CN111125645B - Method, system, device, computer equipment and medium for processing execution program - Google Patents

Method, system, device, computer equipment and medium for processing execution program Download PDF

Info

Publication number
CN111125645B
CN111125645B CN201911117299.8A CN201911117299A CN111125645B CN 111125645 B CN111125645 B CN 111125645B CN 201911117299 A CN201911117299 A CN 201911117299A CN 111125645 B CN111125645 B CN 111125645B
Authority
CN
China
Prior art keywords
execution
program
encrypted
subprogram
execution program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911117299.8A
Other languages
Chinese (zh)
Other versions
CN111125645A (en
Inventor
张梦龙
王沫
崔洲洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Origimed Technology Shanghai Co ltd
Original Assignee
Origimed Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Origimed Technology Shanghai Co ltd filed Critical Origimed Technology Shanghai Co ltd
Priority to CN201911117299.8A priority Critical patent/CN111125645B/en
Publication of CN111125645A publication Critical patent/CN111125645A/en
Application granted granted Critical
Publication of CN111125645B publication Critical patent/CN111125645B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/14Protecting executable software against software analysis or reverse engineering, e.g. by obfuscation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Multimedia (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Stored Programmes (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to the field of data security, and in particular, to a method, a system, an apparatus, a computer device, and a storage medium for executing a program. The method comprises the following steps: receiving an execution program uploaded by a supply terminal; splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively; generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file; and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram to obtain the execution program. The adoption of the method can solve the security problem of the execution program.

Description

Method, system, device, computer equipment and medium for processing execution program
Technical Field
The present invention relates to the field of data security, and in particular, to a method, a system, an apparatus, a computer device, and a medium for processing an execution program.
Background
With the development of technology, various software and algorithm rules for various software are often written in script languages, such as Shell language, perl language, python language, and the like.
Due to the characteristics of the scripting languages, when executing programs, the source codes written in the scripting languages are executed, and corresponding security measures are lacked.
Therefore, how to keep the source code of the execution program secret is a urgent problem to be solved.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an execution program processing method, apparatus, computer device, and storage medium that can secure an execution program.
A method of executing a program processing, the method comprising:
receiving an execution program uploaded by a supply terminal;
splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively;
generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file;
and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram to obtain the execution program.
In one embodiment, the splitting the executing program includes:
splitting the execution program according to the programming sequence of the program in the execution program and the requirement on the number of the programs;
the generating a rule file associated with the execution program and the encrypted execution subroutine includes:
acquiring the file name and the storage position of the execution program;
acquiring the file name of the encrypted execution subprogram;
and generating the rule file based on the file name of the execution program, the storage position, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram.
A method of executing a program processing, the method comprising:
sending a downloading request of an execution program to a cloud;
receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by a cloud end, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program;
decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram;
And reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
In one embodiment, the reorganizing the execution subroutine according to the rule file to obtain an execution program corresponding to the download request includes:
determining a corresponding execution subprogram according to the file name of the encrypted execution subprogram in the rule file;
according to the splitting sequence of splitting the execution program in the rule file, the determined execution subprogram is recombined to generate a plurality of execution programs;
obfuscating file names of the execution programs;
the file names of the mutually-referenced execution programs in the execution programs are modified to be the file names of the execution programs after confusion.
In one embodiment, the method further comprises:
and deleting the execution program after the execution program is operated.
An executing program processing system, the system comprising: a supply terminal, a cloud end and a demand terminal;
the provisioning terminal is used for writing an execution program and uploading the execution program to the cloud;
the cloud end is used for receiving an execution program uploaded by the supply terminal; splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively; generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file; receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram to obtain the execution program;
The demand terminal is used for sending a downloading request of the execution program to the cloud; receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by a cloud end, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
An execution program processing apparatus comprising:
the first receiving module is used for receiving the execution program uploaded by the supply terminal;
the splitting and encrypting module is used for splitting the execution program to generate a plurality of execution subroutines and encrypting the execution subroutines respectively;
the generation and encryption module is used for generating a rule file associated with the execution program and the encrypted execution subprogram and encrypting the rule file;
the first sending module is used for receiving a downloading request of the execution program sent by the demand terminal, sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, and the rule file is used for indicating the demand terminal to reorganize the execution subprogram to obtain the execution program.
An execution program processing apparatus comprising:
the second sending module is used for sending a downloading request of the execution program to the cloud;
the second receiving module is used for receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by the cloud, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program;
the decryption module is used for decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram;
and the reorganization module is used for reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
A computer device comprising a memory storing a computer program and a processor implementing the steps of any one of the methods described above when the processor executes the computer program.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of any of the methods described above.
The method, the system, the device, the computer equipment and the medium for processing the execution program are characterized in that the received execution program is split and respectively encrypted to generate a plurality of encrypted execution subroutines, then a rule file related to the execution program and the encrypted execution subroutines is generated and encrypted, when a download request of the execution program sent by a demand terminal is received, the encrypted execution subroutines and the encrypted rule file are sent to the demand terminal according to the download request, and the rule file is used for indicating the demand terminal to reorganize the execution subroutines to obtain the execution program. Therefore, the program sent to the demand terminal is not an execution program which is simply encrypted, but a plurality of split and encrypted execution subroutines, and the demand terminal can not simply decrypt the execution program for use, but reorganizes each execution subroutine according to the rule file, so that the demand terminal cannot directly acquire the execution program, and the confidentiality problem of the execution program is solved.
Drawings
FIG. 1 is an application scenario diagram of a method of executing a program process in one embodiment;
FIG. 2 is a flow chart illustrating a method of performing a program processing in one embodiment;
FIG. 3 is a flow chart illustrating a rule file generation step in one embodiment;
FIG. 4 is a flowchart illustrating another embodiment of a method for performing a program process;
FIG. 5 is a flow chart illustrating a process for performing the program reorganization step in one embodiment;
FIG. 6 is a block diagram of an embodiment of a device for executing a program;
FIG. 7 is a block diagram of an apparatus for executing a program according to another embodiment;
