Library file encryption method, decryption method and encryption device
An encryption method and technology of an encryption device, which are applied in the embedded field, can solve the problems of increasing cost and increasing complex decryption methods, and achieve the effects of preventing content leakage, ensuring convenience and development efficiency, and improving security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0041] The method and device of the present application will be described in detail below with reference to the accompanying drawings and specific implementation manners. It should be understood that the embodiments shown in the drawings and described below are for illustrative purposes only, and are not intended to limit the application.
[0042] figure 1 A flow chart showing a specific implementation of the library file encryption method provided by this application, refer to figure 1 , the method includes the following steps:
[0043] S101: Use the public key to encrypt the library file to form an encrypted library file.
[0044] It can be understood that the public key in this application can be generated in advance. Specifically, a pair of public key and private key can be obtained by using an asymmetric encryption algorithm, and there is a unique correspondence between the two. Encrypt the library file based on the generated public key to generate an encrypted libr...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com