Script protection method, apparatus, computer-readable storage medium and computer device
A script and protected technology, applied in the field of information security, can solve problems such as the inability to effectively protect scripts, and achieve the effects of improving anti-tampering capabilities, increasing difficulty, and increasing complexity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0061] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.
[0062] figure 1 It is an application environment diagram of a script protection method in one embodiment.
[0063] refer to figure 1 , the script protection method is applied to the script processing system. The script processing system includes a server 110 and a terminal 120 . The terminal 120 and the server 110 are connected through a network. The terminal 120 may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The server 11...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


