Virtualization protection method of Jar file, terminal and storage medium

A jar file and file technology, applied in the direction of digital data protection, program/content distribution protection, instruments, etc., to achieve the effect of preventing location analysis, high-strength code protection, and high security

Pending Publication Date: 2020-12-08
北京智游网安科技有限公司
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of the present invention is to provide a Jar file virtualization protection method, termina

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Virtualization protection method of Jar file, terminal and storage medium
  • Virtualization protection method of Jar file, terminal and storage medium
  • Virtualization protection method of Jar file, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention more clear and definite, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0032] The virtualization protection method of the Jar file described in the preferred embodiment of the present invention, such as figure 1 and figure 2 As shown, the virtualization protection method of the Jar file comprises the following steps:

[0033] Step S10, decompressing the Jar file, reading the class binary bytecode file, parsing the class binary bytecode file, and extracting the binary instructions of each method.

[0034] Specifically, decompress and read the class binary bytecode file in the Jar file; extract code segment instructions corresponding to all methods in all ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a virtualization protection method of a Jar file, a terminal and a storage medium. The method comprises the following steps: decompressing the Jar file, reading a class binarybyte code file, analyzing the class binary byte code file, and extracting a binary instruction of each method; generating a random custom instruction rule replacement table, performing equivalent replacement on an operand and an operand in the binary instruction, and translating the binary instruction into an instruction which can only be identified by a custom virtual machine interpreter engine;and modifying a class byte code, emptying an encrypted method code, injecting an emptied method code into an entry method of the custom virtual machine and a custom virtual machine engine, and generating an encrypted Jar file. In the encryption process, the Jar package is input for reinforcement protection, the Jar package is still downloaded after reinforcement, and the calling and using modes ofthe Jar package are not changed, so that the encrypted code cannot be decompiled, and the security is higher.

Description

technical field [0001] The invention relates to the technical field of file encryption, in particular to a virtualization protection method for a Jar file, a terminal and a storage medium. Background technique [0002] In the software field, a Jar file (Java Archive, English: Java Archive) is a software package file format, usually used to aggregate a large number of Java class files, related metadata and resource (text, picture, etc.) files into one file, In order to develop Java platform application software or libraries. [0003] Encrypting the Jar file is actually encrypting the class Java bytecode compressed and stored in the Jar file. A common way is to use a code obfuscation tool to obfuscate the code (such as ProGuard, ProGuard is an open source project that obfuscates the code, its main function is to obfuscate the code). Obfuscation is a kind of encryption at the logical level. The obfuscated code can still be decompiled, but due to the equivalent replacement in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14G06F21/62
CPCG06F21/14G06F21/6209G06F2221/2107
Inventor 李鹏飞冉山川
Owner 北京智游网安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products