Data security calling method and device

A data call and data security technology, applied in the field of data processing, can solve problems such as illegal acquisition and insufficient security of data call process

Inactive Publication Date: 2019-03-19
北京云纵信息技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, important resources compiled in unmanaged languages ​​can be called by others normally, and are very likely to be obtained illegally. Therefore, in the prior art, the calling process of data is not safe enough and may be obtained illegally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security calling method and device
  • Data security calling method and device
  • Data security calling method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] Embodiment 1 of the present application provides a data security call method, such as figure 1 As shown, the following steps S100-S102 are included:

[0053] S100. Obtain an executable file corresponding to the target process when receiving a data calling instruction of the target process.

[0054] Process (Process) is a running activity of a program in a computer on a certain data set. It is the basic unit of resource allocation and scheduling in the system and the basis of the operating system structure. When multiple programs are executed, they need to share system resources, so that As a result, each program has a mutual restriction relationship in the execution process, and the execution of the program shows the characteristics of discontinuity. These features all occur during the execution of the program, which is a dynamic process, while the traditional program itself is a set of instructions, which is a static concept and cannot describe the execution of the pr...

Embodiment 2

[0097] Embodiment 2 of the present application provides a data security calling device 600, such as Figure 6 shown, including:

[0098] The obtaining module 601 is configured to obtain an executable file corresponding to the target process when receiving a data calling instruction of the target process.

[0099] The determination module 602 is configured to determine the characteristic value of the executable file.

[0100] Returning module 603, configured to verify whether the characteristic value is legal, and if so, return the stored data corresponding to the characteristic value to the target process.

[0101] Optionally, the obtaining module 601 is specifically configured to:

[0102] A process number corresponding to the target process is determined according to the target process.

[0103] Find the executable file corresponding to the process number according to the process number.

[0104] Optionally, the determination module 602 is specifically configured to:

...

Embodiment 3

[0122] Embodiment 3 of the present application also provides an electronic device 700, such as Figure 7 As shown, it includes: a processor 701, a memory 702, and a bus 703. The memory 702 stores machine-readable instructions executable by the processor 701. When the electronic device is running, the processor 701 communicates with the memory 702 through the bus. The processor 701 executes the following machine-readable instructions stored in memory 702:

[0123] When the data calling instruction of the target process is received, the executable file corresponding to the target process is obtained.

[0124] Determine the characteristic value of the executable file.

[0125] Verify whether the characteristic value is legal, and if so, return the stored data corresponding to the characteristic value to the target process.

[0126] Optionally, the execution instructions executed by the processor 701 specifically include:

[0127] A process number corresponding to the target pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a data security calling method and device, and the method comprises the steps: obtaining an executable file corresponding to a target process when receiving adata calling instruction of the target process; determining a feature value of the executable file; Verifying whether the characteristic value is legal or not, and if yes, returning the storage data corresponding to the characteristic value to the target process. According to the embodiment of the invention, the security of data calling is improved.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular, to a method and device for safely invoking data. Background technique [0002] After the program written in the managed language is compiled by the compiler, the source code is converted into an intermediate language. And there are a lot of software on the market that can decompile the intermediate language into source code. As a result, some important resources and information in the program cannot be effectively guaranteed. [0003] In the prior art, important resources and information are generally contained in a non-managed language and called by a managed language. Since the unmanaged language can only be decompiled into machine language, the source code cannot be obtained. So as to achieve the purpose of protecting code and resources. [0004] However, important resources compiled in an unmanaged language can be called normally by others, and are ver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/44G06F21/62
CPCG06F21/44G06F21/6218
Inventor 李建飞陈文锋郑昀
Owner 北京云纵信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products