Unlock instant, AI-driven research and patent intelligence for your innovation.

Encryption method and device of dynamic library, and anti-hijacking method and device of dynamic library

An encryption method and dynamic library technology, applied in encryption devices with shift registers/memory, secure communication devices, digital transmission systems, etc., can solve the problem that dynamic libraries are easily hijacked by hackers, and achieve strong confidentiality and simple methods reliable effect

Inactive Publication Date: 2019-03-22
XUCHANG XJ SOFTWARE TECH +2
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The object of the present invention is to provide a dynamic library encryption method and device, which is used to solve the problem that if the dynamic library is not encrypted, it is easy to be hijacked by hackers, which will cause serious security risks. It also provides a dynamic library anti-hijacking method and The device is used to solve the problem that the dynamic library is easy to be hijacked by hackers, causing serious security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Encryption method and device of dynamic library, and anti-hijacking method and device of dynamic library
  • Encryption method and device of dynamic library, and anti-hijacking method and device of dynamic library
  • Encryption method and device of dynamic library, and anti-hijacking method and device of dynamic library

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Embodiment of dynamic library encryption method:

[0037] Dynamic library encryption methods such as figure 1 As shown, through the figure 2 The visual tool shown encrypts the dynamic library file, including the following steps:

[0038] 1) First read the dynamic library file that needs to be encrypted in the form of a binary stream, store the content of the dynamic library file in an array, that is, read it into the array, and calculate the MD5 check code of the dynamic library file, and check the MD5 Save the verification code;

[0039] 2) Adding extended data before or after the array, the extended data includes MD5 check code, and the dynamic library data added with the extended data is saved to form an encrypted dynamic library file.

[0040] In this embodiment, extended data is added behind the array, and the extended data includes MD5 check code, first data and second data. As other implementations, extended data can also be added in front of the array, and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an encryption method and device of a dynamic library, and an anti-hijacking method and device of the dynamic library, and is applicable to an intelligent substation station terminal. The encryption method of the dynamic library includes following steps: (1) reading a dynamic library file into an array, and calculating an MD5 verification code; and (2) adding extended databefore and after the array, and forming an encrypted dynamic library file by dynamic library data added with the extended data, wherein the extended data comprises the MD5 verification code. Accordingto the encryption method, each dynamic library file corresponds to one MD5 verification code, and the relation is unique so that the dynamic library is encrypted by adding the extended data includingthe MD5 verification code, and the method is simple and effective; and anti-hijacking verification is performed through the MD5 verification code so that the risk that the dynamic library is hijackedby a hacker can be effectively reduced, and the security of the system is further improved.

Description

technical field [0001] The invention relates to a dynamic library encryption method and device, and a dynamic library anti-hijacking method and device, which are suitable for intelligent substations. Background technique [0002] In order to ensure the safe operation of the power grid, in recent years, when carrying out safety protection inspections on various levels of power plants and substations, it is found that the safety protection measures and capabilities of the power station system are lower than those of the main station system, and the safety protection of the power station has become a grid pattern of the power monitoring system. The "short boards" in the security protection system are becoming more and more obvious, such as: the security management of the operation and maintenance personnel of the manufacturer is not in place, the access of mobile media and equipment is arbitrary and lacks the necessary monitoring means, the equipment security protection strategy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/06
CPCH04L9/0643H04L63/0428H04L63/1466
Inventor 王卫东刘登鑫张海庭朱斌斌张思远李宝潭方伟李瑞山牛津文
Owner XUCHANG XJ SOFTWARE TECH