Unlock instant, AI-driven research and patent intelligence for your innovation.

A java-like encryption and decryption method and computer-readable storage medium

An encryption method and storage medium technology, which is applied in the field of computer program source code encryption and decryption, and can solve problems such as Java applications cannot be started normally, cannot be scanned, etc.

Active Publication Date: 2021-06-25
NETWORKBENCH SYST
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The encryption and decryption process implemented by this scheme is relatively safe, but this scheme causes many popular Java frameworks (such as Spring Framework, Hibernate, Apache Tomcat) to fail to scan these encrypted Classes during the startup phase, resulting in the failure of Java applications to start normally.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A java-like encryption and decryption method and computer-readable storage medium
  • A java-like encryption and decryption method and computer-readable storage medium
  • A java-like encryption and decryption method and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0030] In the following description, the use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating the description of the present application and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0031] In this article, bytecode is a virtual instruction format executed by the Java virtual machine, and the bytecode file is compiled from the Java source code.

[0032] JVMTI is a Native programming (C / C++) interface provided by the Java virtual machine, which can detect the internal state of the JVM and control the execution of the JVM application, and can achieve the purpose of enhancement by dynamically modifying the bytecode of the JVM runtime class. The functions that can be realized include but are not ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a Java-like encryption and decryption method and a computer-readable storage medium, wherein the Java-like encryption method uses a key to encrypt the first bytecode-like file to obtain the ciphertext of the first bytecode-like file, Generate a second bytecode class file with the same name as the first bytecode class file, write the ciphertext of the first bytecode class file into the second bytecode class file, and the second bytecode class file has the same name as the first bytecode class file A bytecode file has the same scanning characteristics, so that the bytecode tool scans the second bytecode file as the first bytecode file. In the decryption method, during the loading process of the class loader, the loading process is intercepted, and the decryption process is started, and the ciphertext of the first bytecode class file is obtained from the second bytecode class file, and decrypted using the key to obtain the second bytecode class file. A bytecode class file. Through this application, an encryption and decryption process that is completely transparent to Java applications and Java frameworks is realized.

Description

technical field [0001] This application relates to the field of computer program source code encryption and decryption, in particular to a Java-like encryption and decryption method and a computer-readable storage medium. Background technique [0002] Obfuscated code, also known as obfuscated code, is the behavior of converting the code of a computer program into a functionally equivalent but difficult to read and understand form. Code obfuscation can be used for program source code, or for intermediate code compiled from the program. Programs that perform code obfuscation are called code obfuscators. In related technologies, there are already many code obfuscators with different functions. [0003] Code obfuscation only sets the difficulty of human reading and understanding, and can still be decompiled into human-readable source code through decompilation tools, and many applications use the Spring framework or other Dependency Injection (DI for short) IOC (Inversion of C...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14H04L9/08
CPCG06F21/14H04L9/0825
Inventor 廖雄杰冯立强
Owner NETWORKBENCH SYST