fig. 8 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The method for processing the execution program can be applied to an application environment shown in fig. 1. The provisioning terminal 102 and the demand terminal 106 may communicate with the server 104 through a network, and the server 104 is a cloud server. The user may upload the written execution program to the cloud server 104 through the provisioning terminal 102, after receiving the execution program uploaded by the provisioning terminal 102, the server 104 may split the execution program to generate a plurality of execution subroutines, encrypt the execution subroutines respectively, further generate rule files associated with each execution program and the encrypted execution subroutines, encrypt the rule files, and then the server 104 may receive a download request for the execution program sent by the demand terminal 106, send the encrypted execution subroutines and the encrypted rule files to the demand terminal 106 according to the download request, and the demand terminal 106 may reorganize the execution subroutines according to the rule files to obtain the execution program and operate the execution program. The server 104 may be implemented by a stand-alone server or a server cluster formed by a plurality of servers, and the provisioning terminal 102 and the demand terminal 106 may be, but are not limited to, a personal mobile phone, a notebook computer, a smart phone, a tablet computer, a portable wearable device, a server or a server cluster, etc.
In one embodiment, as shown in fig. 2, a method for executing a program is provided, which is illustrated by taking an example that the method is applied to the server in fig. 1, and may include the following steps:
step S202, receiving the execution program uploaded by the provisioning terminal.
The execution program may be a script program in various application scenarios, for example, a trusted program used in a trusted algorithm, or an application program used in some application software, etc. Specifically, the execution program may be source code written in a plurality of different scripting languages, such as Shell language, perl language, python language, etc., which is not limited in this application.
In practical application, a user may write an execution program through a provisioning terminal, and upload the written and packaged execution program to a cloud server through a network, for example, upload the execution program to the cloud server in the form of a compressed file or the like.
Specifically, the execution program written by the user through the provisioning terminal may be an execution program stored in a plurality of different files and named with different file names, for example, as "main.sh", "dornalysis.sh1", "dornalysis.sh2", or the like. The compressed file uploaded to the cloud server may be a compressed file obtained by uniformly compressing and packaging the plurality of files.
When the user uploads the compressed file to the cloud server through the provisioning terminal, corresponding executive program information, such as the relative path of the files of each executive program, the names of the files, the writing language version, the running parameters and the like, can be filled in through the provisioning terminal.
Step S204, splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively.
After receiving the compressed file uploaded by the provisioning terminal, the cloud server can decompress the compressed file to obtain execution programs stored in the files.
Further, the cloud server may traverse all program statements of the execution program stored in the plurality of files, split the program statements, and encrypt the split execution subprogram. The encryption key may be an encryption key that is filled in by the user when uploading the compressed file through the demand terminal. The cloud server may encrypt each execution subroutine according to the encryption key.
Specifically, the encryption algorithm used for encrypting each execution subroutine may be a symmetric encryption algorithm, for example, an advanced encryption standard algorithm (Advanced Encryption Standard, AES), a data encryption standard algorithm (Data Encryption Standard, DES), a Triple data encryption algorithm (Triple DES,3 DES), a Blowfish encryption algorithm, or the like.
In practical application, the cloud server may write each encrypted execution sub-program into each new file and store the encrypted execution sub-program, where the file name of each stored encrypted execution sub-program is a randomly generated universal unique identification code (Universally Unique Identifier, UUID).
Step S206, generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file.
The rule file is used for associating the execution program and the encrypted execution subprogram, and can store the file name, the storage address, the file name of the encrypted execution subprogram, the splitting order of splitting the execution program into the execution subprogram, and the like.
Specifically, the cloud server may generate a rule file associated with the execution sub-program and the encrypted execution sub-program according to the acquired execution program and related information of the execution sub-program, and encrypt the rule file according to the symmetric encryption algorithm described above.
Step S208, receiving a download request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the download request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram to obtain the execution program.
The demand terminal may be a terminal device running the execution program, and may include, but is not limited to, a personal mobile phone, a notebook computer, a smart phone, a tablet computer, a portable wearable device, and a server or a server cluster.
Specifically, the demand terminal may respond to a request operation of the user and send a download request for downloading the execution program to a server in the cloud. The download request may carry information such as a program name or a program ID of the executable program to be downloaded, a version number of the executable program, and the like.
The cloud server can authenticate the demand terminal according to the downloading request, and after authentication, the corresponding encrypted rule file and encrypted execution subprogram are determined according to the program name or program ID, version number and the like carried by the downloading request, and the encrypted rule file and encrypted execution subprogram are sent to the demand terminal.
Further, the demand terminal may decrypt the received encrypted rule file and the encrypted execution subroutine, and reorganize the encrypted rule file and the encrypted execution subroutine to obtain and run the execution subroutine.
In practical applications, the key that the demand terminal decrypts may be a key that the user obtains from the key provider on line and enters through the man-machine interface of the demand terminal, or may be a key that is obtained from the key provider with other applications running on the demand terminal. Wherein the key provider may be a user who fills in the encryption key by requiring the terminal.
In the above execution program processing method, the received execution program is split and encrypted respectively to generate a plurality of encrypted execution subroutines, then a rule file associated with the execution program and the encrypted execution subroutines is generated and encrypted, when a download request for the execution program sent by the demand terminal is received, the encrypted execution subroutines and the encrypted rule file are sent to the demand terminal according to the download request, and the rule file is used for instructing the demand terminal to reorganize the execution subroutines to obtain the execution program. Therefore, the program sent to the demand terminal is not an execution program which is simply encrypted, but a plurality of split and encrypted execution subroutines, and the demand terminal can not simply decrypt the execution program for use, but reorganizes each execution subroutine according to the rule file, so that the demand terminal cannot directly acquire the execution program, and the confidentiality problem of the execution program is solved.
In one embodiment, the splitting of the executing program in step S204 may be performed according to the writing order of the programs in the executing program and the requirement on the number of programs.
Specifically, after traversing the execution programs of the files, the cloud server splits each execution program into a plurality of execution subroutines according to the writing sequence of the programs in each file and the preset requirement on the number of the programs, for example, the server splits the execution program according to 4-stroke-sequence sentences or 5-stroke-sequence sentences or any row of program sentences as one execution subroutine, and then encrypts and stores the split execution subroutines according to the encryption mode described above.
In other embodiments, the number of execution subroutines to be generated may be preset, and then each execution program may be traversed and split to obtain the preset number of execution subroutines.
Referring to fig. 3, fig. 3 is a flowchart illustrating a rule file generating step in an embodiment, where the rule file generating step generates a rule file associated with the execution program and the encrypted execution subroutine, and specifically may include the following steps:
step S302, obtaining the file name and the storage location of the execution program.
The file names of the execution programs are the file names of main, doanalytical, sh1, doanalytical, sh2 and the like, and the storage position is the position of the server database in which the server in the cloud receives the compressed file uploaded by the supply terminal, decompresses the compressed file to obtain each execution program and stores each execution program.
In practical application, the cloud server can acquire the file name of each execution program according to the execution program information input by the user at the supply terminal, and acquire the storage position of each execution program according to the position of storing each execution program into the database after decompression.
Step S304, obtaining the file name of the encrypted execution subroutine.
Specifically, after splitting the execution program into execution subroutines, the cloud server may write each encrypted execution subroutine into each new file and store the encrypted execution subroutines, where the file names of each stored encrypted execution subroutine are randomly generated universal unique identifiers, for example, "b6b4f9-904a-86cc-9c6fe", "b6b4f9-904a-4ec1-9c6fe", and the like.
In practical application, when the cloud server generates the file name of the encrypted execution subroutine, the file name can be obtained.
Step S306, generating the rule file based on the file name, the storage location, the splitting order of splitting the execution program, and the file name of the encrypted execution subroutine.
Specifically, when the cloud server splits the execution program, the cloud server may record a splitting order of splitting each execution program to obtain an execution sub-program, then split each execution program to obtain a splitting order of the execution sub-program and a stored file name of each encrypted execution sub-program according to the obtained file names of each execution program and the relative storage positions among each execution program, write in a newly created rule file, and encrypt and store.
The method comprises the steps of obtaining the file name and the storage position of each execution file, splitting the splitting sequence of each execution program and the file name of each encrypted execution subprogram, and generating a rule file, so that after the terminal is required to download and decrypt each execution subprogram, each execution subprogram can be recombined according to the instruction of the rule file, and the execution file is obtained and operated.
As shown in fig. 4, in one embodiment, another method for executing a program is provided, which is used for illustrating the demand terminal in fig. 1 as an example, and may include the following steps:
step S402, a download request of the execution program is sent to the cloud.
Specifically, the demand terminal may send a download request to a server in the cloud in response to a request operation of the user. The download request may carry information such as a program name or a program ID of the executing program to be downloaded, and a version number of the executing program to be downloaded.
In practical application, the demand terminal can determine the version of the adaptive execution program according to the information such as the own system configuration and the like, and determine the corresponding version number.
Step S404, receiving an encrypted execution subroutine and an encrypted rule file, which are returned by the cloud and correspond to the download request, where the encrypted execution subroutine is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subroutine and the execution program.
Specifically, the cloud server may send a download request according to the demand terminal, authenticate the demand terminal, determine the corresponding encrypted rule file and encrypted execution subroutine according to the program name or program ID and version number carried by the download request after authentication is passed, and send the encrypted rule file and encrypted execution subroutine to the demand terminal.
And step S406, decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram.
The key for decryption may be a key obtained from a key provider by a user on line and entered through a man-machine interface of the demand terminal, or may be a key obtained from the key provider by other applications running on the demand terminal.
Specifically, the demand terminal may decrypt the encrypted rule file and the encrypted execution subroutine according to the obtained key, respectively, to obtain the rule file and the execution subroutine.
And step S408, reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
The demand terminal can reorganize the decrypted execution subprogram according to the written content in the rule file to obtain the execution program corresponding to the downloading request.
The method comprises the steps of sending a downloading request to a cloud end, receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, the rule file is obtained by associating the execution subprogram with the execution program, decrypting the encrypted rule file and the encrypted execution subprogram, and recombining the decrypted execution subprogram according to the decrypted rule file to obtain the corresponding execution program. The execution program obtained by the demand terminal is obtained by decrypting the encrypted rule file and the encrypted execution subprogram and recombining the execution subprogram based on the rule file, and is not the execution program obtained directly, so that the confidentiality problem of the execution program is solved, and the confidentiality of the execution program is improved.
In one embodiment, referring to fig. 5, fig. 5 is a flowchart illustrating an execution program reorganizing step in one embodiment, where in step S408, the execution sub-program is reorganized according to the rule file to obtain an execution program corresponding to the download request, and the method may include the following steps:
Step S502, determining the corresponding execution sub-program according to the file name of the encrypted execution sub-program in the rule file.
Step S504, reorganizing the determined execution subprogram according to the splitting order of splitting the execution program in the rule file, so as to generate a plurality of execution programs.
Specifically, after decrypting each encrypted execution sub-program, the demand terminal may split each execution program into a splitting order of the execution sub-program and a file name of the generated execution sub-program according to the rule file, and sequentially obtain and reorganize the decrypted execution sub-program to obtain the plurality of execution programs.
Step S506, obfuscating the file names of the execution programs.
Specifically, the demand terminal may confuse the file names of the execution programs, and the file names of the execution programs after confusion are randomly generated universal unique identification codes. For example, the file names of the execution programs uploaded by the supply terminal are "main.sh", "doanalysis.sh1", "doanalysis.sh2", and the file names of the execution programs obtained by the demand terminal after confusion are "b6b4f9-904a-4ec1-86cc-9c5546fe", "b6b4f9-904a-4ec1-86cc-9c7846fe", "b6b4f9-906a-4ed1-86cc-9c5546fe", and the like.
In step S508, the file names of the mutually referenced execution programs in the execution programs are modified as the file names of the confused execution programs.
Specifically, when the requirement terminal reorganizes each execution subprogram into an execution program, when the file name of the execution program written in a rule file in the reorganized execution program is identified, the file name is replaced by a corresponding file name after confusion, for example, a field of 'doanalysis.sh1' is detected in a program statement of the reorganized execution program, and 'doanalysis.sh1' in the rule file is the file name of the execution program, when the reorganized execution program is generated, the requirement terminal modifies 'doanalysis.sh1' in the reorganized execution program into a file name of 'b 6b4f9-904a-4ec1-86cc-9c7846 fe' after confusion, and stores the modified execution program.
In the above embodiment, by obfuscating the file names of the execution programs and modifying the file names of the execution programs that are mutually referenced in the reorganized execution programs to the file names of the obfuscated execution programs, confidentiality of the execution programs can be further improved.
In one embodiment, the illustrated execution program processing method may further include: and deleting the execution program after the execution program is operated.
Specifically, the execution program obtained by decryption and recombination by the demand terminal may be a temporary execution program, and after the demand terminal runs the temporary execution program, the demand terminal may automatically delete the temporary execution program. For example, the corresponding temporary execution program may be deleted according to the corresponding delete statement in the rule file, or the temporary execution program may be deleted after a certain period of time or a certain number of operations according to the delete field written in the temporary execution program, or the like.
After the demand terminal runs the execution program, the execution program is automatically deleted, so that the demand terminal can be prevented from storing the file of the execution program, the execution program can be further kept secret, and the problem that the execution program cannot be kept secret is solved.
It should be understood that, although the steps in the flowcharts of fig. 2-5 are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2-5 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily occur sequentially, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or steps.
In one embodiment, there is also provided an executive processing system, the system may include: supply terminal, high in the clouds and demand terminal, wherein:
the provisioning terminal is used for writing an execution program and uploading the execution program to the cloud.
The cloud end is used for receiving an execution program uploaded by the supply terminal; splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively; generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file; and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram to obtain the execution program.
The demand terminal is used for sending a downloading request of the execution program to the cloud; receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by a cloud end, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
The specific limitation of the execution program processing system may be referred to as the limitation of the execution program processing method hereinabove, and will not be described herein.
Referring to fig. 6, fig. 6 is a schematic structural diagram of an apparatus for executing a program, which may include: a first receiving module 601, a splitting and encrypting module 602, a generating and encrypting module 603, and a first transmitting module 604, wherein:
the first receiving module 601 is configured to receive an execution program uploaded by the provisioning terminal.
The splitting and encrypting module 602 is configured to split the execution program, generate a plurality of execution subroutines, and encrypt the plurality of execution subroutines respectively.
The generating and encrypting module 603 is configured to generate a rule file associated with the execution program and the encrypted execution subroutine, and encrypt the rule file.
The first sending module 604 is configured to receive a download request for the execution program sent by a demand terminal, and send the encrypted execution sub-program and an encrypted rule file to the demand terminal according to the download request, where the rule file is used to instruct the demand terminal to reorganize the execution sub-program to obtain the execution program.
In one embodiment, the splitting and encrypting module 602 may include:
and the splitting module is used for splitting the execution program according to the programming sequence of the program in the execution program and the requirement on the number of the programs.
The generating and encrypting module 603 may include:
and the first acquisition sub-module is used for acquiring the file name and the storage position of the execution program.
The second acquisition sub-module is used for acquiring the file name of the encrypted execution sub-program;
the first generation sub-module is used for generating the rule file based on the file name and the storage position of the execution program, the splitting sequence for splitting the execution program and the file name of the encrypted execution sub-program.
Referring to fig. 7, fig. 7 is a schematic structural diagram of another execution program processing apparatus, and the transpose may include: a second sending module 701, a second receiving module 702, a decrypting module 703, and a reorganizing module 704, wherein:
the second sending module 701 is configured to send a download request of the execution program to the cloud.
The second receiving module 702 is configured to receive an encrypted execution subroutine and an encrypted rule file, where the encrypted execution subroutine is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subroutine and the execution program, where the encrypted execution subroutine corresponds to the download request and is returned by the cloud.
A decryption module 703, configured to decrypt the encrypted rule file and the encrypted execution subroutine, to obtain the rule file and the execution subroutine.
And a reorganizing module 704, configured to reorganize the execution subprogram according to the rule file, so as to obtain an execution program corresponding to the download request.
In one embodiment, the reorganization module 704 may include:
the determining sub-module is used for determining the corresponding execution sub-program according to the file name of the encrypted execution sub-program in the rule file;
the reorganization sub-module is used for reorganizing the determined execution sub-program according to the splitting sequence of splitting the execution program in the rule file to generate a plurality of execution programs;
the confusion submodule is used for confusing the file names of the execution programs;
and the modification submodule is used for modifying the file names of the mutually-referenced execution programs in the execution programs to be the file names of the confused execution programs.
In one embodiment, the apparatus may further include:
and the deleting module is used for deleting the execution program after the execution program is operated.
The specific limitation of the execution program processing apparatus may be referred to as the limitation of the execution program processing method hereinabove, and will not be described herein. The respective modules in the above-described execution program processing apparatus may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. In practical application, the computer device may be a cloud computer device or a computer device of a demand terminal, and for the cloud computer device, a database of the computer device is used for storing data such as an execution program, a split execution subroutine, an encrypted execution subroutine, a rule file, an encrypted rule file and the like; for the computer equipment of the demand terminal, the database of the computer equipment is used for storing data such as encrypted execution subroutines, encrypted rule files and the like downloaded from the cloud. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of executing a program processing.
It will be appreciated by those skilled in the art that the structure shown in fig. 8 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory storing a computer program and a processor that when executing the computer program performs the steps of: receiving an execution program uploaded by a supply terminal; splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively; generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file; and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram to obtain the execution program.
In one embodiment, splitting the execution program when the processor executes the computer program may include: splitting the execution program according to the programming sequence of the program in the execution program and the requirement on the number of the programs. The generating a rule file associated with the execution program and the encrypted execution subroutine includes: acquiring the file name and the storage position of the execution program; acquiring the file name of the encrypted execution subprogram; and generating the rule file based on the file name of the execution program, the storage position, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram.
In one embodiment, there is also provided another computer device comprising a memory storing a computer program and a processor which when executing the computer program performs the steps of: sending a downloading request of an execution program to a cloud; receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by a cloud end, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
In one embodiment, when the processor executes the computer program, the method includes reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the download request, and may include: determining a corresponding execution subprogram according to the file name of the encrypted execution subprogram in the rule file; according to the splitting sequence of splitting the execution program in the rule file, the determined execution subprogram is recombined to generate a plurality of execution programs; obfuscating file names of the execution programs; the file names of the mutually-referenced execution programs in the execution programs are modified to be the file names of the execution programs after confusion.
In one embodiment, the processor, when executing the computer program, may further implement the steps of: and deleting the execution program after the execution program is operated.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving an execution program uploaded by a supply terminal; splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively; generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file; and receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram to obtain the execution program.
In one embodiment, splitting the execution program when the computer program is executed by a processor may include: splitting the execution program according to the programming sequence of the program in the execution program and the requirement on the number of the programs. The generating a rule file associated with the execution program and the encrypted execution subroutine includes: acquiring the file name and the storage position of the execution program; acquiring the file name of the encrypted execution subprogram; and generating the rule file based on the file name of the execution program, the storage position, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram.
In one embodiment, there is also provided another computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of: sending a downloading request of an execution program to a cloud; receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by a cloud end, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
In one embodiment, when the computer program is executed by the processor, the method for reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the download request may include: determining a corresponding execution subprogram according to the file name of the encrypted execution subprogram in the rule file; according to the splitting sequence of splitting the execution program in the rule file, the determined execution subprogram is recombined to generate a plurality of execution programs; obfuscating file names of the execution programs; the file names of the mutually-referenced execution programs in the execution programs are modified to be the file names of the execution programs after confusion.
In one embodiment, the computer program may further implement the following steps when executed by a processor: and deleting the execution program after the execution program is operated.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A method of executing a program, comprising:
receiving an execution program uploaded by a supply terminal;
splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively;
generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file; wherein the generating a rule file associated with the execution program and the encrypted execution subroutine includes: acquiring the file name and the storage position of the execution program; acquiring the file name of the encrypted execution subprogram, and storing the file name of the encrypted execution subprogram as a randomly generated universal unique identification code; generating the rule file based on the file name, the storage position of the execution program, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram;
Receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram according to a key acquired from a key provider and input through a human-computer interaction interface of the demand terminal to obtain the execution program;
the splitting the execution program comprises the following steps: splitting the execution program according to the programming sequence of the program in the execution program and the requirement on the number of the programs.
2. A method of executing a program, comprising:
sending a downloading request of an execution program to a cloud;
receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by a cloud end, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; the generation process of the rule file comprises the following steps: acquiring the file name and the storage position of the execution program; acquiring the file name of the encrypted execution subprogram, and storing the file name of the encrypted execution subprogram as a randomly generated universal unique identification code; generating the rule file based on the file name, the storage position of the execution program, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram;
Decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram;
and reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
3. The method according to claim 2, wherein reorganizing the execution subroutine according to the rule file to obtain an execution program corresponding to the download request includes:
determining a corresponding execution subprogram according to the file name of the encrypted execution subprogram in the rule file;
according to the splitting sequence of splitting the execution program in the rule file, the determined execution subprogram is recombined to generate a plurality of execution programs;
the file names of all the execution programs are confused;
the file names of the mutually-referenced execution programs in the execution programs are modified to be the file names of the execution programs after confusion.
4. The method as recited in claim 2, further comprising:
and deleting the execution program after the execution program is operated.
5. An executing program processing system, the system comprising: a supply terminal, a cloud end and a demand terminal;
The provisioning terminal is used for writing an execution program and uploading the execution program to the cloud;
the cloud end is used for receiving an execution program uploaded by the supply terminal; splitting the execution program to generate a plurality of execution subroutines, and encrypting the execution subroutines respectively; generating a rule file associated with the execution program and the encrypted execution subprogram, and encrypting the rule file; wherein the generating a rule file associated with the execution program and the encrypted execution subroutine includes: acquiring the file name and the storage position of the execution program; acquiring the file name of the encrypted execution subprogram, and storing the file name of the encrypted execution subprogram as a randomly generated universal unique identification code; generating the rule file based on the file name, the storage position of the execution program, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram;
receiving a downloading request of the execution program sent by a demand terminal, and sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram according to a key acquired from a key provider and input through a human-computer interaction interface of the demand terminal to obtain the execution program; the splitting the execution program comprises the following steps: splitting the execution program according to the programming sequence of the program in the execution program and the requirement on the number of the programs;
The demand terminal is used for sending a downloading request of the execution program to the cloud; receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by a cloud end, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; the generation process of the rule file comprises the following steps: acquiring the file name and the storage position of the execution program; acquiring the file name of the encrypted execution subprogram, and storing the file name of the encrypted execution subprogram as a randomly generated universal unique identification code; generating the rule file based on the file name, the storage position of the execution program, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram; decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram; and reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
6. An execution program processing apparatus, comprising:
the first receiving module is used for receiving the execution program uploaded by the supply terminal;
the splitting and encrypting module is used for splitting the execution program to generate a plurality of execution subroutines and encrypting the execution subroutines respectively;
the generation and encryption module is used for generating a rule file associated with the execution program and the encrypted execution subprogram and encrypting the rule file; wherein the generating a rule file associated with the execution program and the encrypted execution subroutine includes: acquiring the file name and the storage position of the execution program; acquiring the file name of the encrypted execution subprogram, and storing the file name of the encrypted execution subprogram as a randomly generated universal unique identification code; generating the rule file based on the file name, the storage position of the execution program, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram;
the first sending module is used for receiving a downloading request of the execution program sent by the demand terminal, sending the encrypted execution subprogram and an encrypted rule file to the demand terminal according to the downloading request, wherein the rule file is used for indicating the demand terminal to reorganize the execution subprogram according to a key acquired from a key provider and input through a man-machine interaction interface of the demand terminal to obtain the execution program; the splitting the execution program comprises the following steps: splitting the execution program according to the programming sequence of the program in the execution program and the requirement on the number of the programs.
7. An execution program processing apparatus, comprising:
the second sending module is used for sending a downloading request of the execution program to the cloud;
the second receiving module is used for receiving an encrypted execution subprogram and an encrypted rule file, wherein the encrypted execution subprogram corresponds to the downloading request and is returned by the cloud, the encrypted execution subprogram is obtained by splitting and encrypting the execution program, and the rule file is associated with the execution subprogram and the execution program; the generation process of the rule file comprises the following steps: acquiring the file name and the storage position of the execution program; acquiring the file name of the encrypted execution subprogram, and storing the file name of the encrypted execution subprogram as a randomly generated universal unique identification code; generating the rule file based on the file name, the storage position of the execution program, the splitting sequence for splitting the execution program and the file name of the encrypted execution subprogram;
the decryption module is used for decrypting the encrypted rule file and the encrypted execution subprogram to obtain the rule file and the execution subprogram;
And the reorganization module is used for reorganizing the execution subprogram according to the rule file to obtain an execution program corresponding to the downloading request.
8. The apparatus of claim 7, wherein the reorganization module comprises:
the determining sub-module is used for determining the corresponding execution sub-program according to the file name of the encrypted execution sub-program in the rule file;
the reorganization sub-module is used for reorganizing the determined execution sub-program according to the splitting sequence of splitting the execution program in the rule file to generate a plurality of execution programs;
the confusion submodule is used for confusing the file names of all the execution programs;
and the modification submodule is used for modifying the file names of the mutually-referenced execution programs in the execution programs to be the file names of the confused execution programs.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 4 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 4.
CN201911117299.8A 2019-11-15 2019-11-15 Method, system, device, computer equipment and medium for processing execution program Active CN111125645B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911117299.8A CN111125645B (en) 2019-11-15 2019-11-15 Method, system, device, computer equipment and medium for processing execution program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911117299.8A CN111125645B (en) 2019-11-15 2019-11-15 Method, system, device, computer equipment and medium for processing execution program

Publications (2)

Publication Number Publication Date
CN111125645A CN111125645A (en) 2020-05-08
CN111125645B true CN111125645B (en) 2023-05-16

Family

ID=70495609

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911117299.8A Active CN111125645B (en) 2019-11-15 2019-11-15 Method, system, device, computer equipment and medium for processing execution program

Country Status (1)

Country Link
CN (1) CN111125645B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113824735B (en) * 2021-11-19 2022-03-11 航天宏图信息技术股份有限公司 Remote sensing image encryption transmission method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5202923A (en) * 1989-11-30 1993-04-13 Kabushiki Kaisha Toshiba Portable electronic device capable of registering subprograms
CN109274716A (en) * 2018-08-21 2019-01-25 中国平安人寿保险股份有限公司 Method, apparatus, computer equipment and the storage medium of file process
CN110278279A (en) * 2019-06-27 2019-09-24 苏宁消费金融有限公司 A kind of big data of dynamic resource scheduling mechanism dispatches development platform and method offline
CN110381061A (en) * 2019-07-19 2019-10-25 广东省新一代通信与网络创新研究院 Cloudy storage method, method for down loading, device and the storage medium of file

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102223364B (en) * 2011-05-09 2014-06-04 飞天诚信科技股份有限公司 Method and system for accessing e-book data
CN103248650B (en) * 2012-02-09 2016-12-14 中兴通讯股份有限公司 A kind of document down loading method and system
CN104573557B (en) * 2015-01-20 2019-04-16 北京古盘创世科技发展有限公司 Cloud data storage method and device and cloud data restoration method
JP6055023B2 (en) * 2015-05-11 2016-12-27 レノボ・シンガポール・プライベート・リミテッド Information processing apparatus, terminal apparatus, and storage method for storing data in cloud environment
CN107153794B (en) * 2016-03-03 2020-07-21 腾讯科技(深圳)有限公司 File encryption method and device and file decryption method and device
CN106055936B (en) * 2016-05-18 2018-12-04 深圳大学 Executable program data packet encrypting/decrypting method and device
CN106547868A (en) * 2016-10-31 2017-03-29 深圳市金立通信设备有限公司 A kind of file management method and terminal
CN106911770A (en) * 2017-02-20 2017-06-30 北京古盘创世科技发展有限公司 A kind of data sharing method and system based on many cloud storages
CN108418833B (en) * 2018-03-23 2022-01-07 中科创达软件股份有限公司 Software management method, cloud server and terminal

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5202923A (en) * 1989-11-30 1993-04-13 Kabushiki Kaisha Toshiba Portable electronic device capable of registering subprograms
CN109274716A (en) * 2018-08-21 2019-01-25 中国平安人寿保险股份有限公司 Method, apparatus, computer equipment and the storage medium of file process
CN110278279A (en) * 2019-06-27 2019-09-24 苏宁消费金融有限公司 A kind of big data of dynamic resource scheduling mechanism dispatches development platform and method offline
CN110381061A (en) * 2019-07-19 2019-10-25 广东省新一代通信与网络创新研究院 Cloudy storage method, method for down loading, device and the storage medium of file

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Shingo Mabu等.A variable size mechanism of distributed graph programs for creating agent behaviors.2013 IEEE Congress on Evolutionary Computation.2013,全文. *
张明等.存储分割编码技术在移动云安全中的应用.科技传播.2018,第10卷(第10期),全文. *
邹欣彤.云计算环境中的计算机网络安全.智能城市.2016,第02卷(第02期),全文. *

Also Published As

Publication number Publication date
CN111125645A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN111475824B (en) Data access method, device, equipment and storage medium
KR102433011B1 (en) Method of apk file protection, apk file protection system performing the same, and storage medium storing the same
CN109471844A (en) File sharing method, device, computer equipment and storage medium
CN111177749B (en) Encrypted source code file processing method and device, computer equipment and storage medium
CN110768784B (en) Password transmission method, device, computer equipment and storage medium
CN104539432A (en) Method and device for signing file
CN109889333B (en) Firmware data encryption method and device, computer equipment and storage medium
CN110727949B (en) Data storage method and device, computer equipment and storage medium
CN108134673B (en) Method and device for generating white box library file
CN109462475B (en) Data encryption method, data decryption method and related devices
US20220209945A1 (en) Method and device for storing encrypted data
CN110717190A (en) Distributed data storage method and device and data storage equipment
CN112637156A (en) Key distribution method, device, computer equipment and storage medium
US20180013551A1 (en) Apparatus for obfuscating and restoring program execution code and method thereof
US20220216999A1 (en) Blockchain system for supporting change of plain text data included in transaction
CN116015767A (en) Data processing method, device, equipment and medium
CN111125645B (en) Method, system, device, computer equipment and medium for processing execution program
CN116662941A (en) Information encryption method, device, computer equipment and storage medium
KR101699176B1 (en) Hadoop Distributed File System Data Encryption and Decryption Method
CN112966229A (en) Method and device for safely operating SDK
CN114896621B (en) Application service acquisition method, encryption method, device and computer equipment
CN114692121A (en) Information acquisition method and related product
US20200304291A1 (en) Information management system and method for the same
CN111212057B (en) Resource packet transmission method and device, computer equipment and readable storage medium
CN114039743A (en) Data encryption method, device, storage medium and terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant