CN111125645A - Executive program processing method, system, device, computer equipment and medium - Google Patents

Executive program processing method, system, device, computer equipment and medium Download PDF

Info

Publication number
CN111125645A
CN111125645A CN201911117299.8A CN201911117299A CN111125645A CN 111125645 A CN111125645 A CN 111125645A CN 201911117299 A CN201911117299 A CN 201911117299A CN 111125645 A CN111125645 A CN 111125645A
Authority
CN
China
Prior art keywords
execution
program
encrypted
executive
subprogram
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911117299.8A
Other languages
Chinese (zh)
Other versions
CN111125645B (en
Inventor
张梦龙
王沫
崔洲洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Origimed Technology Shanghai Co ltd
Original Assignee
Origimed Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Origimed Technology Shanghai Co ltd filed Critical Origimed Technology Shanghai Co ltd
Priority to CN201911117299.8A priority Critical patent/CN111125645B/en
Publication of CN111125645A publication Critical patent/CN111125645A/en
Application granted granted Critical
Publication of CN111125645B publication Critical patent/CN111125645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The present application relates to the field of data security, and in particular, to a method, system, apparatus, computer device, and storage medium for executing program processing. The method comprises the following steps: receiving an execution program uploaded by a supply terminal; splitting the executive program to generate a plurality of executive subprograms, and encrypting the executive subprograms respectively; generating a rule file which is associated with the executive program and the encrypted executive subprogram, and encrypting the rule file; and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the execution subprogram to obtain the execution program. The method can solve the problem of confidentiality of the execution program.

Description

Executive program processing method, system, device, computer equipment and medium
Technical Field
The present application relates to the field of data security, and in particular, to a method, system, apparatus, computer device, and medium for executing program processing.
Background
With the development of science and technology, various software and algorithm rules for various software are written in script languages, such as Shell language, Perl language, Python language, and the like.
Due to the characteristics of the scripting languages, when the execution program runs, the execution program is executed by the source code written by the scripting languages, and corresponding security measures are lacked.
Therefore, how to secure the source code of the execution program becomes a problem to be solved urgently.
Disclosure of Invention
In view of the above, it is desirable to provide an execution program processing method, an apparatus, a computer device, and a storage medium capable of securing an execution program in response to the above-described technical problem.
An execution program processing method, the method comprising:
receiving an execution program uploaded by a supply terminal;
splitting the executive program to generate a plurality of executive subprograms, and encrypting the executive subprograms respectively;
generating a rule file which is associated with the executive program and the encrypted executive subprogram, and encrypting the rule file;
and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the execution subprogram to obtain the execution program.
In one embodiment, the splitting the execution program includes:
splitting the executive program according to the writing sequence of the program in the executive program and the requirement on the number of the programs;
the generating a rule file associating the executive program and the encrypted executive subprogram includes:
acquiring a file name and a storage position of the executive program;
acquiring the file name of the encrypted execution subprogram;
and generating the rule file based on the file name and the storage position of the executive program, the splitting sequence for splitting the executive program and the encrypted file name of the executive subprogram.
An execution program processing method, the method comprising:
sending a downloading request of an execution program to a cloud;
receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file returned by a cloud, wherein the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program;
decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram;
and recombining the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
In one embodiment, the recombining the execution subprogram according to the rule file to obtain the execution program corresponding to the download request includes:
determining a corresponding execution subprogram according to the file name of the encrypted execution subprogram in the rule file;
according to the splitting sequence of the executing programs in the rule file, the determined executing subprograms are recombined to generate a plurality of executing programs;
obfuscating a file name of each of the execution programs;
and modifying the file names of the execution programs which are mutually referred in the execution programs into the file name of the obfuscated execution program.
In one embodiment, the method further comprises:
and after the executive program is operated, deleting the executive program.
A program execution processing system, the system comprising: a supply terminal, a cloud terminal, and a demand terminal;
the supply terminal is used for compiling an execution program and uploading the execution program to the cloud terminal;
the cloud is used for receiving an execution program uploaded by the supply terminal; splitting the executive program to generate a plurality of executive subprograms, and encrypting the executive subprograms respectively; generating a rule file which is associated with the executive program and the encrypted executive subprogram, and encrypting the rule file; receiving a downloading request sent by a demand terminal for the executive program, and sending the encrypted executive subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the executive subprogram to obtain the executive program;
the demand terminal is used for sending a downloading request of an execution program to the cloud; receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file returned by a cloud, wherein the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and recombining the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
An execution program processing apparatus comprising:
the first receiving module is used for receiving the executive program uploaded by the supply terminal;
the splitting and encrypting module is used for splitting the executive program, generating a plurality of executive subprograms and encrypting the executive subprograms respectively;
the generating and encrypting module is used for generating a rule file which is associated with the executive program and the encrypted executive subprogram and encrypting the rule file;
the first sending module is used for receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the execution subprogram to obtain the execution program.
An execution program processing apparatus comprising:
the second sending module is used for sending a downloading request of the executive program to the cloud;
the second receiving module is used for receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program;
the decryption module is used for decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram;
and the recombination module is used for recombining the execution subprogram according to the rule file to obtain the execution program corresponding to the downloading request.
A computer device comprising a memory storing a computer program and a processor implementing the steps of any of the methods described above when the processor executes the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any of the above.
According to the executive program processing method, the executive program processing system, the executive program processing device, the computer equipment and the executive program processing medium, the received executive program is divided and encrypted respectively, a plurality of encrypted executive sub programs are generated, then rule files related to the executive program and the encrypted executive sub programs are generated and encrypted, when a download request for the executive program sent by a demand terminal is received, the encrypted executive sub programs and the encrypted rule files are sent to the demand terminal according to the download request, and the rule files are used for indicating the demand terminal to recombine the executive sub programs to obtain the executive programs. Therefore, the program sent to the demand terminal is not an execution program subjected to simple encryption, but a plurality of execution sub-programs subjected to splitting and encryption, and the demand terminal can not simply decrypt the execution program for use, but recombines the execution sub-programs according to the rule file, so that the demand terminal cannot directly acquire the execution program, and the problem of confidentiality of the execution program is solved.
Drawings
FIG. 1 is a diagram illustrating an example of an application for performing a program processing method;
FIG. 2 is a flow diagram illustrating a method for performing program processing in one embodiment;
FIG. 3 is a flowchart illustrating the rule file generation step in one embodiment;
FIG. 4 is a flowchart illustrating a method of performing program processing in accordance with another embodiment;
FIG. 5 is a flow chart illustrating the steps performed in one embodiment to perform program reassembly;
FIG. 6 is a block diagram of an exemplary embodiment of an apparatus for executing a program;
FIG. 7 is a block diagram showing the construction of a program processing apparatus according to another embodiment;
FIG. 8 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The execution program processing method provided by the application can be applied to the application environment shown in fig. 1. The supply terminal 102 and the demand terminal 106 may communicate with the server 104 through a network, and the server 104 is a cloud server. The user can upload a written execution program to the cloud server 104 through the supply terminal 102, after receiving the execution program uploaded by the supply terminal 102, the server 104 can split the execution program to generate a plurality of execution sub programs, encrypt the plurality of execution sub programs, further generate a rule file associating each execution program and the encrypted execution sub programs, encrypt the rule file, then the server 104 can receive a download request for the execution program sent by the demand terminal 106, send the encrypted execution sub programs and the encrypted rule file to the demand terminal 106 according to the download request, and the demand terminal 106 can recombine the execution sub programs with the rule file to obtain the execution program and run the execution program. The server 104 may be implemented by an independent server or a server cluster composed of a plurality of servers, and the provisioning terminal 102 and the demand terminal 106 may be, but not limited to, a personal mobile phone, a notebook computer, a smart phone, a tablet computer, a portable wearable device, a server or a server cluster, and the like.
