CN104504313A - Confidential treatment method and device for code - Google Patents

Confidential treatment method and device for code Download PDF

Info

Publication number
CN104504313A
CN104504313A CN201410856916.7A CN201410856916A CN104504313A CN 104504313 A CN104504313 A CN 104504313A CN 201410856916 A CN201410856916 A CN 201410856916A CN 104504313 A CN104504313 A CN 104504313A
Authority
CN
China
Prior art keywords
file
code
carried out
packaging ciphering
hash operations
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410856916.7A
Other languages
Chinese (zh)
Inventor
鄢丙荣
夏贤卯
孙啸
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Changyou Tianxia Network Technologies Co Ltd
Original Assignee
Beijing Changyou Tianxia Network Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Changyou Tianxia Network Technologies Co Ltd filed Critical Beijing Changyou Tianxia Network Technologies Co Ltd
Priority to CN201410856916.7A priority Critical patent/CN104504313A/en
Publication of CN104504313A publication Critical patent/CN104504313A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1012Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to domains
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/101Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities
    • G06F21/1015Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM] by binding digital rights to specific entities to users

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides confidential treatment method and device for a code. The method comprises the steps of performing hash algorithm for variable names in the code of a js file according to the action scope of the js file to obtain the hash result of the js file; packaging and encrypting functions in the has result to obtain a packaged and encrypted character string. According to the technical scheme, the method has the advantages that the blended hash results are packaged and encrypted, so that the readability of the code of the js file can be reduced, the difficulty of a pirate at cracking and understanding of the js file is increased, and as a result, the copyright of the js file can be protected.

Description

A kind of method and device code being carried out to confidential treatment
Technical field
The present invention relates to code security technical field, particularly relate to a kind of method and the device that code are carried out to confidential treatment.
Background technology
Along with the appearance that a large amount of HTML5 applies; the importance of Javascript in webpage (Web) application is more and more higher; the complicacy of Javascript (js) code, function and technology content are also more and more higher, also more and more urgent to the needs of Javascript code protection.But because javascript code is expressly to perform, therefore prior art can not carry out sufficient copyright protection to js file.
Summary of the invention
In view of this, the invention provides a kind of method and the device that code are carried out to confidential treatment, strengthen the difficulty cracking and understand js code further.
According to the first aspect of the embodiment of the present invention, a kind of method of code being carried out to confidential treatment is provided, comprises:
Variable name in the code of js file is carried out hash operations according to the action scope of described js file, obtains the hashed result of described js file;
Function in described hashed result is carried out packaging ciphering, obtains the character string after packaging ciphering.
According to the second aspect of the embodiment of the present invention, a kind of device code being carried out to confidential treatment is provided, comprises:
Hash operations module, for the variable name in the code of js file is carried out hash operations according to the action scope of described js file, obtains the hashed result of described js file;
Packaging ciphering module, carries out packaging ciphering for the function in the described hashed result that described hash operations module calculated, obtains the character string after packaging ciphering.
From above technical scheme; the present invention is by carrying out hash operations by the variable name of js file; thus reach the object that the code of js file is obscured; by carrying out packaging ciphering to the hashed result after obscuring; reduce the readability of the code of js file; increase the difficulty that bootlegger cracks js file and understands, furthermore achieved that the copyright protection to js file.
Should be understood that, it is only exemplary and explanatory that above general description and details hereinafter describe, and can not limit the embodiment of the present invention.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the method for in one embodiment of the present invention, code being carried out to confidential treatment;
Fig. 2 is the process flow diagram of the method for in another embodiment of the present invention, code being carried out to confidential treatment;
Fig. 3 is the structural drawing of server in one embodiment of the present invention;
Fig. 4 is the building-block of logic of the device in one embodiment of the present invention, code being carried out to confidential treatment;
Fig. 5 is the building-block of logic of the device in another embodiment of the present invention, code being carried out to confidential treatment.
Embodiment
Here will be described exemplary embodiment in detail, its sample table shows in the accompanying drawings.When description below relates to accompanying drawing, unless otherwise indicated, the same numbers in different accompanying drawing represents same or analogous key element.Embodiment described in following exemplary embodiment does not represent all embodiments consistent with the application.On the contrary, they only with as in appended claims describe in detail, the example of apparatus and method that some aspects of the application are consistent.
Only for describing the object of specific embodiment at term used in this application, and not intended to be limiting the application." one ", " described " and " being somebody's turn to do " of the singulative used in the application and appended claims is also intended to comprise most form, unless context clearly represents other implications.It is also understood that term "and/or" used herein refer to and comprise one or more project of listing be associated any or all may combine.
Term first, second, third, etc. may be adopted although should be appreciated that to describe various information in the application, these information should not be limited to these terms.These terms are only used for the information of same type to be distinguished from each other out.Such as, when not departing from the application's scope, the first information also can be called as the second information, and similarly, the second information also can be called as the first information.Depend on linguistic context, word as used in this " if " can be construed as into " ... time " or " when ... time " or " in response to determining ".
The application is by carrying out hash operations by the variable name of js file; thus reach the object that the code of js file is obscured; by carrying out packaging ciphering to the hashed result after obscuring; reduce the readability of the code of js file; increase the difficulty that bootlegger cracks js file and understands, thus achieve the copyright protection to js file.For being further described the application, provide the following example:
Please refer to Fig. 1, Fig. 1 is the process flow diagram of the method for in one embodiment of the present invention, code being carried out to confidential treatment, can be applied on server, comprise the steps:
Step 101, carries out hash operations by the variable name in the code of js file according to the action scope of js file, obtains the hashed result of js file.
Step 102, carries out packaging ciphering by the function in hashed result, obtains the character string after packaging ciphering.
In a step 101, the action scope of js file take function as boundary, and different functions has relatively independent action scope.Function inside can be stated and be accessed global variable, also can var (use var key word, the parameter of function is also local variable), but function external cannot access inner local variable.How by the action scope of js file, hash is carried out to code in embodiment for a more clear understanding of the present invention, carries out exemplary illustration with following code:
(function(){}
var car="hello";
function add(num1,num2){
return num1+num2;
})();
Above-mentioned code carries out the code after hash operations:
(function(){}
var a="hello";
function d(a,b){
return a+b;
})();
Wherein, in code after hash operations, first corresponding car of variable a, second corresponding num1 of variable a, therefore two places of above-mentioned action scope are present in the code of a variable after above-mentioned hash operations, a variable in add function covers a variable of outside, is therefore under two diverse values are present in different action scopes separately.In addition, because add function name has been replaced by d, the action scope due to add is present in closure action scope above, although function name is replaced, does not affect the normal logic of code, function performance and semantic not change.Therefore after above-mentioned hash operations, reach the object that js code is obscured, the readability of js code is reduced greatly, add the cost understood and reduce js code.
In a step 102, in one embodiment, the function in hashed result is carried out packaging ciphering and can adopt pack function and eval function.Eval function and the concrete function of eval function realize the embodiment of the present invention and do not describe in detail.
The embodiment of the present invention by the code after the packing of eval function encrypting is:
eval(function(p,a,c,k,e,r){e=String;if('0'.replace(0,e)==0){while(c--)r[e(c)]=k[c];k=[function(e){return
r[e]||e}];e=function(){return'[124-6]'};c=1};while(c--)if(k[c])p=p.replace(newRegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('24=4||[];(function(){2
1=5.createElement("6");1.src="//1.baidu.com/1.js?601fa469903febe1abec3479027feb76";2
s=5.getElementsByTagName("6")[0];s.parentNode.insertBefore(1,s)})();',[],7,'|hm|var||_hmt|document|script'.split('|'),0,{}))。
From step 101 to step 102; by the variable name of js file is carried out hash operations; thus reach the object that the code of js file is obscured; by carrying out packaging ciphering to the hashed result after obscuring; reduce the readability of the code of js file; increase the difficulty that bootlegger cracks js file and understands, thus achieve the copyright protection to js file.
Refer to Fig. 2, Fig. 2 is the process flow diagram of the method for in another embodiment of the present invention, code being carried out to confidential treatment, and the present embodiment can be applied on the server, comprises the steps:
Step 201, carries out compression pre-service to the code of js file.
Step 202, determines the letter hass table variable name in the code of js file being carried out to hash operations.
Step 203, the variable name in the code of js file is carried out hash operations by the action scope according to letter hass table and js file, obtains the hashed result of js file.
Step 204, carries out packaging ciphering by the function in hashed result, obtains the character string after packaging ciphering.
Step 205, determines the mapping relations table preset of the character string after packaging ciphering.
Step 206, obscures the character string after packaging ciphering according to mapping relations table.
Step 207, is stored in the ASCII respective value of the character string after packaging ciphering in picture file in the mode of pixel value.
In above-mentioned steps 201, can by the space in js file, newline, annotation are identified and deleted, thus the form of the code of js file can be made more compact, save the storage space of js file further.
In above-mentioned steps 202 and step 203, in one embodiment, letter hass table can be generated by hash function, by letter hass table, variable name in code or method name are replaced, thus make js code be not easy to be understood, due to the nonreversibility of hash, the decompiling of variable in js code therefore effectively can be prevented by step 202 and step 203.Concrete how the variable name in the code of js file carried out hash operations according to the action scope of letter hass table and js file, refer to the description of above-mentioned steps 101, be not described in detail in this.
In above-mentioned steps 204, can by eval method to js code packaging ciphering.
Such as following js code:
var_hmt=_hmt||[];
(function(){
var hm=document.createElement("script");
hm.src="//hm.baidu.com/hm.js?601fa469903febe1abec3479027feb76";
var s=document.getElementsByTagName("script")[0];
s.parentNode.insertBefore(hm,s);
})();
Js code after step 204 packaging ciphering is:
eval(function(p,a,c,k,e,r){e=String;if('0'.replace(0,e)==0){while(c--)r[e(c)]=k[c];k=[function(e){return
r[e]||e}];e=function(){return'[124-6]'};c=1};while(c--)if(k[c])p=p.replace(newRegExp('\\b'+e(c)+'\\b','g'),k[c]);return p}('24=4||[];(function(){2
1=5.createElement("6");1.src="//1.baidu.com/1.js?601fa469903febe1abec3479027feb76";2
s=5.getElementsByTagName("6")[0];s.parentNode.insertBefore(1,s)})();',[],7,'|hm|var||_hmt|document|script'.split('|'),0,{}))。
In above-mentioned steps 205 and step 206, by the mapping relations table preset, the character string after packaging ciphering is obscured, the code after encryption can be made more not easily to be cracked, when needing to identify the code after step 206 is obscured, can according to the mapping relations table preset by the code reverse after packaging ciphering, have the mapping relations table of reversible relation by this, what can increase js code further cracks difficulty.In one embodiment, the mapping relations table preset such as, by corresponding for character a character m (a->m), " corresponding % ("->%) etc., as long as can by the mutual corresponding relation between mapping relations table explicit character.
In above-mentioned steps 207, because js code is character, and each character has an ASCII respective value, the scope of ASCII respective value is 0 to 255, therefore, is kept in a pictures by the js code after above-mentioned steps 206 can process by this step in the mode of pixel value, when needs run js file, by each pixel value on traversal picture, particularly, can by the js code of charCodeAt function acquisition place after the process of the above-mentioned pixel value be kept in picture.
From step 201 to step 207; the present embodiment is except having on the basis of above-mentioned Advantageous Effects embodiment illustrated in fig. 1; also obscured to the character string after packaging ciphering by Quadratic Map relation (default mapping relations table); the code after encryption can be made more not easily to be cracked; by js code is preserved in the mode of picture; conceal js file; increase the difficulty that bootlegger obtains js file further, thus achieve the copyright protection to js file.
When needing the js file after running through said method process, can by the js file of reversible process operation after said method process, such as, by UNPACK function, the js code after pack function packaging ciphering is decrypted, can be included in the file of ciphered compressed and carries out decoding operation.The code of string representation directly can be run by eval function.Due to environment when eval function has become js running paper, the logic therefore for hiding js code provides host environment.
Corresponding to the above-mentioned method of code being carried out to confidential treatment, the application also proposed the structural drawing of the server shown in Fig. 3.Please refer to Fig. 3, at hardware view, this server comprises processor, external interface, internal memory and nonvolatile memory, certainly also may comprise the hardware required for other business.Master chip reads corresponding computer program and then runs in internal memory from nonvolatile memory, and logic level is formed device code being carried out to confidential treatment.Certainly, except software realization mode, the application does not get rid of other implementations, mode of such as logical device or software and hardware combining etc., that is the executive agent of following treatment scheme is not limited to each logical block, also can be hardware or logical device.
Please refer to Fig. 4, Fig. 4 is the building-block of logic of the device in one embodiment of the present invention, code being carried out to confidential treatment; The present embodiment can be applied on the server, and what the embodiment of the present invention provided can comprise the device that code carries out confidential treatment:
Hash operations module 41, for the variable name in the code of js file is carried out hash operations according to the action scope of js file, obtains the hashed result of js file;
Packaging ciphering module 42, carries out packaging ciphering for the function in the hashed result that hash operations module 41 calculated, obtains the character string after packaging ciphering.
The variable name of js file is carried out hash operations by hash operations module 41 by the present invention; thus reach the object that the code of js file is obscured; by packaging ciphering module 42, packaging ciphering is carried out to the hashed result after obscuring; reduce the readability of the code of js file; increase the difficulty that bootlegger cracks js file and understands, thus achieve the copyright protection to js file.
Please refer to Fig. 5, Fig. 5 is the building-block of logic of the device in another embodiment of the present invention, code being carried out to confidential treatment; The present embodiment can be applied on the server, and on above-mentioned basis embodiment illustrated in fig. 4, device also can comprise:
Pretreatment module 43, before the variable name in the code of js file being carried out hash operations according to the action scope of js file in hash operations module 41, carries out compression pre-service to the code of js file.
In one embodiment, hash operations module 41 can comprise:
Determining unit 411, for determining the letter hass table variable name in the code of js file being carried out to hash operations;
Hash operations unit 412, the variable name in the code of js file is carried out hash operations by the action scope for the letter hass table determined according to determining unit 411 and js file, obtains the hashed result of js file.
In one embodiment, device also can comprise:
Memory module 44, for the function in hashed result being carried out packaging ciphering in packaging ciphering module 42, after obtaining the character string after packaging ciphering, is stored in the ASCII respective value of the character string after packaging ciphering in picture file in the mode of pixel value.
In one embodiment, device also can comprise:
Determination module 45, for determining the mapping relations table preset of the character string after packaging ciphering module 42 packaging ciphering;
Obscure module 46, for the mapping relations table determined according to determination module 45, the character string after packaging ciphering is obscured.
By describing above and can finding out; method and device code being carried out to confidential treatment provided by the invention; by the variable name of js file is carried out hash operations; thus reach the object that the code of js file is obscured; by carrying out packaging ciphering to the hashed result after obscuring; reduce the readability of the code of js file, increase the difficulty that bootlegger cracks js file and understands, thus achieve the copyright protection to js file.
The foregoing is only preferred embodiment of the present invention, not in order to limit the present invention, within the spirit and principles in the present invention all, any amendment made, equivalent replacement, improvement etc., all should be included within the scope of protection of the invention.

Claims (10)

1. code is carried out to a method for confidential treatment, on the server, it is characterized in that, described method comprises in application:
Variable name in the code of js file is carried out hash operations according to the action scope of described js file, obtains the hashed result of described js file;
Function in described hashed result is carried out packaging ciphering, obtains the character string after packaging ciphering.
2. method according to claim 1, is characterized in that, described variable name in the code of js file carried out the step of hash operations according to the action scope of described js file before, described method also comprises:
Compression pre-service is carried out to the code of described js file.
3. method according to claim 1, is characterized in that, described variable name in the code of js file is carried out hash operations according to the action scope of described js file, and the step obtaining the hashed result of described js file comprises:
Determine the letter hass table variable name in the code of js file being carried out to hash operations;
Variable name in the code of described js file is carried out hash operations by the action scope according to described letter hass table and described js file, obtains the hashed result of described js file.
4. method according to claim 1, is characterized in that, described function in described hashed result is carried out packaging ciphering, and after obtaining the step of the character string after packaging ciphering, described method also comprises:
The ASCII respective value of the character string after described packaging ciphering is stored in picture file in the mode of pixel value.
5., according to the arbitrary described method of claim 1-4, it is characterized in that, described, function in described hashed result is carried out packaging ciphering, after obtaining the step of the character string after packaging ciphering, described method also comprises:
Determine the mapping relations table preset of the character string after described packaging ciphering;
According to described mapping relations table, the character string after described packaging ciphering is obscured.
6. code is carried out to a device for confidential treatment, on the server, it is characterized in that, described device comprises in application:
Hash operations module, for the variable name in the code of js file is carried out hash operations according to the action scope of described js file, obtains the hashed result of described js file;
Packaging ciphering module, carries out packaging ciphering for the function in the described hashed result that described hash operations module calculated, obtains the character string after packaging ciphering.
7. device according to claim 6, is characterized in that, described device also comprises:
Pretreatment module, before the variable name in the code of described js file being carried out hash operations according to the action scope of described js file in described hash operations module, carries out compression pre-service to the code of described js file.
8. device according to claim 6, is characterized in that, described hash operations module comprises:
Determining unit, for determining the letter hass table variable name in the code of js file being carried out to hash operations;
Hash operations unit, the variable name in the code of described js file is carried out hash operations by the action scope for the described letter hass table determined according to described determining unit and described js file, obtains the hashed result of described js file.
9. device according to claim 6, is characterized in that, described device also comprises:
Memory module, for the function in described hashed result being carried out packaging ciphering in described packaging ciphering module, after obtaining the character string after packaging ciphering, the ASCII respective value of the character string after described packaging ciphering is stored in picture file in the mode of pixel value.
10., according to the arbitrary described device of claim 6-9, it is characterized in that, described device also comprises:
Determination module, for determining the mapping relations table preset of the character string after described packaging ciphering module packaging ciphering;
Obscure module, for the described mapping relations table determined according to described determination module, the character string after described packaging ciphering is obscured.
CN201410856916.7A 2014-12-31 2014-12-31 Confidential treatment method and device for code Pending CN104504313A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410856916.7A CN104504313A (en) 2014-12-31 2014-12-31 Confidential treatment method and device for code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410856916.7A CN104504313A (en) 2014-12-31 2014-12-31 Confidential treatment method and device for code

Publications (1)

Publication Number Publication Date
CN104504313A true CN104504313A (en) 2015-04-08

Family

ID=52945710

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410856916.7A Pending CN104504313A (en) 2014-12-31 2014-12-31 Confidential treatment method and device for code

Country Status (1)

Country Link
CN (1) CN104504313A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122169A (en) * 2017-03-21 2017-09-01 武汉斗鱼网络科技有限公司 A kind of method and device of Flash function encryptings
CN107766702A (en) * 2017-05-10 2018-03-06 平安科技(深圳)有限公司 Code obfuscation method, apparatus and computer-readable recording medium
CN107885981A (en) * 2017-11-09 2018-04-06 网易(杭州)网络有限公司 Compile result processing method, device, storage medium, processor and compiler
CN109213944A (en) * 2017-07-07 2019-01-15 北京小米移动软件有限公司 Using exchange method and device
CN109918917A (en) * 2019-03-19 2019-06-21 北京智游网安科技有限公司 Method, computer equipment and the storage medium for preventing H5 source code from leaking
CN110147656A (en) * 2019-05-10 2019-08-20 重庆迅燕科技有限公司 The code encryption and bottom of a kind of Node.js decrypt method when running
CN110659459A (en) * 2019-09-27 2020-01-07 北京金山云网络技术有限公司 Software code processing method and device, electronic equipment and storage medium
US10990461B2 (en) 2017-06-14 2021-04-27 Beijing Xiaomi Mobile Software Co., Ltd. Application interaction method, interaction method and apparatus

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807239A (en) * 2010-03-29 2010-08-18 山东高效能服务器和存储研究院 Method for preventing source code from decompiling
CN101950344A (en) * 2010-09-21 2011-01-19 广东欧珀移动通信有限公司 Encryption and decryption methods of embedded software program
CN102779029A (en) * 2011-05-10 2012-11-14 北京磊友信息科技有限公司 Method and device for scrambling JavaScript code
CN103150493A (en) * 2013-02-28 2013-06-12 浙江中控技术股份有限公司 JavaScript code obfuscation method and device
CN103377326A (en) * 2012-04-13 2013-10-30 腾讯科技(北京)有限公司 Confusion encrypting method and device for dynamic webpage program codes

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101807239A (en) * 2010-03-29 2010-08-18 山东高效能服务器和存储研究院 Method for preventing source code from decompiling
CN101950344A (en) * 2010-09-21 2011-01-19 广东欧珀移动通信有限公司 Encryption and decryption methods of embedded software program
CN102779029A (en) * 2011-05-10 2012-11-14 北京磊友信息科技有限公司 Method and device for scrambling JavaScript code
CN103377326A (en) * 2012-04-13 2013-10-30 腾讯科技(北京)有限公司 Confusion encrypting method and device for dynamic webpage program codes
CN103150493A (en) * 2013-02-28 2013-06-12 浙江中控技术股份有限公司 JavaScript code obfuscation method and device

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
CSDN博客: "《http://m.blog.csdn.net/article/details?id=4752743》", 31 October 2009 *
冼泽华等: "《绿色软件开发 》", 31 March 2014, 清华大学出版社 *
外刊IT评论: "《http://www.vaikan.com/a-technique-for-hiding-your-javascript-code/》", 26 August 2012 *
戚文静 等: "《网络安全原理与应用 第2版》", 28 February 2013, 中国水利水电出版社 *
王集鹄: "《http://blog.csdn.net/zswang/article/details/7061560》", 11 December 2011 *
田庚林等: "《计算机网络安全与管理 》", 31 October 2013, 清华大学出版社 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107122169A (en) * 2017-03-21 2017-09-01 武汉斗鱼网络科技有限公司 A kind of method and device of Flash function encryptings
CN107766702A (en) * 2017-05-10 2018-03-06 平安科技(深圳)有限公司 Code obfuscation method, apparatus and computer-readable recording medium
US10990461B2 (en) 2017-06-14 2021-04-27 Beijing Xiaomi Mobile Software Co., Ltd. Application interaction method, interaction method and apparatus
US11360834B2 (en) 2017-06-14 2022-06-14 Beijing Xiaomi Mobile Software Co., Ltd. Application interaction method and apparatus
CN109213944A (en) * 2017-07-07 2019-01-15 北京小米移动软件有限公司 Using exchange method and device
CN109213944B (en) * 2017-07-07 2020-10-30 北京小米移动软件有限公司 Application interaction method and device
CN107885981A (en) * 2017-11-09 2018-04-06 网易(杭州)网络有限公司 Compile result processing method, device, storage medium, processor and compiler
CN109918917A (en) * 2019-03-19 2019-06-21 北京智游网安科技有限公司 Method, computer equipment and the storage medium for preventing H5 source code from leaking
CN109918917B (en) * 2019-03-19 2021-06-08 北京智游网安科技有限公司 Method, computer device and storage medium for preventing leakage of H5 source code
CN110147656A (en) * 2019-05-10 2019-08-20 重庆迅燕科技有限公司 The code encryption and bottom of a kind of Node.js decrypt method when running
CN110147656B (en) * 2019-05-10 2020-10-30 重庆迅燕科技有限公司 Js code encryption and bottom layer operation decryption method
CN110659459A (en) * 2019-09-27 2020-01-07 北京金山云网络技术有限公司 Software code processing method and device, electronic equipment and storage medium
CN110659459B (en) * 2019-09-27 2021-07-20 北京金山云网络技术有限公司 Software code processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104504313A (en) Confidential treatment method and device for code
US9930014B2 (en) Methods and apparatus for key delivery in HTTP live streaming
US8806193B2 (en) Methods and apparatus for integrating digital rights management (DRM) systems with native HTTP live streaming
CN107004070B (en) Media decoding control with hardware protected digital rights management
TWI598765B (en) Data protection methods and devices
US10346318B2 (en) Multi-stage memory integrity method and apparatus
US9230111B1 (en) Systems and methods for protecting document files from macro threats
US20170116410A1 (en) Software protection
CN104318135B (en) A kind of Java code Safety actuality loading method based on credible performing environment
WO2016078130A1 (en) Dynamic loading method for preventing reverse of apk file
CN103136458B (en) A kind of (SuSE) Linux OS dynamic base code protection method and device thereof
CN102542212B (en) Text information hiding method and device
CN107533613B (en) Storage medium product, cloud printing system and PDF file access method
WO2019236638A1 (en) Method and system for data storage and retrieval
US20090165134A1 (en) Look ahead of links/alter links
WO2021027367A1 (en) Code obfuscation method and apparatus, computer device, and storage medium
WO2016037488A1 (en) Method and device for protecting sensitive information
CN104834835A (en) Universal digital rights protection method under Windows platform
CN107609394A (en) Tamper resistant method, storage device and the device of Android installation kits
US9268713B2 (en) Methods, systems and apparatus for managing data entries on a database
CN108229190B (en) Transparent encryption and decryption control method, device, program, storage medium and electronic equipment
CN104951705A (en) Android application data encryption packaging method based on operating system interface rewriting
CN108076050B (en) Method and system for protecting JavaScript source code in ciphertext sealing box mode
CN104866740A (en) Static analysis preventing method and device for files
US20220253510A1 (en) Web Browser Extension Script Obfuscation System

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20150408

RJ01 Rejection of invention patent application after publication