Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Source code reinforcement method and device, computer equipment and storage medium

A source code and computer program technology, applied in the field of information security, can solve the problem of low source code security, achieve the effect of high difficulty in reading, increase the difficulty of reading, and improve security

Pending Publication Date: 2021-08-20
CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the compression reinforcement method is easy to be cracked by reverse engineering, and the corresponding high-level language expression form is obtained through a decompiler to obtain readable source code, resulting in low source code security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Source code reinforcement method and device, computer equipment and storage medium
  • Source code reinforcement method and device, computer equipment and storage medium
  • Source code reinforcement method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0028] In one embodiment, such as figure 1 As shown, a source code reinforcement method is provided, which can be applied to computer equipment such as servers, and the method mainly includes the following steps:

[0029] Step S101, after obtaining the initial source code, inserting the server IP recording process code and the server IP confirmation process code into the initial source code to obtain the second-generation source code;

[0030] Specifically, the server IP recording process code and the server IP confirmation process code can be pre-written. After the initi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security, and provides a source code reinforcement method and device, computer equipment and a storage medium. The source code security can be comprehensively improved. The method comprises the steps that after an initial source code is obtained, a server IP record process code and a server IP confirmation process code are inserted into the initial source code to obtain a second-generation source code, then the second-generation source code is subjected to code modularization to obtain a plurality of code function modules, each code function module is divided into a plurality of module fragments, and each recombined code function module is obtained based on a plurality of module fragments of each code function module, wherein each recombined code function module is composed of a plurality of module fragments after position adjustment, and function link codes are inserted among the plurality of module fragments after position adjustment; third-generation source codes are obtained according to the recombined code function modules, and compilation is carried out after code obfuscation is carried out on the third-generation source codes.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a source code reinforcement method, device, computer equipment and storage medium. Background technique [0002] With the development of Internet technology, combined with the cross-platform advantages of H5 (HTML5), users can access the content of the H5 interface just by clicking on it, and the efficiency of content dissemination is improved, and the advantages of H5 benefit from JavaScript ("JS" for short) endow it with powerful functions. Among them, JS is a lightweight, interpreted or just-in-time compiled high-level programming language with function priority, and is a dynamic scripting language based on prototype programming and multi-paradigm. [0003] However, H5 has some security issues in its application scenarios, such as e-commerce, finance, mini-games, mini-programs and other application scenarios, and there will be functions such as registra...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 陈禹旭胡钊金文娴余芸萧展辉冯国聪姜唯张凌志
Owner CHINA SOUTHERN POWER GRID DIGITAL GRID RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products