Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Encryption method and device, computer equipment and storage medium

An encryption method and loader technology, applied in the transmission system, electrical components, program/content distribution protection, etc., can solve the copyright protection of Java application software, the weak ability to prevent piracy and cracking, increase the difficulty of reading comprehension, and the obscure Java source code Incomprehensible problems, to achieve the effect of increasing the difficulty of cracking, reducing the risk of leakage, and improving security

Active Publication Date: 2020-02-21
望海康信(北京)科技股份公司
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Java bytecode is very easy to be analyzed by various decompilation tools and decompiled and restored to Java source code, which leads to the extremely weak ability of various Java application software in terms of copyright protection and prevention of piracy and cracking.
Although a Java obfuscator appeared later that can scramble and confuse the Java bytecode, so that the Java source code generated by the decompilation tool after the decompilation and restoration operation is obscure and difficult to understand, it still cannot fundamentally Prevent reverse engineering of Java bytecode by decompilation tools

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device, computer equipment and storage medium
  • Encryption method and device, computer equipment and storage medium
  • Encryption method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] In order to enable those skilled in the art to better understand the solutions of the present invention, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention.

[0067] In some processes described in the specification and claims of the present invention and the above-mentioned drawings, a plurality of operations appearing in a specific order are contained, but it should be clearly understood that these operations may not be performed in the order in which they appear herein Execution or parallel execution, the serial numbers of the operations, such as 101, 102, etc., are only used to distinguish different operations, and the serial numbers themselves do not represent any execution order. Additionally, these processes can include more or fewer operations, and these operations can be performed sequentially or in parallel. It should be n...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an encryption method and device, computer equipment and a storage medium, and the method comprises the following steps: obtaining environment parameters of atarget application program, wherein the environment parameters comprise a compiling language of the target application program; searching an encryption language of a target private key of the target application program according to the compiling language of the target application program; and configuring decryption logic of a loader of the target application program according to the encryption language, the decryption logic being used for decapsulating a target private key encapsulated by the encryption language, so that the private key can run in a running environment of the target application program. According to the method, the target private key is compiled by using the encryption language, so that the target private key cannot be obtained by using normal logic for cracking the application program, the decryption logic of the loader is configured according to the encryption language, and the application program can be smoothly decrypted and loaded only by using the specified loader and the corresponding secret key.

Description

technical field [0001] The present invention relates to the field of computer application technology, in particular to an encryption method, device, computer equipment and storage medium. Background technique [0002] Due to its high portability, JAVA applications are widely used in smart mobile terminals, PC terminals, web sites, etc. in our lives. At present, a large number of enterprise-level application software and Internet application software are written in Java. In order to achieve this high portability, the JAVA application program sacrifices the thoroughness of its own compilation, and the resulting security risk is that the JAVA application program is easy to be reverse-compiled, resulting in leakage of user data, program data and program source code. . [0003] Since Java runs through a virtual machine, all application software source code written in Java will not generate binary native machine code after being compiled by a Java compiler, but will generate Java...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14H04L29/06
CPCG06F21/14H04L63/0442H04L2463/101
Inventor 史先澳
Owner 望海康信(北京)科技股份公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products