Client program disassembly prevention protection method

A client-side program, client-side technology, applied in the computer field

Pending Publication Date: 2020-12-25
XUJI GRP +3
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, the client becomes a springboard for network attackers to attack the server through the client. This attack is often effective and fatal.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Client program disassembly prevention protection method
  • Client program disassembly prevention protection method
  • Client program disassembly prevention protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in combination with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are exemplary only, and are not intended to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0036] The present invention will be further described below in conjunction with the charts.

[0037] In order to prevent network attackers from carrying out network attack damage by decompiling the client program, the present invention provides a client program protection method against disassembly, such as figure 2 shown, including the following steps:

[0038] Step S100, preprocessing the source code of the client p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a client program disassembly prevention protection method, which comprises the following steps of: preprocessing a source code of a client program, and packaging other contents except a basic data interaction service into a plurality of dynamic libraries; performing encryption processing on the plurality of dynamic libraries; storing the encrypted dynamic library in a server; and in the initial stage of communication between the client and the server, sending the dynamic library file of the client to the client subjected to credibility verification by the server . Through the above protection measures, the client program installed in the application terminal only has one lightweight executable program which does not involve any service logic, and the main logic function dynamic library of the client is stored in the server and is dynamically obtained during operation, so that decompilation by a network attacker is fundamentally avoided. The source code constantof the client and the compiled dynamic library are encrypted, so that the client cannot be decompiled again.

Description

technical field [0001] The invention relates to the technical field of computers, in particular to a client program anti-disassembly protection method. Background technique [0002] In the application of the C / S architecture, since the client program is deployed on the terminal machine of the user, all users can obtain the executable file and the dynamic link library of the client program. Static disassembly is the most common method for network attacks to understand and master the client, and the constants in the client program are the information that is most likely to be grasped by network attackers. Cyber ​​attackers usually start with static variable information to gradually clarify the client's operating logic, thereby changing the client's logic through disassembly. In this way, the client becomes a springboard for network attackers to attack the server through the client. This attack is often effective and fatal. [0003] Such as figure 1 The attack logic commonly...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/53
CPCG06F8/53
Inventor 王卫东朱朝阳李凌慕宗君张海庭刘登鑫沈志广邵广时吴正青赵德玉李江林王广民郭利军方伟李永照
Owner XUJI GRP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products