Encryption method for program
A program and application technology, applied in the direction of instruments, electrical digital data processing, digital data processing components, etc., can solve the problems of being easy to be stolen, losing the rights of the designer, and not being able to guarantee that it will not be stolen.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] see figure 1 Shown, be the action flowchart of the present invention in use, can clearly find out from the figure, the present invention utilizes embedded Linux operating system (Embedded Linux System) as design platform, on the designed application program, set key (KEY), and this key (KEY) can only be written and cannot be read in the application program, but the Linux microkernel (Kernel) of the embedded Linux operating system (EmbeddedLinux System) can read this key (KEY), and then use The computer platform encodes the application program (Coding: converts the input message sequence into a code sequence) and compiles (Compiler: translates the original program into an executable program), so that the application program becomes an executable file, and then re-enters the application program in the executable file Add a file header, and all the content of this file header will be calculated according to the key (KEY) and the conversion table defined in advance, and its...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com