Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Webpage source code three-layer encryption method

An encryption method and source code technology, applied in the direction of program/content distribution protection, instruments, electronic digital data processing, etc., can solve the problems of single algorithm, limited defense effect, normal website access threats, etc., to consume hardware resources and increase difficulty. , the effect of slowing down the attack speed

Active Publication Date: 2016-12-14
成都知道创宇信息技术有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The source code of the webpage must be executed by the browser of the visitor. The page code of a website can be easily obtained and analyzed by malicious attackers, and then a program that can automatically attack the website will be generated, which poses a great threat to the normal visit of the website.
Because the method is single and the algorithm is usually not updated for a long time, the defense effect is very limited when encountering targeted attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Webpage source code three-layer encryption method
  • Webpage source code three-layer encryption method
  • Webpage source code three-layer encryption method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments. Although the present invention will be described and illustrated in conjunction with some specific embodiments, it should be noted that the present invention is not limited to these embodiments. On the contrary, any modification or equivalent replacement made to the present invention shall be included in the scope of the claims of the present invention.

[0020] The method of the present invention not only uses the obfuscation of the prior art to resist non-targeted automatic attacks, but also uses a minimal character set to rewrite some important data in the code. The computer language is also extremely unfriendly; for a small part of the key data in the code, a few characters can be deliberately erased, but providing a digital summary forces the client to perform exhaustive enumeration for a short time.

[0021] The data in the page ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a webpage source code three-layer encryption method, and the method mainly comprises the steps of calculating an abstract value of an original key data, and removing several characters in the original key data to get a first key data; rewriting a first layer key data to get a second key data; replacing meaningful word fragments with meaningless placeholder characters by Regular Expressions; transmitting a third layer data to a browser; transiting the third layer data into the second layer data through a transition corresponding relation by the Regular Expressions after the browser receives the third layer data; analyzing the second key data in the second layer data to the first layer key data by the self-carried Javascript engine; and obtaining an original key data by exhausting an abstract value and the first key data through a first code. According to the invention, an efficient and flexible confusion strategy, a dynamically generated minimized character set and a forced exhausting are utilized, so that the difficulty for analyzing and cracking webpage source code by an attacker is greatly increased under the prerequisite that a visitor feels nothing normally.

Description

technical field [0001] The invention relates to the field of webpage encryption in the network, in particular to a three-layer encryption method for webpage source codes. Background technique [0002] Web page code refers to some special "languages" that need to be used in the process of making web pages. Designers organize and arrange these "languages" to create web pages, and then the browser "translates" the code before it can be viewed in the end. to the effect. Usually, the technology used to protect the source code is to use some software to rewrite the source code into a form that is not easy for real people to read in a certain way without changing the execution result, so as to increase the attacker's ability to analyze the code. Difficulty, to achieve the effect of protecting the source code. [0003] The source code of the web page must be executed by the browser of the visitor. The page code of a website can be easily obtained and analyzed by malicious attacker...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12
CPCG06F21/125
Inventor 罗意王小虎石涵王春鹏赵晨晖
Owner 成都知道创宇信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products