Unlock instant, AI-driven research and patent intelligence for your innovation.

Software protection method, device and equipment and readable storage medium

A technology for software protection and software, applied in the fields of equipment and readable storage media, devices, and software protection methods, to achieve the effect of improving security and reliability

Pending Publication Date: 2022-04-01
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing obfuscation protection, the bytecode of the file is mainly manipulated after compilation, specifically by inserting fancy instructions and the like, but this method still allows malware developers to use decompilation tools to crack and plagiarism

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protection method, device and equipment and readable storage medium
  • Software protection method, device and equipment and readable storage medium
  • Software protection method, device and equipment and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] Today, when information security is getting more and more attention, software protection is also getting more and more attention. As an important means of software protection, code obfuscation technology is also making rapid progress and development. However, many malware developers also choose to use anti-obfuscation to copy genuine software programs to increase the time and cost of security vendors' protection. Therefore, in contrast, obfuscation technology has also become an important topic in information security. Researching reliable obfuscation methods can greatly reduce the cost and time of plagiarism codes. At the same time, the reliability and reliability of obfuscation methods can also be evaluated. effectiveness.

[0043] At present, in the protection of python software, the most practical is to obfuscate the python code, so as to realize the obfuscation of the python program. At present, when obfuscating, it is mainly to compile and operate the bytecode of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a software protection method and device, equipment and a readable storage medium. The method comprises the steps of obtaining an original byte code table; modifying the original byte code table to obtain a modified byte code table; obtaining a to-be-compiled py file, and compiling the py file into a pyc file according to the modified byte code table; and executing the pyc file to generate a software executable file. According to the technical scheme, the obtained original byte code table is modified, the py file is compiled to generate the pyc file according to the modified byte code table, confusion is carried out during compiling, the confusion mode is more bottom-level, and the compilation efficiency is improved. And the pyc file generated based on the modified byte code table has uniqueness by modifying the original byte code table, so that a decompilation tool cannot decompile the finally generated software executable file, and the security and reliability of the software are improved.

Description

technical field [0001] The present application relates to the technical field of software protection, and more specifically, to a software protection method, device, device and readable storage medium. Background technique [0002] Today, when information security is getting more and more attention, software protection is also getting more and more attention. [0003] Among the current software protection methods, obfuscation is one of the important methods. In the existing obfuscation protection, the bytecode of the file is mainly manipulated after compilation, specifically by inserting fancy instructions and the like, but this method still allows malware developers to use decompilation tools to Crack and plagiarize. [0004] To sum up, how to improve the security of software is a technical problem to be solved urgently by those skilled in the art. Contents of the invention [0005] In view of this, the object of the present application is to provide a software protect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14
Inventor 申勐范渊吴卓群王欣
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD