Code virtualization protection method, system and apparatus and readable storage medium

A protection system and virtualization technology, applied in the direction of program/content distribution protection, etc., can solve problems such as small protection scope, and achieve the effect of a wide range of programming languages ​​and scenarios

Pending Publication Date: 2021-12-24
三六零安全科技股份有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main purpose of this application is to provide a code virtualization protection method, system, device and readable storage medium, aiming to solve the problem that the protection scope of the current code virtualization protection is relatively small

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Code virtualization protection method, system and apparatus and readable storage medium
  • Code virtualization protection method, system and apparatus and readable storage medium
  • Code virtualization protection method, system and apparatus and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0051] In the following description, use of suffixes such as 'module', 'part' or 'unit' for denoting elements is only for facilitating description of the present invention and has no specific meaning by itself. Therefore, 'module', 'part' or 'unit' may be used in combination.

[0052] Such as figure 1 as shown, figure 1 It is a schematic diagram of the terminal structure of the hardware operating environment involved in the solution of the embodiment of the present application.

[0053] The terminal in this embodiment of the present application is a code virtualization protection device.

[0054] Such as figure 1 As shown, the terminal may include: a processor 1001 , such as a CPU, a network interface 1004 , a user interface 1003 , a memory 1005 , and a communication bus 1002 . Wherein, the c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a code virtualization protection method, system and apparatus and a readable storage medium. The method comprises: obtaining a to-be-protected intermediate code in a to-be-compiled original function; generating a virtual protection code according to the to-be-protected intermediate code; and in the original code, emptying the to-be-protected intermediate code and inserting the virtual protection code to generate a target code. For the to-be-protected intermediate code, the virtual protection code is generated to replace the to-be-protected intermediate code, the to-be-protected intermediate code in the original function is emptied, and the processing of the intermediate code in the compiling process can be suitable for various different languages; and meanwhile, to-be-protected intermediate codes in all functions in the compiling process can be virtually hidden, so that the method is wider in applicable programming languages and scenes.

Description

technical field [0001] The present invention relates to the technical field of software security, in particular to a code virtualization protection method, system, device and readable medium. Background technique [0002] At present, there is an increasing demand for code protection in many scenarios. For example, Android applications, Apple applications, and some IoT (Internet of Things, Internet of Things) device applications have code security requirements. Part of the security requirements is how to ensure that application codes are not protected. been reversed. [0003] The current common code virtualization method is used when the code has been compiled into a corresponding program, and because the code has been compiled, the content of the code that can be protected is limited, and the flexibility of code protection is not enough and the protection effect is poor. Contents of the invention [0004] The main purpose of the present application is to provide a code vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 余奕飞刘敏
Owner 三六零安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products