Source code reinforcement method and device, computer equipment and storage medium
A source code and computer program technology, applied in the field of information security, can solve the problem of low source code security, achieve the effect of high difficulty in reading, increase the difficulty of reading, and improve security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0027] In order to make the purpose, technical solutions and advantages of the present application, the present application will be described in further detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are intended to explain the present application and is not intended to limit the present application.
[0028] In one embodiment, if figure 1 As shown, a source code reinforcement method is provided, which can be applied to computer devices such as a server, which mainly includes the following steps:
[0029] Step S101, after obtaining the initial source code, insert the server IP record process code and server IP confirmation process code into the initial source code, obtain the second generation source code;
[0030] Specifically, the server IP record process code and server IP confirmation process code can be pre-written in advance. After the initial source code is written, insert the pre...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap