Encryption method and device of dynamic library, and anti-hijacking method and device of dynamic library
An encryption method and dynamic library technology, applied in encryption devices with shift registers/memory, secure communication devices, digital transmission systems, etc., can solve the problem that dynamic libraries are easily hijacked by hackers, and achieve strong confidentiality and simple methods reliable effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0036] Embodiment of dynamic library encryption method:
[0037] Dynamic library encryption methods such as figure 1 As shown, through the figure 2 The visual tool shown encrypts the dynamic library file, including the following steps:
[0038] 1) First read the dynamic library file that needs to be encrypted in the form of a binary stream, store the content of the dynamic library file in an array, that is, read it into the array, and calculate the MD5 check code of the dynamic library file, and check the MD5 Save the verification code;
[0039] 2) Adding extended data before or after the array, the extended data includes MD5 check code, and the dynamic library data added with the extended data is saved to form an encrypted dynamic library file.
[0040] In this embodiment, extended data is added behind the array, and the extended data includes MD5 check code, first data and second data. As other implementations, extended data can also be added in front of the array, and t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


