Method and device for quickly releasing program dependence
A procedural and fast technology, applied in the field of network security, can solve problems such as poor user experience, complex operation, and complex operating environment
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0051] figure 1 It is a flowchart of a method for quickly releasing program dependencies provided by Embodiment 1 of the present invention.
[0052] refer to figure 1 , the method includes the following steps:
[0053] Step S11, obtaining basic environmental information;
[0054] Step S12, determining the conditions of the current operating environment according to the basic information of the environment;
[0055] Specifically, the basic environment information includes but is not limited to the operating system type, operating system version, and processor architecture. The operating system type includes windows, linux, and unix. The operating system version includes win10, winxp, centos6, and centos7. The processor architecture includes amd64, mips and arm64, after combining the operating system type, operating system version and processor architecture, the conditions of the current operating environment are obtained. For example, the conditions of the current operating...
Embodiment 2
[0074] figure 2 It is a schematic diagram of a device for quickly releasing program dependence provided by Embodiment 2 of the present invention.
[0075] refer to figure 2 , the device consists of:
[0076] The basic environmental information acquisition unit 1 is used to acquire basic environmental information;
[0077] A determining unit 2, configured to determine the conditions of the current operating environment according to the basic information of the environment;
[0078] The search unit 3 is used to search the corresponding dependent files from the list according to the conditions of the current operating environment;
[0079] The encoding unit 4 is used to encode the dependent file to obtain a character string;
[0080] Calculation unit 5, used to pass the character string through the hash algorithm to obtain the current feature code;
[0081] Comparison unit 6, used to compare the current feature code with the pre-stored feature code;
[0082] The decoding ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

