecting the protection of the code, the embodiment of the present invention provides a method for running encrypted code, such as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an encrypted code operation method and device, a storage medium and a terminal, relates to the technical field of information security, and mainly aims to solve the problem that core codes needing to be protected cannot be strictly protected due to the fact that decrypted codes can be obtained through reverse analysis in existing code protection. The method mainly comprisesthe steps that a code conversion table is extracted, the byte codes are interpreted into executable character strings and instruction symbols through the code conversion table, codes corresponding tothe character strings and the instruction symbols are compiled and run through a virtual machine, and the byte codes corresponding to the different character strings and the instruction symbols are stored in the code conversion table. The invention is used for running for encrypted code.

Description

technical field [0001] The present invention relates to the technical field of information security, and in particular, to a method and device for operating an encrypted code, a storage medium and a terminal. Background technique [0002] Code refers to the source file written by the developer using the language supported by the development tool, and is the basic element on which various systems and applications depend. Therefore, for all companies, the code written by the developer can realize different functions. The contents are important trade secrets. [0003] At present, the existing code protection schemes are all based on the encryption of code compression protection, code conversion, encryption, deformation, segmentation, etc., and then decrypted and run. However, these protection methods can obtain the decrypted original code through reverse analysis. , so that the original code is stolen, and the core code that needs to be protected cannot be strictly protected, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14G06F21/60
Inventor 吕群王丹阳李燃欣齐浩然
Owner QI AN XIN SECURITY TECH ZHUHAI CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products