Method, device and equipment for generating data obfuscation rules

A technology of data generation and generation equipment, which is applied in the computer field, can solve problems such as malicious user attacks, omissions and errors, and incomprehension, and achieve the effects of increasing the risk of leakage, making it less prone to errors or omissions, and improving generation efficiency

Active Publication Date: 2022-04-29
ADVANCED NEW TECH CO LTD
View PDF20 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the need of cross-platform, the intermediate program code contains a lot of source code information, so it is easy to be decompiled into source code
If a software development kit written in the above programming language is provided to a third party, the software development kit will likely be decompiled, thereby stealing key technologies and even allowing malicious users to attack the software development kit. The above situation can usually be achieved by obfuscating the program code in the software development kit, so that the software development kit becomes unreadable or difficult to understand, increasing the cost of attacking the software development kit
[0003] Usually, the process of obfuscating the program code in the software development kit is generally realized by manually writing the obfuscation rules. However, the above method of setting the obfuscation rules is prone to omissions and errors, and makes the obfuscation rules The generation efficiency is low, and some developers even obfuscate a small amount of program code in order to improve the generation efficiency of obfuscation rules and reduce trouble, which greatly increases the risk of program code leakage. Therefore, it is necessary to provide a A technical solution for generating more efficient obfuscation rules and reducing the risk of program code leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and equipment for generating data obfuscation rules
  • Method, device and equipment for generating data obfuscation rules
  • Method, device and equipment for generating data obfuscation rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] like figure 1 As shown, the embodiment of this specification provides a method for generating a data obfuscation rule, and the execution body of the method may be a terminal device or a server, where the terminal device may be a personal computer or the like. The server can be an independent server, or a server cluster composed of multiple servers, and the server can be a background server of a certain business (such as the development and upgrade of a certain application, etc.), or a website ( Such as the background server of an online shopping website or a payment application, etc.). The method can be used in processing such as generating a rule that can rewrite certain data to generate new data that is not readable by users or technicians but does not affect the original logic of the data. The method specifically may include the following steps:

[0057] In step S102, the target data capable of data obfuscation processing in the software development kit is obtained...

Embodiment 2

[0072] like image 3 As shown, the embodiment of this specification provides a method for generating a data obfuscation rule, and the execution body of the method may be a terminal device or a server, where the terminal device may be a personal computer or the like. The server can be an independent server, or a server cluster composed of multiple servers, and the server can be a background server of a certain business (such as the development and upgrade of a certain application, etc.), or a website ( Such as the background server of an online shopping website or a payment application, etc.). The method can be used in processing such as generating a rule that can rewrite certain data to generate new data that is not readable by users or technicians but does not affect the original logic of the data. The method specifically may include the following steps:

[0073] In step S302, the first executable file in the software development kit is read.

[0074] Wherein, the first exec...

Embodiment 3

[0091] like Figure 4 As shown, the embodiment of this specification provides a method for generating a data obfuscation rule, and the execution body of the method may be a terminal device or a server, where the terminal device may be a personal computer or the like. The server can be an independent server, or a server cluster composed of multiple servers, and the server can be a background server of a certain business (such as the development and upgrade of a certain application, etc.), or a website ( Such as the background server of an online shopping website or a payment application, etc.). The method can be used in processing such as generating a rule that can rewrite certain data to generate new data that is not readable by users or technicians but does not affect the original logic of the data. The method specifically may include the following steps:

[0092] In step S402, read the first dex file and the mapping file in the software development kit.

[0093] Wherein, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of this specification discloses a method, device, and equipment for generating data obfuscation rules. The method includes: obtaining target data in a software development kit that can be processed for data obfuscation, and obtaining the target data of the software development kit to be referenced. The non-application data referenced by the application; according to the target data and the non-application data referenced by the target application, determine the data to be confused in the software development kit; generate the software development tool based on the data to be confused Obfuscation rules for packages.

Description

technical field [0001] This specification relates to the field of computer technology, and in particular to a method, device and equipment for generating data confusion rules. Background technique [0002] Currently there are multiple programming languages, some of which are cross-platform languages, such as the Java programming language, etc., and the source codes written in the above programming languages ​​can be compiled into intermediate program codes. Due to the requirement of cross-platform, the intermediate program code contains a lot of source code information, so it is easy to be decompiled into source code. If a software development kit written in the above programming language is provided to a third party, the software development kit will likely be decompiled, thereby stealing key technologies and even allowing malicious users to attack the software development kit. The above situation can usually be achieved by obfuscating the program code in the software deve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 罗其平
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products