Encryption and decryption method for module
A technology for encryption, decryption and identification modules, which is applied in the field of encryption and decryption, can solve the problems of many restrictions on use, poor scalability, no access control, unified troubleshooting, etc., and achieve the effect of high system maintainability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0047] Please see attached Figure 4 As shown, the module encryption and decryption method of the present invention includes a multi-channel interface module 1, an application process identification module 2, a unified error reporting processing module 3, a temporary directory, a file management module 4, a Microsoft ApiHook library 5, an AES encryption and decryption library 6, and data verification Module 7 , authority control module 8 , copy authority control module 9 , file drag and drop control module 10 , multi-document control assignment module 11 , multi-document module 12 and security protection module 13 .
[0048] Please see attached figure 1 As shown, the steps of the module encryption and decryption method of the present invention are as follows:
[0049] Step 1, the user attempts to load all newly launched applications in the form of a dynamic link library (DLL) through the system registry key:
[0050] In step 1.1, the Attach processing determines whether cont...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 