Method for preventing H5 source code from being leaked, computer equipment and storage medium

A computer program and source code technology, applied in the computer field, can solve problems such as source code logic exposure, object attribute API call exposure, and easy discovery

Active Publication Date: 2019-06-21
北京智游网安科技有限公司
View PDF10 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to address the above technical problems and provide a method, computer equipment, and storage media to prevent H5 source code leakage, so as to solve the p

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing H5 source code from being leaked, computer equipment and storage medium
  • Method for preventing H5 source code from being leaked, computer equipment and storage medium
  • Method for preventing H5 source code from being leaked, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0047] A method for preventing H5 source code leakage provided in this application can be applied to a terminal. Wherein, the terminal can be, but not limited to, various personal computers, notebook computers, mobile phones, tablet computers, vehicle-mounted computers and portable wearable devices. The terminal of the present invention adopts a multi-core processor. Wherein, the processor of the terminal may be at least one of a central processing unit (Central Processing Unit, CPU), a graphics processing unit (Graphics Processing Unit, GPU), a video processing unit (Video Processing U...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing H5 source code leakage, computer equipment and a storage medium, and the method comprises the steps: initializing a template object, defining a global function, and returning a global object in the global function; carrying out lexical analysis and grammatical analysis on the source code, and carrying out encryption processing on a function, a character string, an expression and a constant in the source code; carrying out encasing encryption on the encrypted source code, and generating a decryption function; enabling the decryption function to decrypt the encased code; decryption of encrypted code, loading the decryption object and executing the encryption code; dynamically decrypting the decrypted object into a plaintext password; executingplaintext passwords wherein the encrypted code is complex in structure; carrying out randomization through randomization of a global object name and control flow; wherein different encrypted files exist in each time of encryption and are in a polymorphic form, carrying out dynamic decryption through a template object in the running process. The problem that a decryption secret key is easily discovered when being embedded into a source code is solved, meanwhile, an anti-debugging technology is added in a special environment, a domain name binding technology is added through a template, and an H5 source code is effectively protected.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method for preventing H5 source code leakage, computer equipment and a storage medium. Background technique [0002] In web applications and mobile h5 applications, because the JavaScript parser directly parses the JavaScript source code, the JavaScript code on the web and mobile terminals is displayed in the form of source code, the source code of the program is leaked, and the core business logic is exposed, which brings great problems to the program Potential safety hazards, the source code is stolen, making developers unable to effectively protect their intellectual property rights from being abused. In order to protect the core software functions, program security and intellectual property rights, a protection technology is needed to prevent the H5 source code from leaking. [0003] Although there are some H5 compression and obfuscation technologies on the market, the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/56G06F21/60
Inventor 冉辽廖兴龙
Owner 北京智游网安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products