Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Configuration item decryption method, apparatus, computer device, and storage medium

A technology of configuration items and computer programs, which is applied in the computer field, can solve problems such as high performance consumption and low efficiency of configuration items, and achieve the effect of reducing performance consumption and improving decryption efficiency

Pending Publication Date: 2019-03-12
CHINA PING AN LIFE INSURANCE CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this decryption method requires re-decryption every time a configuration item is needed, which makes the efficiency of the configuration item low, resulting in a relatively high performance consumption of the product at runtime

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Configuration item decryption method, apparatus, computer device, and storage medium
  • Configuration item decryption method, apparatus, computer device, and storage medium
  • Configuration item decryption method, apparatus, computer device, and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0054] The configuration item decryption method provided by this application can be applied in such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the decryption server 104 through the network. The terminal 102 receives the startup instruction of the application program, and loads the configuration file of the application program according to the startup instruction; when the preset symbol in the configuration file is loaded, the first configuration item corresponding to the preset symbol and the decryption server 104 are obt...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to the field of information security and provides a configuration item decryption method, apparatus, computer device and storage medium. The method comprises the following steps: receiving a startup instruction of an application program and loading a configuration file of the application program according to the startup instruction; Obtaining a first configuration item corresponding to the preset symbol and a decryption server address in the configuration file when the preset symbol is loaded into the configuration file; Sending the first configuration item to the decryption server according to the address of the decryption server, so that the decryption server searches the second configuration item corresponding to the first configuration item in the presetdatabase according to the first configuration item; The second configuration item returned by the decryption server is received and saved in memory. By adopting the method, the decryption efficiencyof the configuration item can be improved, and the consumption of the running performance of the product can be reduced.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a configuration item decryption method, device, computer equipment and storage medium. Background technique [0002] At present, some configuration files need to be developed during application product development, and the configuration items in the configuration files need to be loaded to run normally when the product is running. For example, if the product uses a database, the database name and corresponding password will be configured in the configuration file. In order to prevent the leakage of these configuration items. At present, the configuration items in the configuration file are encrypted. When the configuration item needs to be used, the configuration item will be decrypted to obtain the decrypted information of the configuration item. However, in this decryption method, every time a configuration item needs to be used, it needs to be decrypted again, so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62G06F9/445
CPCG06F9/4451G06F21/6209G06F2221/2107
Inventor 林鹏
Owner CHINA PING AN LIFE INSURANCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products