Data encryption based safety use method of configuration file

A configuration file and data encryption technology, applied in the field of application security, can solve the problems of configuration files being easily read and identified, sensitive information acquisition, etc., to achieve the effect of convenient modification and convenient next use

Inactive Publication Date: 2015-05-27
长城超云(北京)科技有限公司
View PDF3 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The configuration files in the prior art have the following defects: the configuration files stored in plain text are easy to be read and identified, so that the sensitive information in them can be ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data encryption based safety use method of configuration file

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to better understand the technical problems solved by the present invention and the technical solutions provided, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The specific embodiments described here are only used to explain the implementation of the present invention, but not to limit the present invention.

[0025] In a preferred embodiment, figure 1 It exemplarily shows a schematic flow chart of a method for safely using a configuration file based on data encryption; including;

[0026] Read the plaintext of the configuration file; determine whether the plaintext in the read configuration file contains an identifier item by item; if the identifier exists, perform the following steps a.1 and a.2; if not The identifier, then proceed to the following step b; a.1: read the attribute value of the configuration file, and use an asymmetric key, a symmetric key or a certificate to encr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of application security, and specifically discloses a data encryption based safety use method of configuration file. The method comprises the steps of reading plaintexts of the configuration file; respectively determining whether the read plaintexts include identifiers; if so, reading the property value of the configuration file; encrypting the property value through an asymmetric key, a symmetric key or a certificate; backfilling the encrypted data in the property value to the plaintexts of the original configuration file to cover; adding the predefined sign bit as a marker of the encrypted configuration file; performing the following steps; if not so and that the property value of the read configuration file includes the predefined sign bit during use, identifying the configuration file into ciphertexts, and decrypting the property value for use; if the predefined sign bit cannot be read during use, directly using the configuration file, and repeatedly encrypting the property value. According to the method, the encrypting mode is set to protect the sensitive information in the configuration file, and the configuration file can be conveniently modified.

Description

technical field [0001] The invention relates to the technical field of application security, in particular to a method for safely using configuration files based on data encryption. Background technique [0002] A configuration file is a file used to save some configurable information in the software. The user profile is when the user logs on to the computer, or when the user is using the software. The software system is a collection of settings and files for the user to load the required environment. It includes all user-specific configuration settings such as program items, screen colors, network connections, printer connections, mouse settings, and window sizes and positions. Configuration files are mostly stored in plaintext or ciphertext; plaintext refers to information that can be read directly before encryption. Ciphertext refers to encrypted information that cannot be read directly. Configuration files are usually stored in plain text or encrypted as a whole. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/62
CPCG06F21/6209
Inventor 张涛
Owner 长城超云(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products