Bytecode encryption method, bytecode decryption method and terminal

A technology of bytecode and decryption algorithm, applied in the computer field, can solve the problems of ineffective protection of bytecode files, easy to be cracked, and inability to effectively protect source code, etc.

Active Publication Date: 2019-05-21
厦门熵基科技有限公司
View PDF6 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, an embodiment of the present invention provides a bytecode encryption method, a bytecode decryption method, and a terminal to solve the problem of encrypting bytecodes by traditional encryption methods in existing technologies, resulting in The file is easy to be cracked, and the bytecode file cannot be effectively protected, so the source code cannot be effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bytecode encryption method, bytecode decryption method and terminal
  • Bytecode encryption method, bytecode decryption method and terminal
  • Bytecode encryption method, bytecode decryption method and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0059] See figure 1 , figure 1 It is a schematic flowchart of a bytecode encryption method provided by an embodiment of the present invention. In this embodiment, the execution subject of the bytecode encryption method is a terminal, and the terminal includes but is not limited to mobile terminals such as smart phones, tablet computers, and personal digital assistants (Personal Digital Assistant, PDA), and may also include terminals such as desktop computers. Such as figure 1 The methods shown for bytecode encryption may include:

[0060] S101: When it is detected that an encrypted plug-in pack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is applicable to the technical field of computers, and provides a byte code encryption method, a byte code decryption method and a terminal, and the method comprises the steps: configuring a path of a target Java packet to which a to-be-encrypted target byte code belongs in a POM (Project Object Model) based on a preset attribute when detecting that an encrypted plug-in packet existsin the POM; Obtaining a target Java packet, and packaging the target Java packet to generate a jar packet; Determining an encryption environment corresponding to the target byte code according to thepacket information of the jar packet; Calling a dynamic library through the Java class library, and setting a preset parameter corresponding to the encryption environment for the target byte code; And encrypting the set target byte code by adopting an encryption algorithm corresponding to the preset parameter to generate an encrypted jar package. According to the scheme, different encryption algorithms are adopted to encrypt the byte codes in different encryption environments, the byte codes are not prone to being cracked by agents, the byte code files are effectively protected, decompilationis prevented, and therefore source codes are effectively protected.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a bytecode encryption method, a bytecode decryption method and a terminal. Background technique [0002] The Java source code is compiled to generate a bytecode file (a file with a suffix of .class), and the generated bytecode file is interpreted and run in the Java virtual machine. [0003] Since the bytecode file is very self-describing and retains a lot of symbols and compilation information, the bytecode file is easily decompiled into a highly readable source code, resulting in the plagiarism of the developer's labor results or the product being destroyed. tamper. In the prior art, the bytecode file is usually encrypted by obfuscating variables or disrupting the code execution process, but such an encryption method is easy to be cracked by the agent, and cannot effectively protect the bytecode file and the source code. code. Contents of the invention [000...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
Inventor 毕李宁
Owner 厦门熵基科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products