CN107480477A - Mobile terminal product copy-right protection method based on html5 technologies - Google Patents
Mobile terminal product copy-right protection method based on html5 technologies Download PDFInfo
- Publication number
- CN107480477A CN107480477A CN201710601162.4A CN201710601162A CN107480477A CN 107480477 A CN107480477 A CN 107480477A CN 201710601162 A CN201710601162 A CN 201710601162A CN 107480477 A CN107480477 A CN 107480477A
- Authority
- CN
- China
- Prior art keywords
- key
- files
- encryption
- html5
- mobile terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000005516 engineering process Methods 0.000 title claims abstract description 20
- 238000007906 compression Methods 0.000 claims abstract description 21
- 230000006835 compression Effects 0.000 claims abstract description 21
- 238000013515 script Methods 0.000 claims abstract description 14
- 238000004422 calculation algorithm Methods 0.000 claims abstract description 10
- 230000010354 integration Effects 0.000 claims abstract description 4
- 238000005457 optimization Methods 0.000 claims description 6
- 238000000605 extraction Methods 0.000 claims description 3
- 230000003014 reinforcing effect Effects 0.000 abstract description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 239000000203 mixture Substances 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005056 compaction Methods 0.000 description 1
- 238000009472 formulation Methods 0.000 description 1
- 238000007514 turning Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/14—Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Abstract
The invention provides a kind of mobile terminal product copy-right protection method based on html5 technologies, including following steps:A. H5 file source codes are read, it is compressed and obscured;B. the H5 files after compression are encrypted;C. key is carried out to encryption key to hide;D. decipherment algorithm is compressed and obscured;E. decryption logic script is called, ensures that the H5 files after compression encryption can be normally resolved execution;F. to reinforce file handle, by compress and encryption after H5 file contents, obscure after decipherment algorithm and decryption script three carry out integration processing, the H5 files after being reinforced.The present invention farthest improves the security and loading velocity of H5 files after reinforcing.
Description
Technical field
The present invention relates to a kind of copy-right protection method, and in particular to a kind of mobile terminal product version based on html5 technologies
Guard method is weighed, belongs to intelligent terminal security fields.
Background technology
With the formulation of html5 standards, market is ignited again to html5 enthusiasm, and existing various piracies are asked therewith
Topic and code security problem also receive much concern always, or even a huge bottleneck as obstruction industry development.When developer is long
Between work hard complete product may only need several days time cans to be cracked completely, enterprise and developer are caused very big
Loss.Therefore, it is extremely urgent that these safety problems are effectively solved.From html5 trivial games, the big page turnings of html5, stood to html5
Point, html5 marketing, html5 application are increasingly extensive.Everybody is while html5 is attracted attention, the problem of piracy of various product
Also received much concern with code security problem.
How mobile terminal product copyright based on html5 technology is protectedHow to prevent web technologies code from not copied by people
Attack duplicationDeveloper generally will recognize that the mode of encrypting web solves, but web page code is limited to the principle of browser resolves,
It code compaction and can only obscure, encryption truly can not be realized.Therefore, the present invention proposes a kind of html5 security hardening
Scheme, it can effectively prevent source code from checking, crack, change.
The content of the invention
It is an object of the invention to for the mobile terminal product copyright protection presence based on html5 technologies in the prior art
The problem of, there is provided a kind of mobile terminal product copy-right protection method based on html5 technologies, it is therefore intended that by encryption, compression, mix
The three technology that confuses be combined with each other, and providing more secure safety for client's html5 files supports, prevents source code from being checked, broken
Solution, modification.At utmost improve the security and loading velocity of html5 files after reinforcing.
What the present invention was realized in:
A kind of mobile terminal product copy-right protection method based on html5 technologies, including following steps:
A. html5 (H5 can be abbreviated as) file source code is read, it is compressed and obscured;
B. the html5 files after compression are encrypted;
C. key is carried out to encryption key to hide;
D. decipherment algorithm is compressed and obscured;
E. decryption logic script is called, ensures that the html5 files after compression encryption can be normally resolved execution;
F. to reinforce file handle, by compress and encryption after html5 file contents, obscure after decryption calculate
Method and decryption script three carry out integration processing, the html5 files after being reinforced.
Further, in step a, the compression of use is obscured method and specifically included:Remove annotation, remove extra space,
Trickle optimization and identifier are replaced.
Further, in step b, the html5 files after obscuring compression are encrypted, AES bag employed in it
Include the Standard Encryption such as AES, DES mode or any one known encryption method.
Further, in step c, the hiding step of key includes:
C1. the encryption key of the html5 files after being obscured using key a compression is encrypted again, close after being encrypted
The ciphertext b of key;
C2. the key a of encryption key and encrypted secret key ciphertext b are embedded into the html5 files after encryption, obtained
New html5 files;
Further, in step d, compression used by obscuring is compressed to decipherment algorithm and obscures method and specifically includes:
Remove annotation, remove extra space, trickle optimization and identifier replacement.
Further, in step e, the major function of decryption logic script includes:
E1. the key a of key and the ciphertext b of encrypted secret key of extraction encryption html5 files;
E2. obtain reinforce html5 files key key and encryption after html5 file contents;
E3. html5 scripts are performed using eval function decryptions.
The beneficial effects of the invention are as follows:On the one hand, treating the html5 files of reinforcing, to have used compression to obscure encryption triple anti-
Shield measure, and secondary encryption has been carried out to encryption key, it can effectively prevent source code from being checked, cracked, changed;The opposing party
Face, dynamic decryption perform script, when browse request passes through the html5 files of encryption, decryption logic pin are carried out in browser end
This automatic performs realizes decryption.Both the normal operation of former web page files had been ensure that, had been ensured again when hacker checks page source code,
It can only see the random indecipherable character string of a pile.Farthest improve the security of html5 files after reinforcing and add
Carry speed.
Brief description of the drawings
Fig. 1 is the flow chart of the mobile terminal product copy-right protection method embodiment based on html5 technologies
Embodiment
The present invention is further illustrated with specific embodiment below in conjunction with the accompanying drawings.
As shown in Figure 1, a kind of mobile terminal product copy-right protection method based on html5 technologies of the invention include with
Lower step:
A.html5 files source code obtains parsing, and it is compressed and obscured;
B. the html5 files after obscuring compression are encrypted;
C. key is carried out to encryption key to hide;
D. decipherment algorithm is compressed and obscured;
E. decryption logic script is called, ensures that the html5 files after compression encryption can be normally resolved execution;
F. reinforce file process, by compress and encryption after html5 file contents, obscure after decipherment algorithm conciliate
Close script three carries out integration processing, the html5 files after being reinforced.
In order to preferably illustrate and understand the thought of the present invention, one is more entered to the solution of the present invention with reference to embodiment
The description of step:
As shown in figure 1, the mobile terminal product copy-right protection method based on html5 technologies in this example includes following step
Suddenly:
1st, read html5 files using java applet to obtain being compressed after source string obscuring processing, used pressure
Contracting is obscured method and specifically included:Remove annotation, remove extra space, trickle optimization and identifier replacement;
2nd, the html5 files after compression are encrypted, the encryption of the html5 files after being obscured using key a compression
Key is encrypted again, obtains the ciphertext b of encrypted secret key;
3rd, the key a of encryption key and encrypted secret key ciphertext b are embedded into the html5 files after encryption, obtained
New html5 files;
4th, decipherment algorithm is compressed and obscured, used compression is obscured method and specifically included:Remove annotation, remove volume
Outer space, trickle optimization and identifier is replaced;
5th, the key a of key and the ciphertext b of encrypted secret key of extraction encryption html5 files;
6th, obtain reinforce html5 files key key and encryption after html5 file contents;
7th, html5 scripts are performed using eval function decryptions.
Although reference be made herein to invention has been described for explanatory embodiment of the invention, and above-described embodiment is only this hair
Bright preferable embodiment, embodiments of the present invention are simultaneously not restricted to the described embodiments, it should be appreciated that people in the art
Member can be designed that a lot of other modifications and embodiment, and these modifications and embodiment will fall in principle disclosed in the present application
Within scope and spirit.
Claims (6)
1. a kind of mobile terminal product copy-right protection method based on html5 technologies, it is characterised in that including following steps:
A. H5 file source codes are read, it is compressed and obscured;
B. the H5 files after compression are encrypted;
C. key is carried out to encryption key to hide;
D. decipherment algorithm is compressed and obscured;
E. decryption logic script is called, ensures that the H5 files after compression encryption can be normally resolved execution;
F. to reinforce file handle, by compress and encryption after H5 file contents, obscure after decipherment algorithm conciliate
Close script three carries out integration processing, the H5 files after being reinforced.
2. the mobile terminal product copy-right protection method based on html5 technologies according to claim 1, it is characterised in that:
In step a, the compression of use is obscured method and specifically included:Remove annotation, remove extra space, trickle optimization and mark
Know symbol to replace.
3. the mobile terminal product copy-right protection method based on html5 technologies according to claim 1, it is characterised in that:
In step b, the H5 files after obscuring compression are encrypted, and AES includes AES employed in it, DES standard adds
Close mode or any one known encryption method.
4. the mobile terminal product copy-right protection method based on html5 technologies according to claim 1, it is characterised in that:
In step c, the hiding step of key includes:
C1. the encryption key of the H5 files after being obscured using key a compression is encrypted again, obtains the ciphertext of encrypted secret key
b;
C2. the key a of encryption key and encrypted secret key ciphertext b are embedded into the H5 files after encryption, obtain new H5
File.
5. the mobile terminal product copy-right protection method based on html5 technologies according to claim 1, it is characterised in that:
In step d, compression used by obscuring is compressed to decipherment algorithm and obscures method and specifically includes:Remove annotation, remove
Extra space, trickle optimization and identifier is replaced.
6. the mobile terminal product copy-right protection method based on html5 technologies according to claim 4, it is characterised in that:
In step e, the function of decryption logic script includes:
E1. the key a of key and the ciphertext b of encrypted secret key of extraction encryption H5 files;
E2. obtain reinforce H5 files key key and encryption after H5 file contents;
E3. H5 scripts are performed using eval function decryptions.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710601162.4A CN107480477A (en) | 2017-07-21 | 2017-07-21 | Mobile terminal product copy-right protection method based on html5 technologies |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710601162.4A CN107480477A (en) | 2017-07-21 | 2017-07-21 | Mobile terminal product copy-right protection method based on html5 technologies |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107480477A true CN107480477A (en) | 2017-12-15 |
Family
ID=60595285
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710601162.4A Pending CN107480477A (en) | 2017-07-21 | 2017-07-21 | Mobile terminal product copy-right protection method based on html5 technologies |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107480477A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145619A (en) * | 2018-08-13 | 2019-01-04 | 中金金融认证中心有限公司 | A kind of Android application resource reinforcement means and system |
CN109450881A (en) * | 2018-10-26 | 2019-03-08 | 天津海泰方圆科技有限公司 | A kind of data transmission system, method and device |
CN109918917A (en) * | 2019-03-19 | 2019-06-21 | 北京智游网安科技有限公司 | Method, computer equipment and the storage medium for preventing H5 source code from leaking |
CN110069904A (en) * | 2019-03-22 | 2019-07-30 | 平安普惠企业管理有限公司 | H5 resource wraps transmission method, H5 resource packet method for down loading and relevant device |
CN110135133A (en) * | 2019-04-19 | 2019-08-16 | 肖银皓 | A kind of integrated source code of compression towards microcontroller obscures method and system |
CN111159662A (en) * | 2019-12-25 | 2020-05-15 | 郑州阿帕斯数云信息科技有限公司 | Data processing method and device |
CN111290781A (en) * | 2020-03-10 | 2020-06-16 | 网易(杭州)网络有限公司 | NPK mode packing script, and method and device for running NPK format script file |
CN111314052A (en) * | 2018-12-12 | 2020-06-19 | 上海领甲数据科技有限公司 | Data encryption and decryption method based on uniformly distributed symmetric compression algorithm |
CN113296773A (en) * | 2021-05-28 | 2021-08-24 | 北京思特奇信息技术股份有限公司 | Copyright marking method and system for cascading style sheet |
CN113360181A (en) * | 2021-05-20 | 2021-09-07 | 武汉虹旭信息技术有限责任公司 | Code calling method and device for industrial Internet |
WO2021218173A1 (en) * | 2020-04-30 | 2021-11-04 | 平安科技(深圳)有限公司 | Source code reinforcement method and apparatus, and computer device and storage medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101635622A (en) * | 2008-07-24 | 2010-01-27 | 阿里巴巴集团控股有限公司 | Method, system and equipment for encrypting and decrypting web page |
CN103150493A (en) * | 2013-02-28 | 2013-06-12 | 浙江中控技术股份有限公司 | JavaScript code obfuscation method and device |
CN103377326A (en) * | 2012-04-13 | 2013-10-30 | 腾讯科技(北京)有限公司 | Confusion encrypting method and device for dynamic webpage program codes |
US20140281535A1 (en) * | 2013-03-15 | 2014-09-18 | Munibonsoftware.com, LLC | Apparatus and Method for Preventing Information from Being Extracted from a Webpage |
WO2014191968A1 (en) * | 2013-05-30 | 2014-12-04 | Auditmark S.A. | Web application protection |
CN105450662A (en) * | 2015-12-25 | 2016-03-30 | 小米科技有限责任公司 | Encryption method and device |
-
2017
- 2017-07-21 CN CN201710601162.4A patent/CN107480477A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101635622A (en) * | 2008-07-24 | 2010-01-27 | 阿里巴巴集团控股有限公司 | Method, system and equipment for encrypting and decrypting web page |
CN103377326A (en) * | 2012-04-13 | 2013-10-30 | 腾讯科技(北京)有限公司 | Confusion encrypting method and device for dynamic webpage program codes |
CN103150493A (en) * | 2013-02-28 | 2013-06-12 | 浙江中控技术股份有限公司 | JavaScript code obfuscation method and device |
US20140281535A1 (en) * | 2013-03-15 | 2014-09-18 | Munibonsoftware.com, LLC | Apparatus and Method for Preventing Information from Being Extracted from a Webpage |
WO2014191968A1 (en) * | 2013-05-30 | 2014-12-04 | Auditmark S.A. | Web application protection |
CN105450662A (en) * | 2015-12-25 | 2016-03-30 | 小米科技有限责任公司 | Encryption method and device |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145619A (en) * | 2018-08-13 | 2019-01-04 | 中金金融认证中心有限公司 | A kind of Android application resource reinforcement means and system |
CN109450881A (en) * | 2018-10-26 | 2019-03-08 | 天津海泰方圆科技有限公司 | A kind of data transmission system, method and device |
CN111314052A (en) * | 2018-12-12 | 2020-06-19 | 上海领甲数据科技有限公司 | Data encryption and decryption method based on uniformly distributed symmetric compression algorithm |
CN111314052B (en) * | 2018-12-12 | 2023-02-07 | 上海领甲数据科技有限公司 | Data encryption and decryption method |
CN109918917A (en) * | 2019-03-19 | 2019-06-21 | 北京智游网安科技有限公司 | Method, computer equipment and the storage medium for preventing H5 source code from leaking |
CN109918917B (en) * | 2019-03-19 | 2021-06-08 | 北京智游网安科技有限公司 | Method, computer device and storage medium for preventing leakage of H5 source code |
CN110069904A (en) * | 2019-03-22 | 2019-07-30 | 平安普惠企业管理有限公司 | H5 resource wraps transmission method, H5 resource packet method for down loading and relevant device |
CN110135133B (en) * | 2019-04-19 | 2021-08-17 | 佛山市微风科技有限公司 | Microcontroller-oriented compression integrated source code obfuscation method and system |
CN110135133A (en) * | 2019-04-19 | 2019-08-16 | 肖银皓 | A kind of integrated source code of compression towards microcontroller obscures method and system |
CN111159662A (en) * | 2019-12-25 | 2020-05-15 | 郑州阿帕斯数云信息科技有限公司 | Data processing method and device |
CN111290781A (en) * | 2020-03-10 | 2020-06-16 | 网易(杭州)网络有限公司 | NPK mode packing script, and method and device for running NPK format script file |
WO2021218173A1 (en) * | 2020-04-30 | 2021-11-04 | 平安科技(深圳)有限公司 | Source code reinforcement method and apparatus, and computer device and storage medium |
CN113360181A (en) * | 2021-05-20 | 2021-09-07 | 武汉虹旭信息技术有限责任公司 | Code calling method and device for industrial Internet |
CN113296773A (en) * | 2021-05-28 | 2021-08-24 | 北京思特奇信息技术股份有限公司 | Copyright marking method and system for cascading style sheet |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107480477A (en) | Mobile terminal product copy-right protection method based on html5 technologies | |
CN102890758B (en) | Method and system for protecting executable file | |
CN109194625B (en) | Client application protection method and device based on cloud server and storage medium | |
CN103607402B (en) | A kind of online game data encryption and decryption method and equipment | |
US9608822B2 (en) | Method for generating an HTML document that contains encrypted files and the code necessary for decrypting them when a valid passphrase is provided | |
CN105656626B (en) | Reverse recombination encryption method | |
CN106506159A (en) | Encryption method and equipment for key safety | |
CN104794388B (en) | application program access protection method and application program access protection device | |
CN102567685B (en) | Software copyright protection method based on asymmetric public key password system | |
CN105592107A (en) | Device and method for safely collecting industrial process data on basis of FPGA | |
CN105791258A (en) | Data transmission method, terminal and open platform | |
CN101741823A (en) | Cross-validation safety communication method and system | |
CN105471902A (en) | Data encryption method and system based on issued encryption algorithm | |
WO2017080356A1 (en) | Secure input method, device and system | |
CN105577673A (en) | Data encryption method and data encryption server based on issuing encryption algorithm | |
CN105391677A (en) | Information transmission method and mobile terminal | |
CN104992329A (en) | Method for safely issuing transaction message | |
CN108737353A (en) | A kind of data ciphering method and device based on data analysis system | |
CN112199730A (en) | Method and device for processing application data on terminal and electronic equipment | |
KR101267875B1 (en) | Apparatus for message encryption and decryption using virtual keyboard and recording medium storing program for executing method of the same in computer | |
CN109246062A (en) | A kind of authentication method and system based on browser plug-in | |
CN101282212A (en) | System and method for encipherment and decipherment based on template | |
CN106452728A (en) | Data encryption method | |
CN108337233B (en) | Method for encrypting content information, electronic equipment and storage medium | |
CN107370596A (en) | A kind of user cipher encrypted transmission method, system and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171215 |