In one embodiment, as shown in fig. 2, a method for executing a program processing is provided, which is described by taking the method as an example applied to the server in fig. 1, and may include the following steps:
step S202, receiving an execution program uploaded by the provisioning terminal.
The execution program may be a script program in various application scenarios, for example, may be a credit generation program used in a credit generation algorithm, or may also be an application program used in some application software, and the like. Specifically, the executive program may be source code written by a plurality of different scripting languages, such as Shell language, Perl language, Python language, and the like, which is not limited in this application.
In practical application, a user may compile an execution program through a provisioning terminal, and upload the compiled and packaged execution program to a cloud server through a network, for example, upload the execution program to the cloud server in the form of a compressed file.
Specifically, the execution program written by the user through the provisioning terminal may be an execution program saved in a plurality of different files and named by different file names, for example, saved as "main. The compressed file uploaded to the server at the cloud end may be a compressed file obtained by compressing and packaging the plurality of files in a unified manner.
When the user uploads the compressed file to the cloud server through the supply terminal, the user can also fill in corresponding execution program information through the supply terminal, for example, information such as a relative path of files of each execution program, names of the files, a writing language, versions of the writing language, and operation parameters.
Step S204, splitting the execution program, generating a plurality of execution subroutines, and encrypting the plurality of execution subroutines respectively.
After receiving the compressed file uploaded by the supply terminal, the server at the cloud end can decompress the compressed file to obtain the execution programs stored by the plurality of files.
Further, the server at the cloud end can traverse all program statements of the executive programs stored in the files, split the program statements and encrypt the executive subprograms obtained by splitting the program statements. The encryption key may be an encryption key filled in by a user when the compressed file is uploaded through the demand terminal. The server in the cloud end can encrypt each execution subprogram according to the encryption key.
Specifically, the Encryption algorithm for encrypting each execution subroutine may be a symmetric Encryption algorithm, for example, an Advanced Encryption Standard Algorithm (AES), a data Encryption Standard algorithm (DES), a Triple data Encryption algorithm (Triple DES, 3DES), a Blowfish Encryption algorithm, or the like.
In practical application, the server in the cloud may write each encrypted execution subprogram into each new file and store the new file, where a file name of each stored encrypted execution subprogram is a Universal Unique Identifier (UUID) generated at random.
Step S206, a rule file associating the execution program and the encrypted execution subprogram is generated, and the rule file is encrypted.
The rule file is used to associate the execution program with the encrypted execution subprogram, and may store the file name and the storage address of the execution program, the file name of the encrypted execution subprogram, and the splitting order in which the execution program is split into the execution subprogram.
Specifically, the cloud server may generate a rule file associated with the execution subprogram and the encrypted execution subprogram according to the acquired relevant information of the execution program and the execution subprogram, and encrypt the rule file according to the aforementioned symmetric encryption algorithm.
Step S208, receiving a download request for the executive program sent by a demand terminal, and sending the encrypted executive subprogram and an encrypted rule file to the demand terminal according to the download request, wherein the rule file is used for indicating the demand terminal to recombine the executive subprogram to obtain the executive program.
The demand terminal may be a terminal device running the execution program, and may be, but is not limited to, a personal mobile phone, a notebook computer, a smart phone, a tablet computer, a portable wearable device, and a server or a server cluster.
Specifically, the demand terminal may send a download request for downloading the execution program to the server in the cloud in response to a request operation of the user. The download request may carry information such as a program name or a program ID of the executable program to be downloaded, and a version number of the executable program.
The server at the cloud end can authenticate the demand terminal according to the download request, and after the authentication is passed, the corresponding encrypted rule file and the encrypted execution subprogram are determined according to the program name or the program ID, the version number and the like carried by the download request, and the encrypted rule file and the encrypted execution subprogram are sent to the demand terminal.
Further, the demand terminal may decrypt and recombine the received encrypted rule file and the encrypted execution subprogram to obtain and run the execution program.
In practical application, the key for decryption by the demand terminal may be a key obtained by a user from a key provider online and entered through a human-computer interaction interface of the demand terminal, or may also be a key obtained by another application running in the demand terminal from the key provider. Wherein, the key supplier may be a user who fills out the encryption key through the demanding terminal.
In the execution program processing method, the received execution program is split and encrypted respectively to generate a plurality of encrypted execution sub programs, then a rule file associating the execution program and the encrypted execution sub programs is generated and encrypted, and when a download request for the execution program sent by a demand terminal is received, the encrypted execution sub programs and the encrypted rule file are sent to the demand terminal according to the download request, and the rule file is used for indicating the demand terminal to recombine the execution sub programs to obtain the execution program. Therefore, the program sent to the demand terminal is not an execution program subjected to simple encryption, but a plurality of execution sub-programs subjected to splitting and encryption, and the demand terminal can not simply decrypt the execution program for use, but recombines the execution sub-programs according to the rule file, so that the demand terminal cannot directly acquire the execution program, and the problem of confidentiality of the execution program is solved.
In one embodiment, the splitting of the execution program in step S204 may be performed according to a writing order of programs in the execution program and a requirement on the number of programs.
Specifically, after traversing the execution programs of the plurality of files, the server at the cloud splits each execution program into a plurality of execution subroutines according to the writing sequence of the programs in each file and the preset requirement for the number of the programs, for example, the server splits the execution program according to 4 lines of program statements, 5 lines of program statements, or any line of program statements as one execution subroutine, and then encrypts and stores the split execution subprogram in the encryption manner described above.
In other embodiments, the number of the execution subroutines to be generated may be preset, and then each execution program is traversed and split to obtain the preset number of execution subroutines.
Referring to fig. 3, fig. 3 is a schematic flow chart of a rule file generating step in an embodiment, where the rule file generating step is to generate a rule file associating the execution program and the encrypted execution subprogram, and specifically includes the following steps:
step S302, a file name and a storage location of the execution program are acquired.
The file names of the execution programs are the file names of the main, the domain, the analysis, the sh1, the domain, the analysis, the sh2 and the like, and the storage positions are positions where the cloud server decompresses and obtains the execution programs and stores the execution programs to the server database after receiving the compressed files uploaded by the supply terminal.
In practical application, the cloud server may obtain the file name of each execution program according to the execution program information entered by the user at the provisioning terminal, and obtain the storage location of each execution program according to the location where each execution program is stored in the database after decompression.
Step S304, obtaining the file name of the encrypted execution sub-program.
Specifically, after the execution program is split into the execution sub programs, the server in the cloud may write the encrypted execution sub programs into the new files and store the new files, and the file names of the stored encrypted execution sub programs are the randomly generated universal unique identification codes, such as "b 6b4f9-904a-86cc-9c6 fe" and "b 6b4f9-904a-4ec1-9c6 fe".
In practical application, when the server at the cloud generates the file name of the encrypted execution subprogram, the file name can be obtained.
Step S306, generating the rule file based on the file name and the storage location of the execution program, the splitting order of splitting the execution program, and the file name of the encrypted execution subprogram.
Specifically, when the server in the cloud performs splitting processing on the execution programs, the server in the cloud may further record a splitting order in which each execution program is split to obtain the execution subprogram, then split each execution program according to the obtained file name of each execution program, the relative storage location between each execution program, the splitting order in which each execution program is split to obtain the execution subprogram, and the stored file name of each encrypted execution subprogram, write the new rule file in, and then encrypt and store the new rule file.
By acquiring the file name and the storage position of each execution file, the splitting sequence for splitting each execution program and the file name of the encrypted execution subprogram, and generating the rule file, after the requirement terminal downloads and decrypts each execution subprogram, each execution subprogram can be recombined according to the instruction of the rule file, so that the execution file is obtained and operated.
As shown in fig. 4, in one embodiment, another method for executing a program is further provided, and the method is used for explaining the requirement terminal in fig. 1 as an example, and may include the following steps:
step S402, sending a download request of the execution program to the cloud.
Specifically, the demand terminal may send a download request to the server in the cloud in response to a request operation of the user. The download request may carry information such as a program name or a program ID of the executable program to be downloaded, and a version number of the executable program to be downloaded.
In practical application, the demand terminal may determine the version of the adapted execution program according to information such as its own system configuration, and determine the corresponding version number.
Step S404, receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file returned by the cloud, where the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program.
Specifically, the server at the cloud end can send a download request according to the demand terminal, authenticate the demand terminal, determine a corresponding encrypted rule file and an encrypted execution subprogram according to a program name or a program ID, a version number and the like carried in the download request after the authentication is passed, and send the encrypted rule file and the encrypted execution subprogram to the demand terminal.
Step S406, decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram.
The key for decryption may be a key obtained by a user from a key provider on line and entered through a human-computer interaction interface of the demand terminal, or may also be a key obtained by another application running on the demand terminal from the key provider.
Specifically, the demand terminal may encrypt the encrypted rule file and the encrypted execution subprogram according to the obtained key, so as to obtain the rule file and the execution subprogram.
And step S408, recombining the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
The demand terminal can recombine the decrypted execution subprogram according to the content written in the rule file to obtain the execution program corresponding to the download request.
The method comprises the steps of sending a download request to a cloud end, receiving an encrypted execution subprogram and an encrypted rule file which are returned from the cloud end and correspond to the download request, splitting and encrypting the execution subprogram, associating the execution subprogram with the execution subprogram, decrypting the encrypted rule file and the encrypted execution subprogram, and recombining the decrypted execution subprogram according to the decrypted rule file to obtain a corresponding execution program. The executive program obtained by the demand terminal is obtained by decrypting the encrypted rule file and the encrypted executive subprogram and recombining the executive subprogram based on the rule file, and is not the executive program obtained directly, so that the problem of confidentiality of the executive program is solved, and the confidentiality of the executive program is improved.
In one embodiment, referring to fig. 5, fig. 5 is a schematic flow chart of the step of executing program reorganization in an embodiment, where the step of executing program reorganization, that is, reorganizing the execution sub program according to the rule file in step S408 to obtain the execution program corresponding to the download request, may include the following steps:
step S502, according to the file name of the encrypted execution subprogram in the rule file, determining the corresponding execution subprogram.
Step S504, according to the splitting order of splitting the execution program in the rule file, reorganizing the determined execution subprogram, and generating a plurality of execution programs.
Specifically, after decrypting the encrypted execution subprogram, the demand terminal may sequentially obtain and recombine the decrypted execution subprograms according to the splitting order in which each execution program is split into the execution subprograms in the rule file and the file names of the generated execution subprograms, so as to obtain the multiple execution programs.
In step S506, the file names of the executed programs are obfuscated.
Specifically, the demand terminal may obfuscate a file name of each execution program, and the obfuscated file name of each execution program is a universal unique identifier generated at random. For example, the file names of the execution programs uploaded by the supply terminal are "main.sh", "domain analysis.sh1" and "domain analysis.sh2", and the file names of the execution programs obtained by the demand terminal after being confused are "b 6b4f9-904a-4ec1-86cc-9c5546 fe", "b 6b4f9-904a-4ec1-86cc-9c7846 fe", "b 6b4f9-906a-4ed1-86cc-9c5546 fe".
In step S508, the file names of the execution programs that refer to each other among the execution programs are modified to be the obfuscated file names of the execution programs.
Specifically, when each execution subprogram is a reorganized execution program, when the file name of the execution program written in a regular file in the reorganized execution program is identified, the file name is replaced with the corresponding file name after confusion, for example, a "doanalysis.sh1" field is detected in a program statement of the reorganized execution program, and the "doanalysis.sh1" in the regular file is the file name of the execution program, when the execution program is generated through reorganization, the demand terminal modifies the "doanalysis.sh1" in the reorganized execution program into the confused file name "b 6b4f 9-a-4 ec 1-904-86 cc-9c7846 fe", and saves the modified execution program.
In the above embodiment, the file names of the execution programs are obfuscated, and the file names of the execution programs that refer to each other in the reassembled execution programs are modified into the obfuscated file name of the execution program, so that the confidentiality of the execution program can be further improved.
In one embodiment, the method for executing program processing may further include: and after the executive program is operated, deleting the executive program.
Specifically, the execution program decrypted and recombined by the demand terminal may be a temporary execution program, and after the demand terminal runs the temporary execution program, the temporary execution program may be automatically deleted. For example, the corresponding temporary execution program may be deleted according to a corresponding deletion statement in the rule file, or the temporary execution program may be deleted after a certain period of time or after a certain number of times of operation according to a deletion field written in the temporary execution program.
After the execution program is operated by the demand terminal, the execution program is automatically deleted, so that the situation that the demand terminal stores the file of the execution program can be avoided, the execution program can be further kept secret, and the problem that the execution program cannot be kept secret is solved.
It should be understood that although the various steps in the flow charts of fig. 2-5 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-5 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, there is also provided an executive processing system, which may include: supply terminal, high in the clouds and demand terminal, wherein:
the supply terminal is used for writing an execution program and uploading the execution program to the cloud.
The cloud is used for receiving an execution program uploaded by the supply terminal; splitting the executive program to generate a plurality of executive subprograms, and encrypting the executive subprograms respectively; generating a rule file which is associated with the executive program and the encrypted executive subprogram, and encrypting the rule file; and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the execution subprogram to obtain the execution program.
The demand terminal is used for sending a downloading request of an execution program to the cloud; receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file returned by a cloud, wherein the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and recombining the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
For the specific limitation of the processing system for executing the program, reference may be made to the above limitation on the processing method for executing the program, and details are not described herein again.
Referring to fig. 6, fig. 6 is a schematic diagram of a processing device for executing a program, which may include: a first receiving module 601, a splitting and encrypting module 602, a generating and encrypting module 603, and a first sending module 604, wherein:
the first receiving module 601 is configured to receive an execution program uploaded by a provisioning terminal.
The splitting and encrypting module 602 is configured to split the execution program, generate a plurality of execution subroutines, and encrypt the plurality of execution subroutines respectively.
The generating and encrypting module 603 is configured to generate a rule file associating the execution program and the encrypted execution subprogram, and encrypt the rule file.
A first sending module 604, configured to receive a download request for the execution program sent by a demand terminal, and send the encrypted execution sub-program and an encrypted rule file to the demand terminal according to the download request, where the rule file is used to instruct the demand terminal to recombine the execution sub-program to obtain the execution program.
In one embodiment, the splitting and encrypting module 602 may include:
and the splitting submodule is used for splitting the executive program according to the writing sequence of the program in the executive program and the requirement on the number of the programs.
The generating and encrypting module 603 may include:
and the first acquisition submodule is used for acquiring the file name and the storage position of the execution program.
The second obtaining submodule is used for obtaining the file name of the encrypted execution subprogram;
and the first generation submodule is used for generating the rule file based on the file name and the storage position of the execution program, the splitting sequence for splitting the execution program and the encrypted file name of the execution subprogram.
Referring to fig. 7, fig. 7 is a schematic structural diagram of another processing device for executing programs, where the transposing may include: a second sending module 701, a second receiving module 702, a decryption module 703, and a reassembly module 704, wherein:
the second sending module 701 is configured to send a download request of the execution program to the cloud.
A second receiving module 702, configured to receive an encrypted execution subprogram and an encrypted rule file, which are returned by the cloud and correspond to the download request, where the encrypted execution subprogram is obtained by splitting and encrypting the execution subprogram, and the rule file is associated with the execution subprogram and the execution subprogram.
The decryption module 703 is configured to decrypt the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram.
And the restructuring module 704 is configured to restructure the execution subprogram according to the rule file to obtain an execution program corresponding to the download request.
In one embodiment, the restructuring module 704 may include:
the determining sub-module is used for determining the corresponding execution sub-program according to the file name of the encrypted execution sub-program in the rule file;
the recombination submodule is used for recombining the determined execution subprogram according to the splitting sequence for splitting the execution program in the rule file to generate a plurality of execution programs;
the obfuscation submodule is used for obfuscating the file name of each execution program;
and the modification submodule is used for modifying the file names of the execution programs which are mutually referenced in the execution programs into the obfuscated file name of the execution program.
In one embodiment, the apparatus may further include:
and the deleting module is used for deleting the executive program after the executive program is operated.
For the specific limitation of the program execution processing device, reference may be made to the above limitation on the program execution processing method, which is not described herein again. The respective modules in the above-described executive processing device may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. In practical application, the computer device may be a cloud computer device or a computer device of a demand terminal, and for the cloud computer device, the database of the computer device is used for storing data such as an execution program, a split execution subprogram, an encrypted execution subprogram, a rule file, and an encrypted rule file; for the computer device of the demand terminal, the database of the computer device is used for storing data such as encrypted execution subprograms and encrypted rule files downloaded from the cloud. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement an executive processing method.
Those skilled in the art will appreciate that the architecture shown in fig. 8 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: receiving an execution program uploaded by a supply terminal; splitting the executive program to generate a plurality of executive subprograms, and encrypting the executive subprograms respectively; generating a rule file which is associated with the executive program and the encrypted executive subprogram, and encrypting the rule file; and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the execution subprogram to obtain the execution program.
In one embodiment, the splitting of the executing program is realized when the processor executes the computer program, and may include: and splitting the executive program according to the writing sequence of the program in the executive program and the requirement on the number of the programs. The generating a rule file associating the executive program and the encrypted executive subprogram includes: acquiring a file name and a storage position of the executive program; acquiring the file name of the encrypted execution subprogram; and generating the rule file based on the file name and the storage position of the executive program, the splitting sequence for splitting the executive program and the encrypted file name of the executive subprogram.
In one embodiment, there is provided another computer apparatus comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: sending a downloading request of an execution program to a cloud; receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file returned by a cloud, wherein the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and recombining the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
In an embodiment, when the processor executes the computer program, the implementing of the reorganization of the execution sub program according to the rule file to obtain the execution program corresponding to the download request may include: determining a corresponding execution subprogram according to the file name of the encrypted execution subprogram in the rule file; according to the splitting sequence of the executing programs in the rule file, the determined executing subprograms are recombined to generate a plurality of executing programs; obfuscating a file name of each of the execution programs; and modifying the file names of the execution programs which are mutually referred in the execution programs into the file name of the obfuscated execution program.
In one embodiment, the processor when executing the computer program may further perform the steps of: and after the executive program is operated, deleting the executive program.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving an execution program uploaded by a supply terminal; splitting the executive program to generate a plurality of executive subprograms, and encrypting the executive subprograms respectively; generating a rule file which is associated with the executive program and the encrypted executive subprogram, and encrypting the rule file; and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the execution subprogram to obtain the execution program.
In one embodiment, the computer program, when executed by the processor, performs the splitting of the executive, and may include: and splitting the executive program according to the writing sequence of the program in the executive program and the requirement on the number of the programs. The generating a rule file associating the executive program and the encrypted executive subprogram includes: acquiring a file name and a storage position of the executive program; acquiring the file name of the encrypted execution subprogram; and generating the rule file based on the file name and the storage position of the executive program, the splitting sequence for splitting the executive program and the encrypted file name of the executive subprogram.
In one embodiment, another computer-readable storage medium is also provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: sending a downloading request of an execution program to a cloud; receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file returned by a cloud, wherein the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and recombining the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
In an embodiment, when executed by a processor, the computer program implements the reorganization of the execution sub-program according to the rule file to obtain an execution program corresponding to the download request, and may include: determining a corresponding execution subprogram according to the file name of the encrypted execution subprogram in the rule file; according to the splitting sequence of the executing programs in the rule file, the determined executing subprograms are recombined to generate a plurality of executing programs; obfuscating a file name of each of the execution programs; and modifying the file names of the execution programs which are mutually referred in the execution programs into the file name of the obfuscated execution program.
In one embodiment, the computer program when executed by the processor may further implement the steps of: and after the executive program is operated, deleting the executive program.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. An execution program processing method comprising:
receiving an execution program uploaded by a supply terminal;
splitting the executive program to generate a plurality of executive subprograms, and encrypting the executive subprograms respectively;
generating a rule file which is associated with the executive program and the encrypted executive subprogram, and encrypting the rule file;
and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the execution subprogram to obtain the execution program.
2. The method of claim 1, wherein the splitting the executive comprises:
splitting the executive program according to the writing sequence of the program in the executive program and the requirement on the number of the programs;
the generating a rule file associating the executive program and the encrypted executive subprogram includes:
acquiring a file name and a storage position of the executive program;
acquiring the file name of the encrypted execution subprogram;
and generating the rule file based on the file name and the storage position of the executive program, the splitting sequence for splitting the executive program and the encrypted file name of the executive subprogram.
3. An execution program processing method comprising:
sending a downloading request of an execution program to a cloud;
receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file returned by a cloud, wherein the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program;
decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram;
and recombining the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
4. The method according to claim 3, wherein the recombining the execution sub-program according to the rule file to obtain the execution program corresponding to the download request comprises:
determining a corresponding execution subprogram according to the file name of the encrypted execution subprogram in the rule file;
according to the splitting sequence of the executing programs in the rule file, the determined executing subprograms are recombined to generate a plurality of executing programs;
obfuscating file names of the respective execution programs;
and modifying the file names of the execution programs which are mutually referred in the execution programs into the file name of the obfuscated execution program.
5. The method of claim 3, further comprising:
and after the executive program is operated, deleting the executive program.
6. An executive processing system, the system comprising: a supply terminal, a cloud terminal, and a demand terminal;
the supply terminal is used for compiling an execution program and uploading the execution program to the cloud terminal;
the cloud is used for receiving an execution program uploaded by the supply terminal; splitting the executive program to generate a plurality of executive subprograms, and encrypting the executive subprograms respectively; generating a rule file which is associated with the executive program and the encrypted executive subprogram, and encrypting the rule file; receiving a downloading request sent by a demand terminal for the executive program, and sending the encrypted executive subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the executive subprogram to obtain the executive program;
the demand terminal is used for sending a downloading request of an execution program to the cloud; receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file returned by a cloud, wherein the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and recombining the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
7. An execution program processing apparatus, comprising:
the first receiving module is used for receiving the executive program uploaded by the supply terminal;
the splitting and encrypting module is used for splitting the executive program, generating a plurality of executive subprograms and encrypting the executive subprograms respectively;
the generating and encrypting module is used for generating a rule file which is associated with the executive program and the encrypted executive subprogram and encrypting the rule file;
the first sending module is used for receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to recombine the execution subprogram to obtain the execution program.
8. An execution program processing apparatus, comprising:
the second sending module is used for sending a downloading request of the executive program to the cloud;
the second receiving module is used for receiving an encrypted execution subprogram corresponding to the download request and an encrypted rule file, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program;
the decryption module is used for decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram;
and the recombination module is used for recombining the execution subprogram according to the rule file to obtain the execution program corresponding to the downloading request.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
CN201911117299.8A 2019-11-15 2019-11-15 Method, system, device, computer equipment and medium for processing execution program Active CN111125645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911117299.8A CN111125645B (en) 2019-11-15 2019-11-15 Method, system, device, computer equipment and medium for processing execution program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911117299.8A CN111125645B (en) 2019-11-15 2019-11-15 Method, system, device, computer equipment and medium for processing execution program

Publications (2)

Publication Number Publication Date
CN111125645A true CN111125645A (en) 2020-05-08
CN111125645B CN111125645B (en) 2023-05-16

Family

ID=70495609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911117299.8A Active CN111125645B (en) 2019-11-15 2019-11-15 Method, system, device, computer equipment and medium for processing execution program

Country Status (1)

Country Link
CN (1) CN111125645B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113824735A (en) * 2021-11-19 2021-12-21 航天宏图信息技术股份有限公司 Remote sensing image encryption transmission method and system

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5202923A (en) * 1989-11-30 1993-04-13 Kabushiki Kaisha Toshiba Portable electronic device capable of registering subprograms
US20130097419A1 (en) * 2011-05-09 2013-04-18 Feitian Technologies Co., Ltd. Method and system for accessing e-book data
CN103248650A (en) * 2012-02-09 2013-08-14 中兴通讯股份有限公司 Document download method and system
CN104573557A (en) * 2015-01-20 2015-04-29 北京古盘创世科技发展有限公司 Cloud data storage method and device and cloud data recovery method
CN106055936A (en) * 2016-05-18 2016-10-26 深圳大学 Method and device for encryption/decryption of executable program data package
US20160335017A1 (en) * 2015-05-11 2016-11-17 Lenovo (Singapore) Pte. Ltd. Information processing apparatus for storing data in cloud environment, terminal device, and storage method
CN106547868A (en) * 2016-10-31 2017-03-29 深圳市金立通信设备有限公司 A kind of file management method and terminal
CN106911770A (en) * 2017-02-20 2017-06-30 北京古盘创世科技发展有限公司 A kind of data sharing method and system based on many cloud storages
CN107153794A (en) * 2016-03-03 2017-09-12 腾讯科技(深圳)有限公司 File encrypting method and device, file decryption method and apparatus
CN108418833A (en) * 2018-03-23 2018-08-17 中科创达软件股份有限公司 A kind of management method of software, cloud server and terminal
CN109274716A (en) * 2018-08-21 2019-01-25 中国平安人寿保险股份有限公司 Method, apparatus, computer equipment and the storage medium of file process
CN110278279A (en) * 2019-06-27 2019-09-24 苏宁消费金融有限公司 A kind of big data of dynamic resource scheduling mechanism dispatches development platform and method offline
CN110381061A (en) * 2019-07-19 2019-10-25 广东省新一代通信与网络创新研究院 Cloudy storage method, method for down loading, device and the storage medium of file

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5202923A (en) * 1989-11-30 1993-04-13 Kabushiki Kaisha Toshiba Portable electronic device capable of registering subprograms
US20130097419A1 (en) * 2011-05-09 2013-04-18 Feitian Technologies Co., Ltd. Method and system for accessing e-book data
CN103248650A (en) * 2012-02-09 2013-08-14 中兴通讯股份有限公司 Document download method and system
CN104573557A (en) * 2015-01-20 2015-04-29 北京古盘创世科技发展有限公司 Cloud data storage method and device and cloud data recovery method
US20160335017A1 (en) * 2015-05-11 2016-11-17 Lenovo (Singapore) Pte. Ltd. Information processing apparatus for storing data in cloud environment, terminal device, and storage method
CN107153794A (en) * 2016-03-03 2017-09-12 腾讯科技(深圳)有限公司 File encrypting method and device, file decryption method and apparatus
CN106055936A (en) * 2016-05-18 2016-10-26 深圳大学 Method and device for encryption/decryption of executable program data package
CN106547868A (en) * 2016-10-31 2017-03-29 深圳市金立通信设备有限公司 A kind of file management method and terminal
CN106911770A (en) * 2017-02-20 2017-06-30 北京古盘创世科技发展有限公司 A kind of data sharing method and system based on many cloud storages
CN108418833A (en) * 2018-03-23 2018-08-17 中科创达软件股份有限公司 A kind of management method of software, cloud server and terminal
CN109274716A (en) * 2018-08-21 2019-01-25 中国平安人寿保险股份有限公司 Method, apparatus, computer equipment and the storage medium of file process
CN110278279A (en) * 2019-06-27 2019-09-24 苏宁消费金融有限公司 A kind of big data of dynamic resource scheduling mechanism dispatches development platform and method offline
CN110381061A (en) * 2019-07-19 2019-10-25 广东省新一代通信与网络创新研究院 Cloudy storage method, method for down loading, device and the storage medium of file

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
SHINGO MABU等: "A variable size mechanism of distributed graph programs for creating agent behaviors" *
周巧扣等: "基于Android的文件加密系统的设计与实现", 《计算机光盘软件与应用》 *
张明等: "存储分割编码技术在移动云安全中的应用" *
邹欣彤: "云计算环境中的计算机网络安全" *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113824735A (en) * 2021-11-19 2021-12-21 航天宏图信息技术股份有限公司 Remote sensing image encryption transmission method and system
CN113824735B (en) * 2021-11-19 2022-03-11 航天宏图信息技术股份有限公司 Remote sensing image encryption transmission method and system

Also Published As

Publication number Publication date
CN111125645B (en) 2023-05-16

Similar Documents

Publication Publication Date Title
CN111475824B (en) Data access method, device, equipment and storage medium
CN111177749B (en) Encrypted source code file processing method and device, computer equipment and storage medium
KR102433011B1 (en) Method of apk file protection, apk file protection system performing the same, and storage medium storing the same
US20160203087A1 (en) Method for providing security for common intermediate language-based program
CN108363580A (en) Application program installation method, device, computer equipment and storage medium
CN107528865B (en) File downloading method and system
US11797296B2 (en) Hot updating method of script file package and hot updating device of script file package
CN110826031B (en) Encryption method, device, computer equipment and storage medium
CN109409099A (en) Cookie data processing method, device, computer equipment and storage medium
CN112800393B (en) Authorization authentication method, software development kit generation method, device and electronic equipment
CN110727949A (en) Data storage method and device, computer equipment and storage medium
CN111666078A (en) Source code reinforcing method and device, computer equipment and storage medium
CN111596938A (en) Embedded equipment firmware safety upgrading method, system, terminal and storage medium
CN116662941A (en) Information encryption method, device, computer equipment and storage medium
CN111125645B (en) Method, system, device, computer equipment and medium for processing execution program
US20170054554A1 (en) Apparatus for obfuscating and restoring program execution code and method thereof
CN112966229A (en) Method and device for safely operating SDK
CN111212057A (en) Resource packet transmission method and device, computer equipment and readable storage medium
KR101699176B1 (en) Hadoop Distributed File System Data Encryption and Decryption Method
CN114039743A (en) Data encryption method, device, storage medium and terminal
JP7235941B2 (en) Information management system and method
CN114692121A (en) Information acquisition method and related product
CN112817615A (en) File processing method, device, system and storage medium
CN106843853B (en) Method and device for protecting user information
CN114896621B (en) Application service acquisition method, encryption method, device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant