Source code protection method in project development process and storage medium

A development process and project technology, applied in the field of data security, can solve the problems of hacking, inconvenient, and unable to prevent the second type of accidents, and achieve the effect of preventing illegal attacks

Pending Publication Date: 2021-01-19
福建省天奕网络科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 3. Hacking
[0010] In view of the above problems, the existing protection method is mainly source code encryption, which can effectively solve the above-mentioned types 1 and 3 accidents through layer-by-layer management, but cannot prevent the occurrence of type 2 accidents; for this type of accidents, special The cloud server is easy to manage, but at the same time it cannot be stored on GIT / SVN, so it is not convenient enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source code protection method in project development process and storage medium
  • Source code protection method in project development process and storage medium
  • Source code protection method in project development process and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0062] This embodiment provides a source code protection method in the project development process, which can effectively protect codes in the development stage for various tasks in a large project, and has the function of recovering responsibility after source code leaks.

[0063] In a specific example, the composition and connection relationship of the functional modules corresponding to the method of this embodiment are as follows figure 2As shown, the master control module, the task module, the key module, the encryption module and the execution module are connected in sequence, and the integration module is connected with the execution module and the task module respectively. The deployment of tasks (assignment of specific tasks and corresponding responsible persons) is realized through the master control module, and the task module releases tasks (delivered to specific responsible persons); the keys of various tasks are generated through the key module; through the encry...

Embodiment 2

[0080] see image 3 , this embodiment makes further supplements on the basis of Embodiment 1, and provides the specific operation process after the completion of various tasks under the project:

[0081] S6: Obtain the encryption identifier in the file data stream corresponding to each task under a specific project;

[0082] S7: By traversing the pre-stored relationship corresponding to the item, that is, the relationship stored in step S5, to obtain the key corresponding to each encryption identifier;

[0083] S8: calling the obtained keys one by one to decrypt the corresponding file data stream;

[0084] S9: Merge the decrypted file data streams of various tasks to obtain the developed project.

[0085] In a specific example, the integration of tasks under the project is realized through the integration module, which is respectively connected with the task module and the execution module.

[0086] Specifically, the integration module calls a project, traverses all the HAS...

Embodiment 3

[0089] This embodiment corresponds to Embodiment 1 or Embodiment 2, and describes in detail the functions of task source code protection and accountability respectively:

[0090] (1) Task source code prevention and protection

[0091] (1) Operation protection

[0092] SS1: Use identity information to log in and specify the tasks to be accessed;

[0093] SS2: According to the relationship, confirm that the identity information of the person in charge corresponding to the task to be accessed is consistent with the currently logged-in identity information;

[0094] If inconsistent, deny access and end the process;

[0095] If they are consistent, determine whether the task to be accessed has been encrypted; if not, obtain the key corresponding to the task, and use the obtained key to encrypt the file data stream corresponding to the task, and generate the corresponding encryption key at the same time. key; if it has been encrypted, obtain the encrypted identifier in the file d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a source code protection method in a project development process and a storage medium. The method comprises the steps of generating secret keys in one-to-one correspondence withtasks in a project and identity information of responsible persons of the tasks; intercepting an application running a task to obtain a file data stream of an accessed task; obtaining a secret key corresponding to the accessed task, and encrypting the file data stream by using the obtained secret key; generating an encryption identifier uniquely corresponding to the accessed task, and writing theencryption identifier into the encrypted file data stream; storing the relationship between the key corresponding to each task in a project and the corresponding encryption identifier. Source code leakage and hacker attack can be effectively prevented, and the source code security is improved; the responsibility can be efficiently and accurately traced after the source code is leaked; furthermore, the method also has the functions of monitoring the completion condition of the project and preventing misoperation, and better protects the safety of the source code.

Description

technical field [0001] The invention relates to the field of data security, in particular to a source code protection method and a storage medium in the project development process. Background technique [0002] With the development of the Internet, the demand for project development and expansion has surged. At the same time, more and more projects are being streamlined and professionalized. Such as: project manager -> release project -> order distribution -> programmer / artist -> resource organization (asset management) -> test -> project manager. [0003] In the prior art, the git community (for the open source community) or svn intranet synchronization tools are usually used for project development, but these tools cannot prevent the following situations from happening: [0004] 1. Accident uploaded by mistake [0005] For example, the source code of the Bilibili application was misrepresented recently; the Ctrip database forgot to comment, resulting ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/12G06F21/602G06F2221/2107
Inventor 刘德建丁迪锋林琛
Owner 福建省天奕网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products