Python program encryption protection system and method based on code virtualization

A protection system and virtualization technology, applied in the direction of program/content distribution protection, digital data protection, instruments, etc., can solve the problem of low security, achieve good compatibility, retain cross-platform, and reliable protection effect

Active Publication Date: 2020-03-27
施羊梦燊 +2
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The object of the present invention is to provide a Python program encryption protection system and method based on code virtualization, aiming to solve the problem of software written in the Python scripting language in the prior art. The problem of low security is to improve program security without any modification to the Python interpreter layer and without loading any third-party dll and so libraries.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Python program encryption protection system and method based on code virtualization
  • Python program encryption protection system and method based on code virtualization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to clearly illustrate the technical features of the present solution, the present invention will be described in detail below through specific implementation methods and in conjunction with the accompanying drawings. The following disclosure provides many different embodiments or examples for implementing different structures of the present invention. To simplify the disclosure of the present invention, components and arrangements of specific examples are described below. Furthermore, the present invention may repeat reference numerals and / or letters in different instances. This repetition is for the purpose of simplicity and clarity and does not in itself indicate a relationship between the various embodiments and / or arrangements discussed. It should be noted that components illustrated in the figures are not necessarily drawn to scale. Descriptions of well-known components and processing techniques and processes are omitted herein to avoid unnecessarily lim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a Python program encryption protection system and method based on code virtualization. According to the invention, a pyc analysis module, a code object disassembling module, anencryption virtual machine generation module, a code object post-processing module, a code object generation module and a pyc generation module are arranged; on the premise that a Python interpreter layer is not modified and any third-party dll and so library is not loaded, Python codes are protected as high as possible, an original pyc file structure is damaged, so that a universal decompilationtool cannot be applied to an encrypted pyc file in architecture, the program safety is improved, and software written in Python script language is tamper-proof and counterfeit-proof.

Description

technical field [0001] The invention relates to the technical field of software program encryption, in particular to a code virtualization-based Python program encryption protection system and method. Background technique [0002] At present, the private or public commercial Python code protection schemes used in the market can be roughly divided into the following types: [0003] 1. Obfuscate the variable name and function name of the Python source code, or use the exec statement to execute after encryption. This method does not change the source code flow and structure itself, because of the particularity of the Python scripting language, the obfuscated code still exists in plain text and can be viewed directly. Although the Python script after losing the identifier name is more difficult to read, it is still easy to find out the algorithm at the key position, and directly modify the relevant code, without substantial protection. For the method of encrypting the Python s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/14G06F21/60
CPCG06F21/125G06F21/14G06F21/602Y02D10/00
Inventor 施羊梦燊费奕铭鞠方舟
Owner 施羊梦燊
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products