File protection method and device for custom program set
An assembly, custom technology, applied in the direction of digital data protection, computer security device, platform integrity maintenance, etc., can solve the problem of inability to customize assembly protection, reduce script compilation time, flexible encryption protection, and improve work efficiency. The effect of efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0050] Various aspects and features of the present application are described herein with reference to the accompanying drawings.
[0051] It should be understood that various modifications may be made to the embodiments applied for herein. Accordingly, the above description should not be viewed as limiting, but only as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.
[0052] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the application and, together with the general description of the application given above and the detailed description of the embodiments given below, serve to explain the embodiments of the application. principle.
[0053] These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment given as non-limiting examp...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


