Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for guaranteeing self-security of JAVA program

A self-safe and procedural technology, applied in the field of cryptography and information security, can solve problems such as illegal acquisition and achieve high security effects

Inactive Publication Date: 2014-12-10
中电科网络安全科技股份有限公司
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, some important information may be illegally obtained, and even tampering with JAVA programs becomes very simple

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for guaranteeing self-security of JAVA program
  • Method for guaranteeing self-security of JAVA program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The invention proposes a method for protecting the security of the JAVA program itself by adopting the national secret algorithm.

[0040] The design concept of this method is: first use the national secret algorithm SM2 and SM3 to sign the JAVA CLASS file, and then use the national secret algorithm SM4 to encrypt the CLASS file, effectively preventing the CLASS file from being decompiled and maliciously tampered with.

[0041] like figure 1 Shown, the present invention comprises the steps:

[0042] Step 1: Use the SM2 and SM3 algorithms to sign the CLASS file of the JAVA program, and combine the signature value and the CLASS file into one file in a fixed format to obtain a structured CLASS file.

[0043] like figure 2 As shown, the structure of the structured CLASS file is: signature value length (8 bytes), JAVA bytecode signature value, and JAVA bytecode. The signature value is obtained by SM2 and SM3 algorithms.

[0044] Step 2: Encrypt the structured CLASS file...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for guaranteeing the self-security of a JAVA program. GM algorithms SM2 and SM3 are used for signing a CLASS file of the JAVA, then a GM algorithm SM4 is used for encrypting the CLASS file, and the CLASS file is effectively prevented from being decompiled and tampered maliciously. The method can effectively protect the JAVA program, and the self-security is high. According to the encrypted CLASS file, a JAVA source program corresponding to the CLASS file can not be decompiled by any decompiling tools. For the signed CLASS file, any illegal change to the signed CLASS file can be timely found and is prevented from operating, attacks made by maliciously modifying codes are prevented, and the security level of the JAVA program is greatly improved.

Description

technical field [0001] The invention belongs to the technical field of password and information security, and mainly relates to a method for protecting the security of a JAVA program itself. Background technique [0002] After compiling the JAVA source code, a bytecode that is easily decompiled is generated, and the decompiled code is almost the same as the source code. Therefore, some important information may be obtained illegally, and even tampering with the JAVA program becomes very simple. Therefore, it becomes important and necessary to protect the security of the JAVA program itself. [0003] The following is an explanation of the technical terms involved in the present invention. [0004] JAVA: It is a cross-platform object-oriented interpreted programming language. It is the general name of the Java programming language and Java platform (ie JavaSE, JavaEE, JavaME) launched by Sun MicroSystems in May 1995. [0005] JAVA bytecode: Compiled by JAVA source code thro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/14
CPCG06F9/45504G06F21/14G06F21/1066
Inventor 何志平
Owner 中电科网络安全科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products