Source code reinforcement method and device, computer equipment and storage medium

A source code and computer program technology, applied in the field of information security, can solve the problem of low source code security, achieve the effect of high difficulty in reading, increase the difficulty of reading, and improve security

Pending Publication Date: 2021-08-20
CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the compression reinforcement method is easy to be cracked by reverse engineering, and the corresponding high-level l

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source code reinforcement method and device, computer equipment and storage medium
  • Source code reinforcement method and device, computer equipment and storage medium
  • Source code reinforcement method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0027] In order to make the purpose, technical solutions and advantages of the present application, the present application will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are intended to explain the present application and is not intended to limit the present application.

[0028] In one embodiment, if figure 1 As shown, a source code reinforcement method is provided, which can be applied to computer devices such as a server, which mainly includes the following steps:

[0029] Step S101, after obtaining the initial source code, insert the server IP record process code and server IP confirmation process code into the initial source code, obtain the second generation source code;

[0030] Specifically, the server IP record process code and server IP confirmation process code can be pre-written in advance. After the initial source code is written, insert the pre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of information security, and provides a source code reinforcement method and device, computer equipment and a storage medium. The source code security can be comprehensively improved. The method comprises the steps that after an initial source code is obtained, a server IP record process code and a server IP confirmation process code are inserted into the initial source code to obtain a second-generation source code, then the second-generation source code is subjected to code modularization to obtain a plurality of code function modules, each code function module is divided into a plurality of module fragments, and each recombined code function module is obtained based on a plurality of module fragments of each code function module, wherein each recombined code function module is composed of a plurality of module fragments after position adjustment, and function link codes are inserted among the plurality of module fragments after position adjustment; third-generation source codes are obtained according to the recombined code function modules, and compilation is carried out after code obfuscation is carried out on the third-generation source codes.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a source code reinforcement method, device, computer equipment and storage medium. Background technique [0002] With the development of Internet technology, combined with the cross-platform advantages of H5 (HTML5), users can access the content of the H5 interface just by clicking on it, and the efficiency of content dissemination is improved, and the advantages of H5 benefit from JavaScript ("JS" for short) endow it with powerful functions. Among them, JS is a lightweight, interpreted or just-in-time compiled high-level programming language with function priority, and is a dynamic scripting language based on prototype programming and multi-paradigm. [0003] However, H5 has some security issues in its application scenarios, such as e-commerce, finance, mini-games, mini-programs and other application scenarios, and there will be functions such as registra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 陈禹旭胡钊金文娴余芸萧展辉冯国聪姜唯张凌志
Owner CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products