SDK security enhancement method

A security and algorithm technology, applied in computer security devices, program/content distribution protection, instruments, etc., can solve problems such as low security intensity, data security threats, security risks, etc., to improve management security and reduce key leakage. risk effect

Pending Publication Date: 2021-07-09
沈阳微可信科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] At present, the methods of splitting or obfuscation are mainly used to protect the SDK default key, and its security strength is low. Attackers can steal the SDK default key at will, which brings

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDK security enhancement method

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0021] Next, the technical solutions in the embodiments of the present invention will be apparent from the embodiment of the present invention, and it is clearly described, and it is understood that the described embodiments are merely embodiments of the present invention, not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art are in the scope of the present invention, in order to facilitate the understanding of the above technical solutions of the present invention, the above techniques of the present invention will be described below. The solution will be described in detail.

[0022] Such as figure 1 As shown, an SDK security enhancement method according to an embodiment of the present invention, including the first white box password corresponding to the SDK default key, with the SDK default key is input, for example: unsigned char key [16] = { 0xE8, 0xA4, 0X50, 0x1B, 0XA4, 0x21, 0x86,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SDK (Software Development Kit) security enhancement method, which comprises the following steps of: generating a white-box password corresponding to an SDK default key, and generating the white-box password through a white-box password algorithm by taking the SDK default key as input; then putting the lookup table of the white-box password and a cryptographic API (Application Program Interface) into an SDK (Software Development Kit); replacing a cryptographic AP using an SDK default key in the SDK with a cryptographic API in the white-box password; and finally, releasing the SDK again. According to the invention, the white-box cryptography technology is applied to encryption and decryption key protection of the SDK to protect the default key of the SDK, so that the security of the default key of the SDK can be ensured in a white-box attack environment, the risk of key leakage is effectively reduced, and the management security of the key is improved.

Description

technical field [0001] The present invention relates to the technical field of computer internet of things, in particular to an SDK security enhancement method. Background technique [0002] SDK generally refers to a software development kit. Software development kits are generally a collection of development tools used by software engineers to create application software for specific software packages, software frameworks, hardware platforms, and operating systems. [0003] The SDK default key is used more and more in the IoT field to connect to the cloud, secure chips, trusted execution environments, etc. In order to achieve functions such as secure communication and authentication, the SDK will integrate cryptographic algorithms and corresponding keys. We call this key the SDK default key; however, with the continuous escalation of Internet of Things attacks, the security of the SDK default key has become a new hidden danger in the supply chain security. At the same time...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/60
CPCG06F21/12G06F21/602
Inventor 张志阳张志坚程新林旭喆
Owner 沈阳微可信科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products