CN116680670A - Application software generation method, system, device and storage medium - Google Patents

Application software generation method, system, device and storage medium Download PDF

Info

Publication number
CN116680670A
CN116680670A CN202310969436.0A CN202310969436A CN116680670A CN 116680670 A CN116680670 A CN 116680670A CN 202310969436 A CN202310969436 A CN 202310969436A CN 116680670 A CN116680670 A CN 116680670A
Authority
CN
China
Prior art keywords
application
source code
program
encryption
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310969436.0A
Other languages
Chinese (zh)
Other versions
CN116680670B (en
Inventor
田显宁
陈轶欧
刘贵平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Cssca Technologies Co ltd
Original Assignee
Beijing Cssca Technologies Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Cssca Technologies Co ltd filed Critical Beijing Cssca Technologies Co ltd
Priority to CN202310969436.0A priority Critical patent/CN116680670B/en
Publication of CN116680670A publication Critical patent/CN116680670A/en
Application granted granted Critical
Publication of CN116680670B publication Critical patent/CN116680670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The application provides a method, a system, equipment and a storage medium for generating application software, wherein an encryption and decryption tool encrypts a core source code of an application program to obtain an encrypted core source code; writing application source code of the application program by referring to the encryption core source code; after compiling the application source code and debugging the application program, generating an application program software package and publishing the application program software package. The method can encrypt the core source code in the software development, and then write the application program source code by referring to the encrypted core source code, thereby ensuring the confidentiality of the core source code and ensuring the normal development of the user program and the software. The method solves the problem of secret leakage caused by either plaintext release of source codes or the problems of one-way service, non-feedback service and the like after ciphertext release in the software development market.

Description

Application software generation method, system, device and storage medium
Technical Field
The application belongs to the technical field of software transmission, in particular to a program software development processing technology, and particularly relates to an application program software generation method, system, equipment and storage medium.
Background
Along with the development of the technical field of computer network application, different occasions, channels and users mostly need customized programs and development software which meet the requirements of users on application programs. For example, in the enterprise resource management planning (ERP) and Supply Chain Management (SCM) application software development and release direction oriented to the field of industrial software operation management, the application software is characterized in that a product software provider provides a basic software package and a secondary development tool of a core, and more secondary development or customized development is further customized and completed by a partner in the ecological field according to the customized requirement.
At present, in the process from the development of the application software to the release of the application software to the user, the service is often finished after the delivery of the software package and the development tool, the links of the software package release and the deployment are rarely involved, the links of secondary development, problem feedback and the like are lacked, and a complete software development ecological system cannot be formed. In addition, in the software development market, the problems of secret leakage caused by the release of a source code plaintext or the problems of one-way service, non-feedback service and the like after the release of a ciphertext are mixed, and the development efficiency and the development quality of an application program are greatly reduced.
Disclosure of Invention
The system, the method, the equipment and the storage medium for generating the application program software encrypt the core source code in the software development, and then quote the encrypted core source code to write the application program source code, thereby ensuring the confidentiality of the core source code and ensuring the normal development of the user program and the software.
According to a first aspect of an embodiment of the present application, there is provided an application software generation system including: encrypting the core source code of the application program through an encryption and decryption tool to obtain an encrypted core source code; the encryption and decryption tool is used for encrypting a plaintext code into a ciphertext source code according to encryption and decryption rules and decrypting the ciphertext source code into a plaintext source code; writing application source code of the application program by referring to the encryption core source code; after compiling the application source code and debugging the application program, generating an application program software package and publishing the application program software package.
In some embodiments of the present application, encrypting a core source code of an application program by an encryption and decryption tool to obtain an encrypted core source code includes: traversing a core source code to be encrypted, obtaining encryption and decryption flag parameters, and determining to encrypt the code; and carrying out encryption processing on the core source code content to be encrypted by combining the encryption and decryption matrix to obtain an encrypted core source code.
In some embodiments of the present application, debugging an application includes: decrypting the encrypted core source code referenced in the application program through an encryption and decryption tool to obtain the core source code capable of being edited and modified; compiling an application program in a debugging mode to obtain an application target file of the application program; decrypting the application target file of the application program through the encryption and decryption tool to obtain an intermediate file of the application target file; performing format conversion on the intermediate file of the application target file based on the format conversion tool to obtain application source codes with specified formats; compiling application source codes with specified formats in a debugging mode, and starting an application program for debugging.
In some embodiments of the present application, after generating and distributing the application software package, the method further includes: receiving a service program fed back by a service end; the business program is customized and developed based on the software package of the application program; according to the business program, debugging and modifying the application program part in the business program.
In some embodiments of the present application, debugging an application portion in a modification service program includes: editing and modifying the core source code according to the encryption and decryption tool decrypting the encryption core source code referenced in the application program part; compiling an application program part in a debugging mode to obtain an application target file of the application program part; decrypting the application target file of the application program part to obtain an intermediate file of the application target file; performing format conversion on the intermediate file of the application target file based on the format conversion tool to obtain application source codes with specified formats; compiling application source codes in a specified format in a debugging mode, and starting an application program for debugging; repeating the steps until the application program part runs successfully.
In some embodiments of the present application, decrypting, by an encryption and decryption tool, an encrypted core source code referenced in an application program to obtain a core source code includes: traversing an encryption core source code to be decrypted, obtaining encryption and decryption flag parameters, and determining to decrypt the code; and carrying out decryption processing on the encrypted core source code content by combining the encryption and decryption matrix to obtain a core source code.
In some embodiments of the present application, format conversion is performed on an intermediate file of an application target file based on a format conversion tool to obtain application source code with a specified format, including: acquiring an application target file name to be converted, taking the application target file name as an input file name parameter, and opening an intermediate file in a read-only mode to acquire a read file handle; inputting an application source file name, and taking the file name as an initial search character string; adding a specific suffix to the input application program file name as an output file name, opening an output file handle in a writing mode, and creating a writing buffer area; reading the content in the file buffer area according to the read file handle; analyzing the read content, and exiting the conversion program when abnormal information appears; reading legal reading content according to rows, writing information to be converted into a buffer area according to pattern matching, and converting; and closing the read file handle and the output file handle after the read buffer zone is finished, and simultaneously writing the content written into the buffer zone into the storage file, thereby obtaining the application source code with the specified format.
In some embodiments of the present application, the application software generation method further includes: modifying the application source code; modifying the application source code includes: according to the encryption and decryption tool, decrypting the encrypted core source code referenced by the application source code, editing and modifying the core source code; the source code of the application source code except the encryption core source code is directly modified.
According to a second aspect of the embodiment of the present application, there is provided a business program customizing method, including: acquiring an application software package generated by a developer executing an application software generation method; and generating a service program according to the application program software package and the service function requirement.
In some embodiments of the present application, the service program customization method further includes: feeding back the program problem to the developer; send business program, or send application part referenced by business program.
According to a third aspect of an embodiment of the present application, there is provided an application software generation system including:
encryption core code module: the encryption and decryption tool is used for encrypting the core source code of the application program according to the encryption and decryption tool to obtain an encrypted core source code; the encryption and decryption tool is used for encrypting a plaintext code into a ciphertext source code according to encryption and decryption rules and decrypting the ciphertext source code into a plaintext source code;
Application code module: application source code for writing an application program with reference to the encrypted core source code;
and a debugging module: the method is used for compiling application source codes and debugging application programs;
and a software package module: for generating and publishing application packages.
According to a fourth aspect of an embodiment of the present application, there is provided an application software generation device including: a memory for storing executable instructions; and a processor coupled to the memory for executing the executable instructions to complete the application software generation method.
According to a fifth aspect of an embodiment of the present application, there is provided a computer-readable storage medium having a computer program stored thereon; the computer program is executed by the processor to implement an application software generation method.
By adopting the method, the system, the equipment and the storage medium for generating the application software, the encrypted core source code is obtained by encrypting the core source code of the application according to the encryption and decryption tool; writing application source code of the application program by referring to the encryption core source code; after compiling the application source code and debugging the application program, generating an application program software package and publishing the application program software package. The method can encrypt the core source code in the software development, and then write the application program source code by referring to the encrypted core source code, thereby ensuring the confidentiality of the core source code and ensuring the normal development of the user program and the software. The method solves the problem of secret leakage caused by either plaintext release of source codes or the problems of one-way service, non-feedback service and the like after ciphertext release in the software development market.
In addition, the application program can be modified according to user feedback debugging, secondary development, problem feedback and other links are added, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application program development are greatly improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this specification, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute a limitation on the application. In the drawings:
a schematic diagram of the steps of an application software generation method according to an embodiment of the present application is shown in fig. 1;
a schematic of the steps of a debugging application according to an embodiment of the present application is shown in fig. 2;
fig. 3 is a schematic diagram illustrating an encryption and decryption principle of an encryption and decryption tool according to an embodiment of the present application;
a schematic diagram of the steps of an application software generation method according to another embodiment of the application is shown in fig. 4;
a schematic step diagram of an application part in a debug modification service program according to an embodiment of the present application is shown in fig. 5;
a schematic diagram of a format conversion rule according to an embodiment of the present application is shown in fig. 6;
An overall schematic diagram of an application software generation method according to an embodiment of the present application is shown in fig. 7;
fig. 8 is a schematic diagram of encryption/decryption by using an encryption/decryption tool according to an embodiment of the present application;
a schematic step diagram of a business process customization method according to an embodiment of the present application is shown in fig. 9;
a schematic structural diagram of an application software generation system according to an embodiment of the present application is shown in fig. 10;
a schematic structural diagram of an application software generation device according to an embodiment of the present application is shown in fig. 11.
Detailed Description
In the application, the existing application program, source code encryption and decryption method or code ciphertext confusion technology is mostly used in the development stage, namely the encryption and decryption process is basically carried out in the development stage, then the source code engineering construction is compiled in a compiler, and the encryption and decryption work is mostly in the process of developing internal processing. Other systems even need special encryption and decryption systems, compiling systems and user authorization systems, so that the whole processing flow is complicated. The existing program development rarely relates to links after the software package is released and deployed, and feedback links such as maintenance, modification and debugging, secondary development and the like on the released software are lacked, so that a complete software development ecological system cannot be formed.
In the existing software development stage, the software package is released in either plain text or ciphertext/confusion, and the release is basically finished for a software developer. Specifically, for the scene of plaintext release, such as release of a software package of a C language SDK type, the general practice is to embody the scene in plaintext, the follow-up compiling is required to rely on a header file of the plaintext to carry out secondary development and compiling, if the header file is ciphertext, a compiling system cannot carry out compiling, and the common compiling is not carried out and only a special compiler is required.
Also for example ciphertext/obfuscation process publishing scenarios: such as JavaScript Packages developed by front-end Web pages that are obfuscated/Java Packages/Class files compiled by a compiler, the collaboration between the software provider and the implementation partner is unidirectional.
In contrast, the independent software developer ISV (Independent Software Vendors) focuses on the development of public and core basic functions through the application software generation method, system, device and storage medium, and then provides the user with the development of the industry field on the basis of the program provided by the application partner, for example. Meanwhile, when a user performs service level function customization development, the compiling result file of the original code with problems can be fed back to an independent software developer for modification and debugging so as to obtain more specialized development service support.
Based on the above, the embodiment of the application encrypts the core source code in the software development, and then writes the source code of the application program by referring to the encrypted core source code, thereby ensuring the confidentiality of the core source code and ensuring the normal development of the user program and the software.
The application provides a format conversion tool besides encrypting and decrypting core function source codes, which is used together with the encrypting and decrypting tool, and an application program source file is restored through the format conversion tool when debugging and modifying, so that a developer can conveniently debug a public/core source program.
The application has the advantages of embedded, low cost, high safety and easy popularization, and can meet the requirements of customers and implementation partners for program customized development and post development and maintenance, and also meet the maintenance requirements of core product developers on core source codes.
Regarding the format conversion tool: the format conversion belongs to an auxiliary tool in program debugging and is used together with an encryption and decryption tool, and an application program source file is restored through the format conversion tool, so that the file in a ciphertext form is presented to a developer in a plaintext mode, and the developer is convenient to maintain an application source program and debug and maintain public/core source codes.
Among the beneficial effects of the system, method, device and storage medium for generating application software, embedded type means that the encryption and decryption method is very suitable for being integrated into a platform type product. Low cost means that the application does not require additional server resources and software and hardware environments. The high security refers to the protection of the application program, and can improve the system access security. The method is easy to popularize, on the one hand, the encryption and decryption method is transparent to common users accessing the system, the product constructed by the method is easy to popularize among ecological partners, the ecological partners can concentrate on the development of customized functions in the service field of the ecological partners, and public-based, core and complex system programs can be completed by independent software development providers, so that the confidentiality of the core program is ensured.
In summary, the method, the system, the equipment and the storage medium for generating the application software protect the published public foundation or core application program, improve the system access security, not only meet the requirement of clients and implementation partners for customized development, but also meet the maintenance requirement of core product developers on core source codes.
In this case, it is necessary to provide an application scenario of a set of application programs or source code encryption, decryption and file conversion tools for industrial software business management domain software such as enterprise resource management planning (ERP) and Supply Chain Management (SCM). The code of the basic core is completed by a manufacturer, the manufacturer only provides the encrypted basic core code and the development help document, and the partner understands the basic core interface program calling rule required to be called according to the development help document to complete the program development of the customized part. The development and execution of the business program and the operation of the basic core program still have the analysis and execution of the platform program.
The application software generation method, system, device and storage medium are applicable to most 3GL/4GL (third generation programming language and fourth generation programming language).
Specifically, by adopting the method, the system, the equipment and the storage medium for generating the application software, the encrypted core source code is obtained by encrypting the core source code of the application according to the encryption and decryption tool; writing application source code of the application program by referring to the encryption core source code; after compiling the application source code and debugging the application program, generating an application program software package and publishing the application program software package. The method can encrypt the core source code in the software development, and then write the application program source code by referring to the encrypted core source code, thereby ensuring the confidentiality of the core source code and ensuring the normal development of the user program and the software. The method solves the problem of secret leakage caused by either plaintext release of source codes or the problems of one-way service, non-feedback service and the like after ciphertext release in the software development market.
In addition, the application program can be modified according to user feedback debugging, secondary development, problem feedback and other links are added, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application program development are greatly improved.
In order to make the technical solutions and advantages of the embodiments of the present application more apparent, the following detailed description of exemplary embodiments of the present application is provided in conjunction with the accompanying drawings, and it is apparent that the described embodiments are only some embodiments of the present application and not exhaustive of all embodiments. It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other.
Example 1
A schematic diagram of the steps of an application software generation method according to an embodiment of the application is shown in fig. 1.
As shown in fig. 1, the application software generation method according to the embodiment of the present application includes the following steps:
s1: encrypting the core source code of the application program through an encryption and decryption tool to obtain an encrypted core source code; the encryption and decryption tool is used for encrypting a plaintext code into a ciphertext source code according to encryption and decryption rules and decrypting the ciphertext source code into a plaintext source code; s2: writing application source code of the application program by referring to the encryption core source code; s3: after compiling the application source code and debugging the application program, generating an application program software package and publishing the application program software package.
Based on the method, the core source code can be encrypted in the software development, and then the encrypted core source code is referenced to write the source code of the application program, so that the confidentiality of the core source code can be ensured, and the normal development of the user program and the software can be ensured. The method solves the problem of secret leakage caused by either plaintext release of source codes or the problems of one-way service, non-feedback service and the like after ciphertext release in the software development market.
A schematic of the steps of a debugging application according to an embodiment of the present application is shown in fig. 2.
In other embodiments, as shown in FIG. 2, the debugging application in S3 includes: s31: firstly, decrypting an encrypted core source code referenced in an application program according to an encryption and decryption tool to obtain a core source code capable of being edited and modified; s32: compiling the application program in a debugging mode to obtain an application target file of the application program; s33: next, decrypting the application target file of the application program through an encryption and decryption tool to obtain an intermediate file of the application target file; s34: performing format conversion on the intermediate file of the application target file based on the format conversion tool to obtain application source codes with specified formats; s35: compiling application source codes with specified formats in a debugging mode, and starting an application program for debugging.
It should be noted that, in both steps S31 and S33, the encryption and decryption tools are the same encryption and decryption tools, the encryption and decryption are symmetrically similar processes, and are decryption processes at this time, but the decrypted objects are different, and step S31 decrypts the source code; step S33 is to decrypt the application target file after the compiling process.
In specific implementation, the encryption and decryption tool encrypts the core source code of the application program to obtain an encrypted core source code, which comprises the following steps: firstly, traversing a core source code to be encrypted, acquiring encryption and decryption flag parameters to judge whether encryption or decryption is performed, and when the encryption of the code is determined, performing encryption processing on the content of the core source code to be encrypted by combining an encryption and decryption matrix to obtain an encrypted core source code.
Similarly, in the implementation, the encryption and decryption tool decrypts the encrypted core source code referenced in the application program to obtain the core source code, which includes: and traversing the encrypted core source code to be decrypted, acquiring encryption and decryption flag parameters, judging whether encryption or decryption is performed, and when the code decryption is determined, performing decryption processing on the content of the encrypted core source code by combining an encryption and decryption matrix to obtain the core source code.
In the debugging and modifying process, encryption and decryption tools are needed in the steps S31 and S33, and in the step S31, the encryption core source codes quoted in the application program are decrypted according to the encryption and decryption tools to obtain core source codes; in step S33, the application target file of the application program is decrypted by the encryption and decryption tool, and the process is similar, when the application target file is specifically decrypted, the content of the application target file needs to be traversed, and the decryption process is performed on the content of the application target file in combination with the encryption and decryption matrix, so as to obtain an intermediate file. Based on the method, when problems occur in program development or feedback of a user such as a partner, an application program source code can be debugged and modified, links such as secondary development and problem feedback are added, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application program development are greatly improved.
Fig. 3 shows a schematic diagram of encryption and decryption principle of an encryption and decryption tool according to an embodiment of the present application.
As shown in fig. 3, a process of encrypting or decrypting a code using an encryption and decryption tool is further described.
Firstly, inputting the file name of a file to be encrypted/decrypted, and acquiring a Checksum of the encrypted/decrypted file based on a Fletcher's Checksum algorithm; and then carrying out exclusive OR operation on the obtained checksum and the file check factor to obtain the encryption/decryption seed. The file verification factor can be preset according to encryption and decryption requirements.
And then, firstly storing the file to be encrypted/decrypted into a file buffer area, traversing the content of the file to be encrypted/decrypted to obtain encryption/decryption flag parameters, and judging whether the file contains the encryption flag parameters or the decryption flag parameters according to the first four bytes in the file buffer area, thereby determining whether the content in the file buffer area is encrypted or decrypted.
In the corresponding encryption or decryption process, the calculation result value is taken as the serial number of the following encryption/decryption matrix by carrying out modulo operation (% 256) on the encryption/decryption seeds. And judging whether the file buffer area is finished or not, when the buffer area is finished, obtaining the numerical value in the encryption/decryption matrix according to the sequence number, replacing the content in the current buffer area with the numerical value, and simultaneously subtracting one from the sequence number and adding one to the file buffer area pointer.
During specific encryption processing, performing bitwise and operation = -0 x80 on the first four bytes in the file buffer in sequence; when specific non-encryption (decryption) processing is performed, bit-wise OR operation is performed on the first four bytes in the file buffer area in sequence, wherein the bit-wise OR operation is performed on the first four bytes in the file buffer area; and obtaining a corresponding decryption file, namely a core source code or an intermediate file of the application target file, until the encryption and decryption processing result.
A schematic diagram of the steps of an application software generation method according to another embodiment of the application is shown in fig. 4.
In other embodiments, as shown in fig. 4, after generating and distributing the application software package, S3 further includes: s4, receiving a service program fed back by a service end user; the business program is customized and developed based on the software package of the application program; s5, according to the service program, debugging and modifying an application program part in the service program. At this time, the process of code modification is added as compared to the debugging program of the original software development process.
Based on the method, the service end is added with the program customization function, and when the program development problem occurs in the customization process, the source code of the application program can be debugged and modified, so that the links of secondary development, problem feedback and the like of the development flow are further perfected, a complete software development ecological system is formed, and the safety, development efficiency and development quality of the application program development are greatly improved.
A schematic of the steps of the application part in the debug modification service program according to an embodiment of the present application is shown in fig. 5.
As shown in fig. 5, in the implementation, the debugging and modifying the application program part in the service program in S5 includes: s51: decrypting the encrypted core source code referenced in the application program part according to the encryption and decryption tool to obtain a core source code and modifying the core source code; s52: compiling an application program part in a debugging mode to obtain an application target file of the application program part; s53: decrypting the application target file of the application program part through the encryption and decryption tool to obtain an intermediate file of the application target file; s54: based on a format conversion rule, namely a format conversion tool, performing format conversion on an intermediate file of the application target file to obtain an application source code with a specified format; s55: compiling application source codes in a specified format in a debugging mode, and starting an application program for debugging; finally, repeating the steps until the application program part runs successfully.
Based on the method, when the program development or the user such as a partner generates problems in the process of customizing the service program according to the core function program basis, the method can feed back to a developer to debug and modify the source code of the application program, and the encryption and decryption tool and the format conversion tool are used for completing the decryption and conversion of the code, so that the secondary code modification and secondary debugging are realized. The links of custom development, problem feedback and the like of the development flow are further perfected, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application program development are greatly improved.
In the above steps S34 and S54 related to the debugging program, the step of performing format conversion on the intermediate file of the application target file based on the format conversion rule to obtain the application source code in the specified format is used.
The specific implementation process of converting through the format conversion rule comprises the following steps: acquiring an application target file name to be converted, taking the application target file name as an input file name parameter, and opening an intermediate file in a read-only mode to acquire a read file handle; inputting an application source file name, and taking the file name as an initial search character string; adding a specific suffix to the input application program file name as an output file name, opening an output file handle in a writing mode, and creating a writing buffer area; reading the content in the file buffer area according to the read file handle; analyzing the read content, and exiting the conversion program when abnormal information appears; reading legal reading content according to rows, writing information to be converted into a buffer area according to pattern matching, and converting; and closing the read file handle and the output file handle after the read buffer zone is finished, and simultaneously writing the content written into the buffer zone into the storage file, thereby obtaining the application source code with the specified format.
A schematic diagram of the format conversion rule according to an embodiment of the present application is shown in fig. 6.
Then, to further describe the implementation principle of the format conversion rule, i.e. the format conversion tool, as shown in fig. 6, in a specific application scenario:
1) Firstly, acquiring an application target file name to be converted, taking the application target file name as an input file name parameter, and opening a file in a read-only mode to acquire a read file handle;
2) Inputting an application source file name, and taking the file name as an initial search character string;
3) Adding an Out suffix to the input application program file name as an output file name, opening an output file handle in a writing mode, and creating a writing buffer area;
4) Reading the content in the file buffer area according to the read file handle;
5) Analyzing the read content, and exiting the conversion program when abnormal information appears; for example: judging whether the number of source file name information is 1, if so, generating an abnormality, and exiting the conversion program flow; for another example, it is determined whether an abnormal character appears in the source file name, and if so, an abnormality appears and the conversion program flow is exited.
6) Reading legal reading content according to rows, writing information to be converted into a buffer area according to pattern matching, and converting; specifically, after legal line information is read, pattern matching is performed, and information conforming to rules comprises annotation information which possibly appears and is written into a cache area; the character to be converted such as "-" is converted into a space character, for example, by performing replacement character conversion.
7) And closing the read file handle and the output file handle after the read buffer zone is finished, and simultaneously writing the content written into the buffer zone into the storage file, thereby obtaining the application source code with the specified format.
It should be noted that the application target file name to be converted may be the same as or similar to the input application source file name (excluding the file name extension suffix), and both are two independent files from the physical path name. In a general compiling process, an application source file is taken as an input, and an application target file is output through a compiling tool.
When the embodiment of the application is implemented, the application software generation method further comprises the step of modifying the application source code; modifying the application source code includes: according to the encryption and decryption tool, decrypting the encrypted core source code referenced by the application source code, editing and modifying the core source code; the source code of the application source code except the encryption core source code is directly modified.
An overall schematic diagram of an application software generation method according to an embodiment of the application is shown in fig. 7.
In order to further explain the principle of the application software generation method of the embodiment of the present application, as shown in fig. 7, an independent software provider performs encryption development of core codes based on the encryption and decryption tool provided by the embodiment of the present application, performs debugging and modification of an application program in combination with the format conversion tool, then collates software packages for developing the application program with a core and a common function, including encrypted common and core target files, complete application program target files and a developer using a manual, to obtain a software package for the application program, and then distributes the software package to at least one user, namely an ecological partner, and the partner performs service customization development based on the target files distributed by the independent developer and the developer using a manual according to different service requirements and service development functions, compiles after developing to obtain service application source programs to obtain service application target files, and if problems occur in the development processes, can feed back to the independent developer to debug and modify application program parts provided by the independent developer.
Embodiments of the present application may provide a complete full lifecycle management scheme for common/core source code. For developers of independent software providers and ecological partners, the independent software providers are focused on the design and development of public basic/core products, and the ecological partners are focused on the design and development of project-type customized business applications.
In specific summary implementation, for an independent software provider, the following flow is included:
step 1, an independent developer writes a public/core source program, and the source program exists in a plaintext form at the stage;
step 2, the developer encrypts the public/core source program and deploys the public/core source program to a designated path in a development environment;
step 3, the developer refers to the encrypted public/core source program when writing the application source program;
step 4, compiling an application program source program by a developer;
and 5, integrating the encrypted public/core source program, the compiled application program and the application program by the developer, and releasing the application program and the application program into a production environment or a release channel such as the Internet by the developer.
The program can be modified at the same time when being debugged. The method is mainly used for debugging and modifying application programs outside the common basic source program and the core program.
On the one hand, for the public basic source program, the decryption program is directly operated, the encrypted source program exists in a plaintext form, and then the decrypted source program file can be edited and modified. And the debugging of the application program part is carried out by adopting a conventional debugging mode.
On the other hand, for debugging of a common underlying source program referenced by an application program, the following steps need to be performed:
before debugging, a developer firstly backs up an application program to be used as an original application program source file;
secondly, operating a decryption program on the public basic source program, and editing and modifying the public basic source program;
(III) compiling the application program in a debugging mode;
(IV) running a decryption program on the target file of the compiling application program;
(V) for the operation conversion tool of the decryption file generated in the step four, the generation result is that the application source file containing the public basic program can be seen to replace the original application source file which is backed up
(six) compiling the application program again in the debugging mode; by enabling application debugging, the common underlying source program can be debugged.
Next, for a partner for custom development, the following flow is included:
Firstly, compiling a customized application source program according to manual description of a developer;
compiling an application source file in a debugging mode to generate a target file containing debugging information;
then, tracking and debugging the application program source file in a debugging mode;
finally, when the problem that the application program part cannot be processed is encountered, the problematic target file can be sent to an independent software developer to obtain professional technical support for secondary development modification and debugging of the application program part.
The encryption/decryption matrix and the encryption/decryption engine method are specifically adopted for encrypting or decrypting the core code with respect to the encryption/decryption tool or the decryption parameter.
In the implementation, the encryption/decryption matrix is an array, specifically a fixed 256-byte unsigned character Char type array, where the array includes 256 corresponding shaped values of ASCII characters, and the positions of the values in the array are stored in an out-of-order manner.
Fig. 8 is a schematic diagram of encryption/decryption by using an encryption/decryption tool according to an embodiment of the present application.
As shown in fig. 8, first, the identity information of the current independent developer is obtained to confirm whether the code file can be encrypted or decrypted, the legal developer continues the subsequent development flow, and the illegal developer terminates the development operation.
And then reading the current source file into the buffer area, and encrypting and decrypting the buffer area file by combining the encryption and decryption flag parameters and the encryption and decryption matrix. The application program/source code encryption and decryption are provided by the same program, and encryption processing or decryption processing is performed by identifying encryption/decryption flag parameters first.
The basic idea of the encryption/decryption algorithm is that in the program compiling stage, the public and basic core program scanning source program encryption/decryption matrixes are processed, and after being processed, the target files are issued into a development system as public/core programs, and after being strictly tested, the target files can be used along with target files of service application programs and the target files of developers by using manual products to install packages.
The business application source program refers to the business application target file in a static or dynamic mode in the compiling process according to the condition of the called public/core program. The encryption/decryption program itself is not issued to the product installation package, and is only used as an internal tool for an independent software provider, the decryption process is very simple, the decryption flag parameters are designated, and the decryption processing program can decrypt the public base/core target file by using the encryption/decryption matrix.
The conversion tool is mainly used for converting the target file of the application program, the processing process is to identify a non-public core program, restore service application source codes (comprising public/core source file information) and facilitate compiling and debugging of the public core program part, the conversion work is taken as an internal tool and cannot be released into a product installation package, and the conversion tool is only taken as an internal tool and provided for independent software providers to use.
By adopting the application software generation method of the embodiment of the application, the core source code of the application program is encrypted according to the encryption and decryption tool, so as to obtain the encrypted core source code; writing application source code of the application program by referring to the encryption core source code; after compiling the application source code and debugging the application program, generating an application program software package and publishing the application program software package. The method can encrypt the core source code in the software development, and then write the application program source code by referring to the encrypted core source code, thereby ensuring the confidentiality of the core source code and ensuring the normal development of the user program and the software. The method solves the problem of secret leakage caused by either plaintext release of source codes or the problems of one-way service, non-feedback service and the like after ciphertext release in the software development market.
In addition, the application program can be modified according to user feedback debugging, secondary development, problem feedback and other links are added, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application program development are greatly improved.
Example 2
The present embodiment provides a business program customization method, and for details not disclosed in the business program customization method of the present embodiment, please refer to the specific implementation content of the application software generation method of embodiment 1.
A schematic diagram of the steps of a business process customization method according to an embodiment of the present application is shown in fig. 9.
As shown in fig. 9, the service program customizing method includes:
s10: acquiring an application software package generated by a developer executing an application software generation method;
s20: and generating a service program according to the application program software package and the service function requirement.
In specific implementation, the business program customizing method further comprises the following steps: feeding back the program problem to the developer; send business program, or send application part referenced by business program.
In combination with the embodiment of the application software generation method of embodiment 1, when problems occur in program development or user feedback such as partner feedback, the application source code can be debugged and modified, links such as secondary development and problem feedback are added, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application development are greatly improved.
Example 3
The present embodiment provides an application software generating system, and for details not disclosed in the application software generating system of the present embodiment, please refer to the specific implementation of the application software generating method of other embodiments.
A schematic structural diagram of an application software generation system according to an embodiment of the present application is shown in fig. 10.
As shown in fig. 10, the application software generation system includes an encryption core code module 10, an application code module 20, a debugging module 30, and a software package module 40.
Specifically, the encryption core code module 10: the encryption and decryption tool is used for encrypting the core source code of the application program according to the encryption and decryption tool to obtain an encrypted core source code; the encryption and decryption tool is used for encrypting codes of plaintext into source codes of ciphertext according to encryption and decryption rules and decrypting the source codes of ciphertext into source codes of plaintext.
The application code module 20: application source code for writing an application program with reference to the encrypted core source code.
Debug module 30: the method is used for compiling application source codes and debugging application programs.
The debugging application program comprises: firstly, decrypting an encrypted core source code referenced in an application program according to an encryption and decryption tool to obtain a core source code capable of being edited and modified; compiling the application program in a debugging mode to obtain an application target file of the application program; next, decrypting the application target file of the application program to obtain an intermediate file of the application target file; performing format conversion on the intermediate file of the application target file based on the format conversion tool to obtain application source codes with specified formats; compiling application source codes with specified formats in a debugging mode, and starting an application program for debugging.
Software package module 40: for generating and publishing application packages.
In specific implementation, the encryption and decryption tool encrypts the core source code of the application program to obtain an encrypted core source code, which comprises the following steps: firstly, traversing a core source code to be encrypted, acquiring encryption and decryption flag parameters to judge whether encryption or decryption is performed, and when the encryption of the code is determined, performing encryption processing on the content of the core source code to be encrypted by combining an encryption and decryption matrix to obtain an encrypted core source code.
Similarly, in the implementation, the encryption and decryption tool decrypts the encrypted core source code referenced in the application program to obtain the core source code, which includes: and traversing the encrypted core source code to be decrypted, acquiring encryption and decryption flag parameters, judging whether encryption or decryption is performed, and when the code decryption is determined, performing decryption processing on the content of the encrypted core source code by combining an encryption and decryption matrix to obtain the core source code.
Based on the method, when problems occur in program development or feedback of a user such as a partner, an application program source code can be debugged and modified, links such as secondary development and problem feedback are added, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application program development are greatly improved.
In other embodiments, the system further includes a secondary development module (not shown in the figure) for generating an application software package and receiving a service program fed back by the service end after the application software package is distributed; the business program is customized and developed based on the software package of the application program; and then debugging and modifying the application program part in the service program according to the service program.
The method comprises the steps of carrying out format conversion on an intermediate file of an application target file based on a format conversion tool to obtain an application source code with a specified format, wherein the specific implementation process comprises the following steps: acquiring an application target file name to be converted, taking the application target file name as an input file name parameter, and opening an intermediate file in a read-only mode to acquire a read file handle; inputting an application source file name, and taking the file name as an initial search character string; adding a specific suffix to the input application program file name as an output file name, opening an output file handle in a writing mode, and creating a writing buffer area; reading the content in the file buffer area according to the read file handle; analyzing the read content, and exiting the conversion program when abnormal information appears; reading legal reading content according to rows, writing information to be converted into a buffer area according to pattern matching, and converting; and closing the read file handle and the output file handle after the read buffer zone is finished, and simultaneously writing the content written into the buffer zone into the storage file, thereby obtaining the application source code with the specified format.
In summary, an independent software provider performs encryption development of a core code based on the encryption and decryption tool provided by the embodiment of the application, performs debugging and modification of an application program in combination with a format conversion tool, then sorts software packages of the application program which is developed with a core and common functions, including encrypted common and core target files, complete application program target files and application program target files which are obtained by a developer by using a manual, and then distributes the software packages to at least one user, namely an ecological partner, wherein the partner performs service customization development based on target files distributed by the independent developer and the manual by using the developer according to different service requirements and service development functions, compiles the service application target files after the service application source program is obtained, and can feed back to the independent developer to debug and modify application program parts provided by the independent developer if problems occur in the development process.
By adopting the application software generation system of the embodiment of the application, the encryption core code module 10 encrypts the core source code of the application program according to the encryption and decryption tool to obtain the encryption core source code; the application code module 20 references the encrypted core source code to write the application source code of the application; the debug module 30 compiles the application source code and the debug application; the software package module 40 generates and publishes application software packages. The method can encrypt the core source code in the software development, and then write the application program source code by referring to the encrypted core source code, thereby ensuring the confidentiality of the core source code and ensuring the normal development of the user program and the software. The method solves the problem of secret leakage caused by either plaintext release of source codes or the problems of one-way service, non-feedback service and the like after ciphertext release in the software development market.
In addition, the application program can be modified according to user feedback debugging, secondary development, problem feedback and other links are added, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application program development are greatly improved.
Example 4
The present embodiment provides an application software generating apparatus, and for details not disclosed in the application software generating apparatus of the present embodiment, please refer to specific implementation contents of the application software generating method or system in other embodiments.
A schematic structural diagram of the application software generation device 400 or the application software generation device according to an embodiment of the present application is shown in fig. 11.
As shown in fig. 11, the application software generation device 400 or the application software generation device includes:
memory 402: for storing executable instructions; and
the processor 401 is configured to interface with the memory 402 to execute executable instructions to perform an application software generation method or an application software generation method.
It will be appreciated by those skilled in the art that the schematic diagram 11 is merely an example of an application software generation device 400 or an application software generation device, and does not constitute a limitation of the application software generation device 400 or the application software generation device, and may include more or fewer components than illustrated, or may combine certain components, or different components, e.g., the application software generation device 400 may further include an input-output device, a network access device, a bus, etc.
The processor 401 (Central Processing Unit, CPU) may also be other general purpose processors, digital signal processors (Digital Signal Processor, DSP), application specific integrated circuits (Application Specific Integrated Circuit, ASIC), field programmable gate arrays (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor 401 may be any conventional processor or the like, and the processor 401 is a control center of the application software generation device 400, and connects the respective parts of the entire application software generation device 400 using various interfaces and lines.
The memory 402 may be used to store computer readable instructions, and the processor 401 may implement various functions of the application software generating device 400 by executing or executing the computer readable instructions or modules stored in the memory 402 and invoking data stored in the memory 402. The memory 402 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required for at least one function, and the like; the storage data area may store data created according to the application software generation device 400 use, or the like. In addition, the memory 402 may include a hard disk, memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash Card (Flash Card), at least one disk storage device, a Flash memory device, a Read-only memory (ROM), a random access memory (RandomAccess Memory, RAM), or other non-volatile/volatile storage device.
The modules integrated by the application software generation device 400 may be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product. Based on such understanding, the present application may implement all or part of the flow of the method of the above-described embodiments, or may be implemented by means of computer readable instructions to instruct related hardware, where the computer readable instructions may be stored in a computer readable storage medium, where the computer readable instructions, when executed by a processor, implement the steps of the method embodiments described above.
Example 5
The present embodiment provides a computer-readable storage medium having a computer program stored thereon; the computer program is executed by the processor to implement the application software generation method in other embodiments.
According to the application software generation device and the storage medium, the core source code of the application program is encrypted according to the encryption and decryption tool, so that the encrypted core source code is obtained; writing application source code of the application program by referring to the encryption core source code; after compiling the application source code and debugging the application program, generating an application program software package and publishing the application program software package.
The embodiment of the application can encrypt the core source code in the software development, and then write the source code of the application program by referring to the encrypted core source code, thereby ensuring the confidentiality of the core source code and ensuring the normal development of the user program and the software. The method solves the problem of secret leakage caused by either plaintext release of source codes or the problems of one-way service, non-feedback service and the like after ciphertext release in the software development market.
In addition, the application program can be modified according to user feedback debugging, secondary development, problem feedback and other links are added, a complete software development ecological system is formed, and the safety, development efficiency and development quality of application program development are greatly improved.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the invention. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the spirit or scope of the application. Thus, it is intended that the present application also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (11)

1. A method for generating application software, comprising:
encrypting the core source code of the application program through an encryption and decryption tool to obtain an encrypted core source code; the encryption and decryption tool is used for encrypting a plaintext code into a ciphertext source code according to encryption and decryption rules and decrypting the ciphertext source code into the plaintext source code;
writing application source codes of application programs by referring to the encryption core source codes;
and after compiling the application source code and debugging the application program, generating an application program software package and publishing the application program software package.
2. The method for generating application software according to claim 1, wherein encrypting the core source code of the application by the encryption/decryption means to obtain the encrypted core source code comprises:
traversing a core source code to be encrypted, obtaining encryption and decryption flag parameters, and determining to encrypt the code;
and carrying out encryption processing on the core source code content to be encrypted by combining an encryption matrix to obtain an encrypted core source code.
3. The application software generation method according to claim 1, wherein the debugging the application includes:
decrypting the encrypted core source code referenced in the application program through an encryption and decryption tool to obtain a core source code;
compiling the application program in a debugging mode to obtain an application target file of the application program, wherein the application target file contains debugging information;
decrypting an application target file of the application program through an encryption and decryption tool to obtain an intermediate file of the application target file;
performing format conversion on the intermediate file of the application target file based on a format conversion tool to obtain an application source code with a specified format;
compiling the application source code with the specified format in a debugging mode, and starting an application program for debugging.
4. The method for generating application software according to claim 3, wherein decrypting the encrypted core source code referenced in the application by the encryption and decryption tool to obtain the core source code comprises:
traversing an encryption core source code to be decrypted, obtaining encryption and decryption flag parameters, and determining to decrypt the code;
and carrying out decryption processing on the encrypted core source code content by combining the encryption and decryption matrix to obtain a core source code.
5. The application software generation method according to claim 3, wherein the format conversion tool performs format conversion on the intermediate file of the application target file to obtain the application source code with the specified format, and the method comprises:
acquiring an application target file name to be converted, and opening the intermediate file in a read-only mode to obtain a read file handle as an input file name parameter;
inputting an application source file name, and taking the file name as an initial search character string;
adding a specific suffix to the input application program file name as an output file name, opening an output file handle in a writing mode, and creating a writing buffer area;
reading the content in the file buffer area according to the read file handle;
Analyzing the read content, and exiting the conversion program when abnormal information appears; reading legal reading content according to rows, writing information to be converted into a buffer area according to pattern matching, and converting;
and closing the read file handle and the output file handle after the read buffer zone is finished, and simultaneously writing the content written into the buffer zone into the storage file, thereby obtaining the application source code with the specified format.
6. The application software generation method according to claim 1, further comprising, after the generating and distributing the application software package:
receiving a service program fed back by a service end; the business program is subjected to custom development based on a software package of the application program;
and according to the service program, debugging and modifying an application program part in the service program.
7. A business process customization method, comprising:
acquiring an application software package generated by a developer executing the application software generation method according to any one of claims 1 to 6;
and generating a service program according to the application program software package and the service function requirement.
8. The business process customization method according to claim 7, further comprising:
Feeding back the program problem to the developer;
and sending the service program or sending an application program part referenced by the service program.
9. An application software generation system, comprising:
encryption core code module: the encryption and decryption tool is used for encrypting the core source code of the application program according to the encryption and decryption tool to obtain an encrypted core source code; the encryption and decryption tool is used for encrypting a plaintext code into a ciphertext source code according to encryption and decryption rules and decrypting the ciphertext source code into a plaintext source code;
application code module: application source code for writing an application program with reference to the encrypted core source code;
and a debugging module: the method comprises the steps of compiling the application source code and debugging the application program;
and a software package module: for generating and publishing application packages.
10. An application software generation device, comprising:
a memory for storing executable instructions; and
a processor coupled to the memory for executing executable instructions to perform the method of any of claims 1-8.
11. A computer-readable storage medium, characterized in that a computer program is stored thereon; computer program to be executed by a processor to implement the method of any of claims 1-8.
CN202310969436.0A 2023-08-03 2023-08-03 Application software generation method, system, device and storage medium Active CN116680670B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310969436.0A CN116680670B (en) 2023-08-03 2023-08-03 Application software generation method, system, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310969436.0A CN116680670B (en) 2023-08-03 2023-08-03 Application software generation method, system, device and storage medium

