CN106951743A - A kind of software code infringement detection method - Google Patents

A kind of software code infringement detection method Download PDF

Info

Publication number
CN106951743A
CN106951743A CN201710171531.0A CN201710171531A CN106951743A CN 106951743 A CN106951743 A CN 106951743A CN 201710171531 A CN201710171531 A CN 201710171531A CN 106951743 A CN106951743 A CN 106951743A
Authority
CN
China
Prior art keywords
code
information
infringement
code block
local
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710171531.0A
Other languages
Chinese (zh)
Inventor
张刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Computer Software Technology Co Ltd
Original Assignee
Shanghai Computer Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Computer Software Technology Co Ltd filed Critical Shanghai Computer Software Technology Co Ltd
Priority to CN201710171531.0A priority Critical patent/CN106951743A/en
Publication of CN106951743A publication Critical patent/CN106951743A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • G06F21/125Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention relates to a kind of infringement detection method of software code, specifically include detection service device and local detection positioned at high in the clouds and act on behalf of two parts.Therebetween transmission and server end storage be all transformed software code key feature information rather than software code primitive form.High in the clouds detection service device is responsible for the code characteristic Sample Storehouse for detection of encroaching right and detected according to rule of encroaching right, and local detection agency is responsible for extracting and generating the key feature of software code, reports information to be localized deciphering to cloud server and to the infringing information that cloud server is issued.What is transmitted beyond the clouds between detection service device and local agent due to this method is information by conversion, provides source code without software owner, can carry out infringement detection across organizational boundary.Cloud server positioned at center can cross over organizational boundary, safeguard a set of independent Sample Storehouse without each software development organization, reduce the cost of software development organization, the infringement detectability of whole internet rank can be reached using this method.

Description

A kind of software code infringement detection method
Technical field
The present invention relates to a kind of microcomputer data processing, more particularly to a kind of infringement detection method of software code.
Background technology
The infringement detection of software code has important realistic meaning, can avoid knowledge with helper applications development organizations The related legal risk of property right.
The developer of software development organization often gets used to from existing code for the purpose for improving development efficiency It is multiplexed some codes.But, this behavior be sometimes it is feasible, sometimes again be infeasible, if it is feasible depend on be replicated Code licensing situation.Particularly Open Source Code, licensing species is various, and the constraint of every kind of licensing is all different, blindly Multiplexing software be likely to the risk that serious law is brought for enterprise.If for example, the developer of certain enterprise is accidentally Using or extend and follow the codes of GPL copyrights, according to GPL licensing specification, the enterprise is all and this is code dependent Other codes also all must comply with GPL specifications, towards the public entire disclosure, and this may cause irremediable damage to the enterprise Lose.
Because software developer is numerous, software code substantial amounts, and the quantity of open source software is even more to count to be unequal to Number, licensing situation has extremely complex, and various risk of infringement are carried out with inspection by hand and is nearly impossible.It therefore, it can inspection Survey and report that the method and system of potential software piracy risk just seems very necessary.
Existing software code infringement detection method is required for the source code of party to be detected's offer program.Wherein use Technology has two classes:Detection technique based on statistics of attributes and the detection technique based on structure measurement.Statistical technique based on attribute The information such as operator, operand in statistical software code, then calculate their average value, median, standard deviation etc., then Contrast the sample in sample to be detected and Sample Storehouse.Due to being global statistics data, this detection method defect is larger, only exists Infringement could be found in the case of code in software code and Sample Storehouse is almost on all four, and it is impracticable.Based on degree of structuration The technology of amount is a subset that code repeats detection method.Which includes text based method, based on abstract syntax tree Method, method based on program dependency graph etc..The repetition for aiming at discovery software code of these methods, is not special For infringement detection design, thus also consider the feature extraction problem relevant with infringement detection, Sample Storehouse set up problem with And Commercial Secret Protection problem.
In practice, the primary limitation that above-mentioned local infringement detection method is brought comes from the conflict of following two aspects: If software organization uses third party's service, source code to be detected must be just provided.This is likely to result in enterprise technology secret and let out Dew.If software organization determines that oneself sets up a detecting system according to above-mentioned local infringement detection method, need to set up and advise The huge global Sample Storehouse of mould, for example, collect the Open Source Code of whole internet rank, and cost is huge.
The content of the invention
Great amount of samples is needed the present invention be directed to code infringement detection, while need to protect the business secret of software organization again A kind of detection method that problem is proposed.
The technical scheme is that:A kind of infringement detection method of software code, it is characterised in that:Including high in the clouds detection Server and local agent system two parts, what transmission and server end were stored is all the transformed pass of code therebetween Key characteristic information.Wherein, detection service device in high in the clouds is responsible for the code characteristic Sample Storehouse detected for encroaching right and according to infringement Rule is detected that local agent system is responsible for extracting the key feature of software code, reports information to high in the clouds detection service device And the infringing information issued to high in the clouds detection service device is localized deciphering;
Local agent system includes code parser, three parts of code characteristic maker and local mapping table.Wherein, code Resolver is responsible for the detected code of parsing, produces code block message;Code characteristic maker is responsible for producing and code block is unique Corresponding code characteristic information, in practice using code block identifier, positional information, structural information and code block hash letter Breath defines this feature;Local mapping table safeguards the correspondence pass uploaded between the code of cloud server and local source code System, is the code that can be read in local parsing when cloud server passes infringing information corresponding with code block identifier back Infringing information;
Cloud server includes code parser, code characteristic maker, global characteristics information table and infringement detecting and alarm four Individual part.The function phase of wherein code parser and code characteristic maker and local agent system is same.Global characteristics information table Store the characteristic information in the code sample storehouse for detection.Detecting and alarm of encroaching right contrasts global characteristics information table and local agent The code block message of upload judges code block infringement feature, if it find that characteristic matching, is just marked as infringement, then by this Information is sent to local agent system, transfers to local agent system to be parsed and reported.
The described code infringement detection method, specific detecting step includes:
Step one, global characteristics information table is built:Code sample storehouse is obtained, high in the clouds detection service device is successively read the source of Sample Storehouse Code file, then according to the form of syntax tree, each code file is parsed into the code block of one group of tree structure, and will generation Code block information record is into global characteristics information table.The positional information of each code block record code block, structural information and Code block hash information.In practice, code analysis can use abstract syntax tree resolver to complete.Positional information can be used such as Lower information consolidation is described:Affiliated project, filename, original position, final position information.This code can be used in structural information The incidence relation description of block and parent code block.Code block hash characteristic information, which can be used, code is normalized rear corresponding text This hashed value description;
Step 2, extracts local code feature:Local agent system reads in source code to be detected, using with high in the clouds detection service Device identical characteristics information extraction method, decomposition source code is code block, and extract the positional information of code block, structural information and Code block hashes characteristic information, into step 3;
Step 3, sets up local mapping table:Local agent system is locally-unique for each code block distribution obtained in step 2 Identifier, the incidence relation of the identifier and the corresponding source code of code block is set up, for subsequent step seven.Subsequently into Step 4;
Step 4, sends detection request:Local code characteristic information and code block that local agent system obtains step 2 Identifier upload to high in the clouds detection service device together, request high in the clouds detection service device carries out infringement detection;
Step 5, high in the clouds detection service device receives the code block message that transmits of local agent system, and by the code block message and Global characteristics information table is compared according to infringement rule.In practice, infringement rule can be repeated or code knot based on hashed value The statistical conditions that the corresponding hashed value of structure is repeated are defined.If the characteristic information and global characteristics of the code to be detected uploaded Characteristic information in storehouse belongs to infringement according to infringement rule, then records the information.After the completion for the treatment of that all code blocks are detected, into step Rapid six;
Identifier labeled as the code block of infringement is issued to local agent system by step 6, high in the clouds detection service device;
Step 7, local agent system receives the infringement code block message that high in the clouds detection service device is passed back, uses local mapping table Local visible code is reduced into, shown, notify that required processing is acted.
Invention effect and effect:
The beneficial effects of the present invention are:Software code infringement detection method of the present invention, the generation to be detected without providing The primitive form of code, protects business secret;Expand the scope of the Sample Storehouse of software code infringement detection, it might even be possible to reach whole The detectability of individual internet rank.
Brief description of the drawings
Fig. 1 is the structure explanation of software code infringement detection method of the present invention;
The step of Fig. 2 is software code infringement detection method of the present invention illustrates;
Fig. 3 is an example fragment of the global characteristics information bank of embodiments of the invention;
Fig. 4 is the code block analysis result of the local agent of embodiments of the invention;
Fig. 5 is the code characteristic information of the local agent of embodiments of the invention;
Embodiment
In order that technological means, creation characteristic, reached purpose and effect that the present invention is realized are easy to understand, below Embodiment combination accompanying drawing is specifically addressed to the principle steps of software code infringement detection method of the present invention, using effect.
The present embodiment includes high in the clouds detection service device and local agent system two parts.
High in the clouds detection service device is responsible for the code characteristic Sample Storehouse for detection of encroaching right and carried out according to infringement rule Detection.Cloud server includes code parser, code characteristic maker, global characteristics information table and infringement detecting and alarm four Individual part.
Local agent system is responsible for extracting the characteristic information of software code, reports information to high in the clouds detection service device and right The deciphering that the infringing information that high in the clouds detection service device is issued is localized.Local agent system includes code parser, code Three parts of feature generator and local mapping table.Wherein code parser, the function of code characteristic maker and realization side Method and high in the clouds detection service device corresponding part are completely the same.
Step S1, builds global characteristics information table.Open source software code library of the present embodiment based on internet rank is to complete Office's characteristic information table is built.The code file in Open Source Code storehouse is obtained first, then carries out the code file successively Following processing:
Code structure is parsed:Program source code is resolved to by code block structure by abstract syntax tree, then using code block as The elementary cell of subsequent analysis detection, then extracts its positional information and structural information respectively.Define the code block after parsing Positional information is a five-tuple:(SegmentId, fileId, startLine, endLine, sequence).Wherein SegmentId is a globally unique identifier, and each identifier identifies a code block.FileId defines the code block The document location at place, is similarly represented using GUID.StartLine is the starting of code block hereof OK.EndLine is the termination row of code block hereof.Sequence is the order for the code block for belonging to a father node. The structural information of code block after definition parsing is two tuples:(segmentId, parentSegmentId).Wherein SegmentId is identical with aforementioned definitions, and parentSegmentId is the identifier of code block father node, for finding out father node;
Code block hashes feature extraction:The code hash feature extraction of the present embodiment includes normalization and cryptographic Hash calculates two steps Suddenly.Normalization includes removing space, variable name and digital two steps is replaced with consistent symbol, elimination due to code format, The different influences to Detection results of the factors such as variable name.Then, MD5 hash algorithms are used on normalized code, are every Individual node generates the cryptographic Hash of one 128.Fig. 3 is a fragment of the global characteristics information table obtained by above step, Including project information, license information, positional information, structural information and hash characteristic information;
Step S2, extracts local code feature.Local agent system reads in source code to be detected, using with high in the clouds detection service Device identical characteristics information extraction method, decomposition source code is code block, and extract the positional information of code block, structural information and Fingerprint feature information.The method and steps S1 of this step is identical.Fig. 4 is a file by being obtained after source code resolver Code block analysis result, represented using tree structure.Fig. 5 is the position of the code block of the code to be detected obtained by this step Confidence breath, structural information and hash characteristic information;
Step S3, sets up local mapping table.Local agent system is set up using each code block identifier obtained in step S2 The identifier and the incidence relation of the corresponding source code of code block, include the filename and positional information of original place file;
Step S4, sends detection request:Local agent system is by the step S2 local code characteristic informations obtained and code block Identifier together, constitute a code block characteristic information sequence, upload to high in the clouds detection service device together, the detection of request high in the clouds Server carries out infringement detection.The code block message of upload does not include any source code information;
Step S5, high in the clouds detection service device receives the code block message that transmits of local agent system, and by the code block message and Global characteristics information table is compared according to infringement rule.The present embodiment takes two kinds of infringement detected rules to carry out infringement detection:
Rule one:Contrast the hash feature of code block, and comprehensive code block line number and statistical information:If code block hashes feature Repeat completely and code block line number more than 10 rows and the hash feature, the frequency of occurrences in Sample Storehouse project is less than 3 times, then judge For infringement.In the characteristic that Fig. 3 and Fig. 5 are represented, the hash characteristic value of the row of overstriking is identical, therefore detecting and alarm can judge to treat The numbering of detection code is that the N3-N5 of 122 files is infringement code.This testing result explanation, although detecting and alarm can be accurate Ground judges infringement, but to be related to business secret for significant all not comprising source code of any data for being relied on of whole detection process Close information;
Rule two:Contrast the hash feature of code block, and the regional statistical information of comprehensive father node code block.If same father's knot The quantitative proportion in having under point and Sample Storehouse with the code block for repeating hashed value exceedes certain threshold value, in the present embodiment 50% is defined as, then is determined as infringement.Do not find to meet the code block of above-mentioned infringement feature in this example, then not report;
Actually implement in be not limited to above two infringement detected rule, and can comprehensively using code block positional information, Structural information and hash feature expand detected rule;
Step S6, high in the clouds detection service device is in the present embodiment 122 files by labeled as the identifier of the code block of infringement N3-N5 code blocks, are issued to local agent system;
Step S7, local agent system receives the infringement code block message that high in the clouds detection service device is passed back, uses local mapping table Local visible code is reduced into, is shown.
The effect of embodiment and beneficial effect
The software code infringement detection method provided according to the present embodiment, can be achieved the infringement detection system based on cloud service System, it is advantageous that:What is transmitted beyond the clouds between server and local agent system is the code hash feature by conversion, from In can not recover the primitive form of code.The code hash feature can support various infringement detected rules completely, and detection is imitated Fruit does not influence.Therefore, different software development organizations can share same detecting system, while need not provide this tissue again The primitive form of code.Both the business secret of software organization had been protected, the Sample Storehouse of software code infringement detection is in turn ensure that Scope.

Claims (2)

1. a kind of infringement detection method of software code, it is characterised in that:
Including high in the clouds detection service device and local agent system two parts, what transmission and server end were stored therebetween is all Transformed code key feature information;Wherein, detection service device in high in the clouds is responsible for the code characteristic sample for detection of encroaching right Simultaneously detected that local agent system is responsible for extracting the key feature of software code, reports information to arrive according to infringement rule in this storehouse High in the clouds detection service device and the infringing information issued to high in the clouds detection service device are localized deciphering;
Local agent system includes code parser, three parts of code characteristic maker and local mapping table;Wherein, code Resolver is responsible for the detected code of parsing, produces code block message;Code characteristic maker is responsible for producing and code block is unique Corresponding code characteristic information, in practice using code block identifier, positional information, structural information, code block hash information Define this feature;Local mapping table safeguards the correspondence uploaded between the code identifier of cloud server and local source code Relation, is the generation that can be read in local parsing when cloud server passes infringing information corresponding with code block identifier back Code infringing information;
Cloud server includes code parser, code characteristic maker, global characteristics information table and infringement detecting and alarm four Individual part;The function phase of wherein code parser and code characteristic maker and local agent system is same;Global characteristics information table Store the characteristic information in the code sample storehouse for detection;Detecting and alarm of encroaching right contrasts global characteristics information table and local agent The code block message of upload judges code block infringement feature, if it find that characteristic matching, is just marked as infringement, then by this Information is sent to local agent system, transfers to local agent system to be parsed and reported.
2. the infringement detection method of software code according to claim 1, it is characterised in that specific detecting step is as follows:
Step one, global characteristics information table is built:Code sample storehouse is obtained, high in the clouds detection service device is successively read the source of Sample Storehouse Code file, then according to the form of syntax tree, each code file is parsed into the code block of one group of tree structure, and will generation Code block information record is into global characteristics information table;The positional information of each code block record code block, structural information and Code block hash information;In practice, code analysis can use abstract syntax tree resolver to complete;Positional information can be used such as Lower information consolidation is described:Affiliated project, filename, original position, final position information;This code can be used in structural information The incidence relation description of block and parent code block;Code block hash characteristic information, which can be used, code is normalized rear corresponding text This hashed value description;
Step 2, extracts local code feature:Local agent system reads in source code to be detected, using with high in the clouds detection service Device identical characteristics information extraction method, decomposition source code is code block, and extract the positional information of code block, structural information and Code block hashes characteristic information, into step 3;
Step 3, sets up local mapping table:Local agent system is locally-unique for each code block distribution obtained in step 2 Identifier, the incidence relation of the identifier and the corresponding source code of code block is set up, for subsequent step seven;Subsequently into Step 4;
Step 4, sends detection request:Local code characteristic information and code block that local agent system obtains step 2 Identifier upload to high in the clouds detection service device together, request high in the clouds detection service device carries out infringement detection;
Step 5, high in the clouds detection service device receives the code block message that transmits of local agent system, and by the code block message and Global characteristics information table is compared according to infringement rule;In practice, infringement rule can be repeated or code knot based on hashed value The statistical conditions that the corresponding hashed value of structure is repeated are defined;If the characteristic information and global characteristics of the code to be detected uploaded Characteristic information in storehouse belongs to infringement according to infringement rule, then records the information;After the completion for the treatment of that all code blocks are detected, into step Rapid six;Identifier labeled as the code block of infringement is issued to local agent system by step 6, high in the clouds detection service device;Step Rapid seven, local agent system receives the infringement code block message that high in the clouds detection service device is passed back, is reduced into using local mapping table Local visible code, is shown, notifies that required processing is acted.
CN201710171531.0A 2017-03-22 2017-03-22 A kind of software code infringement detection method Pending CN106951743A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710171531.0A CN106951743A (en) 2017-03-22 2017-03-22 A kind of software code infringement detection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710171531.0A CN106951743A (en) 2017-03-22 2017-03-22 A kind of software code infringement detection method

Publications (1)

Publication Number Publication Date
CN106951743A true CN106951743A (en) 2017-07-14

Family

ID=59473594

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710171531.0A Pending CN106951743A (en) 2017-03-22 2017-03-22 A kind of software code infringement detection method

Country Status (1)

Country Link
CN (1) CN106951743A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229170A (en) * 2018-02-02 2018-06-29 中科软评科技(北京)有限公司 Utilize big data and the software analysis method and device of neural network
CN110955758A (en) * 2019-12-18 2020-04-03 中国电子技术标准化研究院 Code detection method, code detection server and index server
CN110989991A (en) * 2019-10-25 2020-04-10 深圳开源互联网安全技术有限公司 Method and system for detecting source code clone open source software in application program
CN111552504A (en) * 2020-07-13 2020-08-18 深圳开源互联网安全技术有限公司 Asset information maintenance method and device of open source assembly and storage medium
CN115080924A (en) * 2022-07-25 2022-09-20 南开大学 Software license clause extraction method based on natural language understanding

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101697121A (en) * 2009-10-26 2010-04-21 哈尔滨工业大学 Method for detecting code similarity based on semantic analysis of program source code
CN101894236A (en) * 2010-07-28 2010-11-24 北京华夏信安科技有限公司 Software homology detection method and device based on abstract syntax tree and semantic matching
CN103020494A (en) * 2012-12-03 2013-04-03 哈尔滨工业大学 Program code programming mode copyright ownership detecting model and copyright ownership detecting method
CN103262047A (en) * 2010-12-15 2013-08-21 微软公司 Intelligent code differencing using code clone detection
CN103577323A (en) * 2013-09-27 2014-02-12 西安交通大学 Dynamic key command sequence birthmark-based software plagiarism detecting method
US20140053285A1 (en) * 2012-08-16 2014-02-20 Infosys Limited Methods for detecting plagiarism in software code and devices thereof
CN103729580A (en) * 2014-01-27 2014-04-16 国家电网公司 Method and device for detecting software plagiarism

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101697121A (en) * 2009-10-26 2010-04-21 哈尔滨工业大学 Method for detecting code similarity based on semantic analysis of program source code
CN101894236A (en) * 2010-07-28 2010-11-24 北京华夏信安科技有限公司 Software homology detection method and device based on abstract syntax tree and semantic matching
CN103262047A (en) * 2010-12-15 2013-08-21 微软公司 Intelligent code differencing using code clone detection
US20140053285A1 (en) * 2012-08-16 2014-02-20 Infosys Limited Methods for detecting plagiarism in software code and devices thereof
CN103020494A (en) * 2012-12-03 2013-04-03 哈尔滨工业大学 Program code programming mode copyright ownership detecting model and copyright ownership detecting method
CN103577323A (en) * 2013-09-27 2014-02-12 西安交通大学 Dynamic key command sequence birthmark-based software plagiarism detecting method
CN103729580A (en) * 2014-01-27 2014-04-16 国家电网公司 Method and device for detecting software plagiarism

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
JINGLING ZHAO: "An AST-Based Code Plagiarism Detection Algorithm", 《2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS》 *
刘军娜: "程序相似度检测算法", 《计算机与数字工程》 *
田振洲: "软件抄袭检测研究综述", 《信息安全学报》 *
石野 等: "基于语法树的程序相似度判定方法", 《吉林大学学报(信息科学版)》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108229170A (en) * 2018-02-02 2018-06-29 中科软评科技(北京)有限公司 Utilize big data and the software analysis method and device of neural network
CN108229170B (en) * 2018-02-02 2020-05-12 中科软评科技(北京)有限公司 Software analysis method and apparatus using big data and neural network
CN110989991A (en) * 2019-10-25 2020-04-10 深圳开源互联网安全技术有限公司 Method and system for detecting source code clone open source software in application program
CN110989991B (en) * 2019-10-25 2023-12-01 深圳开源互联网安全技术有限公司 Method and system for detecting source code clone open source software in application program
CN110955758A (en) * 2019-12-18 2020-04-03 中国电子技术标准化研究院 Code detection method, code detection server and index server
CN111552504A (en) * 2020-07-13 2020-08-18 深圳开源互联网安全技术有限公司 Asset information maintenance method and device of open source assembly and storage medium
CN111552504B (en) * 2020-07-13 2020-10-27 深圳开源互联网安全技术有限公司 Asset information maintenance method and device of open source assembly and storage medium
CN115080924A (en) * 2022-07-25 2022-09-20 南开大学 Software license clause extraction method based on natural language understanding
CN115080924B (en) * 2022-07-25 2022-11-15 南开大学 Software license clause extraction method based on natural language understanding

Similar Documents

Publication Publication Date Title
CN106951743A (en) A kind of software code infringement detection method
CN109377244B (en) Food fast traceability system and method based on multi-chain interconnection block chain network
CN107239891B (en) Bidding auditing method based on big data
CN109740317A (en) A kind of digital finger-print based on block chain deposits card method and device
CN110321675B (en) Webpage watermark-based generation and tracing method and device
WO2019222006A1 (en) Obfuscation and deletion of personal data in a loosely-coupled distributed system
JP6970686B2 (en) Salting text in database tables, text files, and data feeds
CN111104579A (en) Identification method and device for public network assets and storage medium
AU2012211490A1 (en) Systems and methods for identifying associations between malware samples
CN106250319A (en) Static code scanning result treating method and apparatus
CN104135737A (en) Method of obtaining network element configuration data of LTE (Long Term Evolution) network base station
Choi et al. Forensic recovery of SQL server database: Practical approach
CN104036187A (en) Method and system for determining computer virus types
CN104778123A (en) Method and device for detecting system performance
CN112163412A (en) Data verification method and device, electronic equipment and storage medium
CN116506230B (en) Data acquisition method and system based on RSA asymmetric encryption
CN108234392B (en) Website monitoring method and device
CN113177193A (en) Watermark adding method, watermark verifying method and terminal equipment
WO2012009740A1 (en) A piracy impeding process and system, link sorting processes and systems, notice processes and systems, process and system for determining the number of active leech peers, process and system for obtaining information indicative of the damage resulting from copyright infringement
CN114298882A (en) Watermark embedding method and tracing method for CAD data and electronic equipment
CN110647766A (en) Method and system for ensuring file downloading safety of data warehouse
CN116843352B (en) Block chain-based traditional Chinese medicine identification method, system, device and storage medium
CN113992334B (en) Storage method and verification method and device of equipment side data and electronic equipment
Sigvardsson Code Cloning Habits Of The Jupyter Notebook Community
CN114244823B (en) Penetration test method and system based on Http request automatic deformation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170714

WD01 Invention patent application deemed withdrawn after publication