SDK security enhancement method
A security and algorithm technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as low security intensity, data security threats, security risks, etc., to improve management security and reduce key leakage. risk effect
Pending Publication Date: 2021-07-09
沈阳微可信科技有限公司
0 Cites 0 Cited by
AI-Extracted Technical Summary
Problems solved by technology
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreMethod used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View moreAbstract
The invention discloses an SDK (Software Development Kit) security enhancement method, which comprises the following steps of: generating a white-box password corresponding to an SDK default key, and generating the white-box password through a white-box password algorithm by taking the SDK default key as input; then putting the lookup table of the white-box password and a cryptographic API (Application Program Interface) into an SDK (Software Development Kit); replacing a cryptographic AP using an SDK default key in the SDK with a cryptographic API in the white-box password; and finally, releasing the SDK again. According to the invention, the white-box cryptography technology is applied to encryption and decryption key protection of the SDK to protect the default key of the SDK, so that the security of the default key of the SDK can be ensured in a white-box attack environment, the risk of key leakage is effectively reduced, and the management security of the key is improved.
Application Domain
Technology Topic
Image
Examples
- Experimental program(1)
Example Embodiment
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more PUM


Description & Claims & Application Information
We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more Similar technology patents
Permission configuring method, device and system
InactiveCN102055601AImprove management securityUser identity/authority verificationData switching networksControl equipmentDatabase
Owner:GLOBAL INNOVATION AGGREGATORS LLC
VOIP call encryption method and terminal
InactiveCN108111506AReduce the risk of key compromiseImprove securityKey distribution for secure communicationProtocol for Carrying Authentication for Network AccessTrusted application
Owner:深圳市恒达移动互联科技有限公司
A method and system for temporarily manage an intelligent device
PendingCN109472125AImprove management efficiencyImprove management securityDigital data authenticationManagement efficiencyIntelligent equipment
Owner:GUANGDONG XIAOTIANCAI TECH CO LTD
Data processing method and device, equipment and machine readable medium
PendingCN111400726AImprove securityReduce the risk of key compromiseDigital data protectionInternal/peripheral component protectionMachine-readable mediumData processing
Owner:BANMA ZHIXING NETWORK HONGKONG CO LTD
Air conditioning module anti-counterfeiting method, operation control device and air conditioning equipment
PendingCN113432266AReduce the risk of key compromiseReduce chances of counterfeit useMechanical apparatusDigital data protectionKey leakageEncryption
Owner:FOSHAN SHUNDE MIDEA ELECTRONICS TECH CO LTD +1
Classification and recommendation of technical efficacy words
- Reduce the risk of key compromise
- Improve management security
VOIP call encryption method and terminal
InactiveCN108111506AReduce the risk of key compromiseImprove securityKey distribution for secure communicationProtocol for Carrying Authentication for Network AccessTrusted application
Owner:深圳市恒达移动互联科技有限公司
Data processing method and device, equipment and machine readable medium
PendingCN111400726AImprove securityReduce the risk of key compromiseDigital data protectionInternal/peripheral component protectionMachine-readable mediumData processing
Owner:BANMA ZHIXING NETWORK HONGKONG CO LTD
Air conditioning module anti-counterfeiting method, operation control device and air conditioning equipment
PendingCN113432266AReduce the risk of key compromiseReduce chances of counterfeit useMechanical apparatusDigital data protectionKey leakageEncryption
Owner:FOSHAN SHUNDE MIDEA ELECTRONICS TECH CO LTD +1