Publications (2)

Publication Number Publication Date
CN116680670A true CN116680670A (en) 2023-09-01
CN116680670B CN116680670B (en) 2023-10-31

Family

ID=87787729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310969436.0A Active CN116680670B (en) 2023-08-03 2023-08-03 Application software generation method, system, device and storage medium

Country Status (1)

Country Link
CN (1) CN116680670B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6052780A (en) * 1996-09-12 2000-04-18 Open Security Solutions, Llc Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
CN106203006A (en) * 2016-08-31 2016-12-07 北京鼎源科技有限公司 Android application reinforcement means based on dex Yu so file Dynamic Execution
CN107169324A (en) * 2017-05-12 2017-09-15 北京理工大学 A kind of Android application reinforcement means based on dynamic encryption and decryption
CN110050258A (en) * 2016-12-09 2019-07-23 微软技术许可有限责任公司 The application program piracy of safe prefecture protection with automated modular function prevents

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6052780A (en) * 1996-09-12 2000-04-18 Open Security Solutions, Llc Computer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
CN106203006A (en) * 2016-08-31 2016-12-07 北京鼎源科技有限公司 Android application reinforcement means based on dex Yu so file Dynamic Execution
CN110050258A (en) * 2016-12-09 2019-07-23 微软技术许可有限责任公司 The application program piracy of safe prefecture protection with automated modular function prevents
CN107169324A (en) * 2017-05-12 2017-09-15 北京理工大学 A kind of Android application reinforcement means based on dynamic encryption and decryption

Also Published As

Publication number Publication date
CN116680670B (en) 2023-10-31

Similar Documents

Publication Publication Date Title
JP5990654B2 (en) Application code obfuscation device and method
Chudnov et al. Continuous formal verification of Amazon s2n
JP5460699B2 (en) System and method for generating a white-box implementation of a software application
CN102760219B (en) A kind of Android platform software protection system, method and apparatus
JP5996810B2 (en) Self-rewriting platform application code obfuscation device and method
CN107111713A (en) The automatic checking of software systems
CN106203006A (en) Android application reinforcement means based on dex Yu so file Dynamic Execution
US20160357530A1 (en) Method and apparatus for intermediate representation of applications
CN108229112A (en) A kind of operation method and device for protecting application program, application program
CN105022936A (en) Class file encryption and decryption method and class file encryption and decryption device
CN109787768B (en) Identity authentication configuration method and device and computer readable storage medium
US20180067777A1 (en) Application protection method, server, and terminal
CN111159053A (en) Test method, test device and storage medium
Elrom et al. Eos. io wallets and smart contracts
CN112153012B (en) Multi-terminal contact access method, device and storage medium
CN116680670B (en) Application software generation method, system, device and storage medium
CN107092517B (en) SDK tool package generation method and device
Vanspauwen et al. Verifying protocol implementations by augmenting existing cryptographic libraries with specifications
KR101979320B1 (en) System and Method for automatic generation and execution of encryption SQL statements using meta-information and enterprise framework
CN102915424B (en) The method and system in the regulation region in process electronic document
CN115510402A (en) License control method and system based on encryption and code confusion
US20030182596A1 (en) Method and system for isolating exception related errors in java JVM
CN114039743A (en) Data encryption method, device, storage medium and terminal
CN112001715B (en) Application method and system of distributed front-end tool
US6931634B2 (en) Encrypted compiler

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant