Dismiss
InnovationQ will be updated on Sunday, Oct. 22, from 10am ET - noon. You may experience brief service interruptions during that time.
Browse Prior Art Database

Method for a JavaScript Obfuscator

IP.com Disclosure Number: IPCOM000015608D
Original Publication Date: 2002-Feb-01
Included in the Prior Art Database: 2003-Jun-20
Document File: 3 page(s) / 72K

Publishing Venue

IBM

Abstract

Method for a Javascript Obfuscator A method is disclosed that obfuscates Javascipt files. Obfuscation is taken for the root word obfuscate (v : to make obscure or unclear). Although this method is true to the meaning of obfuscate, it has much more value than just obfuscation. It also decreases the size of Javascript files, speeds up the load time, and helps Javascript run faster. Below is a flow chart for this method: 1

This text was extracted from a PDF file.
At least one non-text object (such as an image or picture) has been suppressed.
This is the abbreviated version, containing approximately 100% of the total text.

Page 1 of 3

Method for a JavaScript Obfuscator

Method for a Javascript Obfuscator

A method is disclosed that obfuscates Javascipt files. Obfuscation is taken for the root word obfuscate (v : to make obscure or unclear). Although this method is true to the meaning of obfuscate, it has much more value than just obfuscation. It also decreases the size of Javascript files, speeds up the load time, and helps Javascript run faster.

Below is a flow chart for this method:

1

Page 2 of 3

The first step of this method is to find the file to obfuscate (.js, .html, .htm, etc...).

It the file is available, open the file. Next, find each token (function and variable names) and check to make sure that it is not a DHTML/Javascript keyword. If it is a keyword, go get the

2

[This page contains 1 picture or other non-text object]

Page 3 of 3

next token. If it isn't a keyword, check to see if the token exist in the symbol table. If it exist, replace the token with the new obfuscated name. If it does not exist, add the token to the symbol table, then replace the token with the new obfuscated name. Continue this process for each token and each file that requires obfuscation.

3