Application program reinforcing method, system and equipment and storage medium

A technology of application programs and encryption algorithms, applied in the computer field, can solve problems such as leakage and achieve good reinforcement effects

Pending Publication Date: 2022-04-29
上海顺途科技有限公司
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some important information will be generated during the running of the application, which arouses the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program reinforcing method, system and equipment and storage medium
  • Application program reinforcing method, system and equipment and storage medium
  • Application program reinforcing method, system and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art.

[0050] The drawings are merely schematic illustrations of the invention and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted. Some of the block diagrams shown in the drawings are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in software, or in one or more hardware forwarding modules or integrated circuits, or in different networks and / or pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application program reinforcing method, system and device and a storage medium, and the method comprises the steps: obtaining a source code of a to-be-reinforced algorithm in an application program, compiling the source code of the to-be-reinforced algorithm into a target program containing a specified instruction set, and analyzing the target program to obtain a code segment of the specified instruction set, and analyzing the code segment of the specified instruction set into an operation code of the custom instruction set. According to the method, the machine code of the to-be-reinforced algorithm is analyzed into the operation code of the user-defined instruction set, and the special user-defined virtual machine execution engine is matched for explanatory execution. The instruction set of the operation code is self-defined, and a reverse person is very difficult to know all the mapping rules, so that the scheme can bring a good application program reinforcement effect.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an application program strengthening method, system, equipment and storage medium. Background technique [0002] Nowadays, with the rapid development of technologies such as the mobile Internet, the Internet of Things, and the Internet of Vehicles, the number of terminals is increasing, and more and more applications are installed in the terminals, which brings great convenience to people's work and life. Some important information will be generated during the running of the application, which arouses the great interest of the attackers, which makes the important information have the risk of being leaked. [0003] At present, attackers often use tools such as disassembly, decompilation, and dynamic debugging to reverse-analyze and crack the executable file of the application to obtain the execution logic of the application, thereby illegally stealing and illegally tampering wit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F8/41G06F9/455
CPCG06F8/427G06F8/434G06F9/45558
Inventor 韩银龙汪松松庆骏凡
Owner 上海顺途科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products