Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Code obfuscation encryption method and device, equipment and readable medium

A code obfuscation and encryption method technology, which is applied in the field of computer and communication, can solve problems such as guessing usage, disrupting code format, and difficulty in understanding, and achieves the effect of improving encryption protection strength, improving security, and increasing cracking costs

Active Publication Date: 2021-10-29
INSPUR SUZHOU INTELLIGENT TECH CO LTD
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There are many code obfuscators with different functions: change the names of various elements in the code, such as variables, functions, and classes, into meaningless names, such as rewriting into single letters, or short meaningless letter combinations, Even rewrite it into a symbol like "_", so that readers can't guess its purpose based on the name; rewrite the logical part of the code, and turn it into a functionally equivalent but more difficult to understand form, such as changing the for loop to into a while loop, rewrite the loop into recursion, simplify intermediate variables, etc.; disrupt the format of the code, such as deleting spaces, squeezing multiple lines of code into one line, or breaking a line of code into multiple lines, etc.
[0005] Existing code obfuscation schemes can be cracked by obtaining the original flow through general analysis methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code obfuscation encryption method and device, equipment and readable medium
  • Code obfuscation encryption method and device, equipment and readable medium
  • Code obfuscation encryption method and device, equipment and readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to clarify the purposes of the present invention, the embodiments of the present invention will be further described in detail below with reference to the accompanying drawings.

[0026] It should be noted that all expressions using "first" and "second" in the embodiments of the present invention are in order to distinguish between two identical names of different entities or non-identical parameters, visible "first" "second" For the convenience of expression, it is not understood to be limited to the embodiment of the present invention, and the subsequent embodiment will not be described herein.

[0027] Based on the above object, the first aspect of the embodiment of the present invention proposes an embodiment of an encryption method confusing. figure 1 A schematic illustration of an embodiment of an encryption method provided by the code provided by the present invention is shown. like figure 1 As shown, the encryption method of the code confused in the embodim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a code obfuscation encryption method. The method comprises the following steps: acquiring position information of all function codes in a to-be-encrypted program; judging whether jumping instructions exist in the corresponding function codes one by one based on the position information; if the jump instruction exists in the function code, storing the jump instruction and corresponding address information into a decrypted data body, and replacing the jump instruction with a breakpoint instruction; and in response to the completion of executing the previous step on all the function codes, generating an encrypted file based on an encryption program obtained by the decrypted data volume and the replacement instruction. The invention further discloses a code obfuscation encryption device, computer equipment and a readable storage medium. The original program process is disassembled through instruction replacement, and the encrypted and protected program is allowed to dynamically restore and disassemble the code during operation, so that the problem that the program is cracked due to the fact that a cracker stores the complete program code is prevented, and the security of the program is improved.

Description

Technical field [0001] The present invention relates to the field of computer and communication technologies, and more particularly to a code confusing encryption method, apparatus, device, and readable medium. Background technique [0002] With the rapid development of Internet client technology, the various technologies of the client are increasing, and the functions are more complicated, but because the client code is running on the user terminal, the attacker is easy to read, analyze and crack, Bringing a variety of risks to the system. [0003] Obfuscated code is also known as flower instructions, is a behavior that converts the code of the computer program into a functional equivalent but is difficult to read and understand. The code confuses can be used for program source code, or the intermediate code made in program compilation, and there is also a way of confusing the compilation completed binary code. The program is confused by executing the code is called the code obf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60
CPCG06F21/602G06F2221/2107
Inventor 范益
Owner INSPUR SUZHOU INTELLIGENT TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products