Unlock instant, AI-driven research and patent intelligence for your innovation.

Script protection method, apparatus, computer-readable storage medium and computer device

A script and protected technology, applied in the field of information security, can solve problems such as the inability to effectively protect scripts, and achieve the effects of improving anti-tampering capabilities, increasing difficulty, and increasing complexity

Active Publication Date: 2022-07-22
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a script protection method, device, computer-readable storage medium and computer equipment for the technical problem that the script cannot be effectively protected

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Script protection method, apparatus, computer-readable storage medium and computer device
  • Script protection method, apparatus, computer-readable storage medium and computer device
  • Script protection method, apparatus, computer-readable storage medium and computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] In order to make the purpose, technical solutions and advantages of the present application more clearly understood, the present application will be described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.

[0062] figure 1 It is an application environment diagram of a script protection method in one embodiment.

[0063] refer to figure 1 , the script protection method is applied to the script processing system. The script processing system includes a server 110 and a terminal 120 . The terminal 120 and the server 110 are connected through a network. The terminal 120 may specifically be a desktop terminal or a mobile terminal, and the mobile terminal may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The server 11...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a script protection method, apparatus, computer-readable storage medium, and computer equipment. The method includes: acquiring an original script, and determining a process control node in the original script; The process control node in the original script performs code obfuscation to obtain a process obfuscation node; a protected script is generated; the protected script includes the process obfuscation node. The solution provided by the present application can improve the anti-tampering ability and anti-analysis ability of the script while ensuring that the control logic of each process control node in the script does not change, and protect the script more effectively.

Description

technical field [0001] The present application relates to the technical field of information security, and in particular, to a script protection method, apparatus, computer-readable storage medium, and computer equipment. Background technique [0002] At present, software developers mainly rely on code obfuscation technology to protect software products, especially for JavaScript (a scripting language) that can be decompiled, it is even more necessary to protect software products through effective code obfuscation technology. [0003] The main purpose of code obfuscation technology is to make the code difficult to read, increase the cost of code reading and the difficulty of tampering, and at the same time, it can also increase the difficulty of reverse code analysis to prevent software from being tampered with and illegally decompiled. [0004] In the more mainstream code obfuscation technology, it mainly replaces the code content in the script with simple content or insert...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14G06F21/12
CPCG06F21/14G06F21/125
Inventor 马昊玉刘忠正胡育辉李文豪杨超
Owner TENCENT TECH (SHENZHEN) CO LTD