Front-end code processing method and device
A processing method and code technology, applied to encryption devices with shift registers/memory and key distribution, can solve problems such as increasing the cost of cracking keys, and achieve the effects of reducing the risk of key exposure, reducing losses, and avoiding time-consuming
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0053] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as recited in the appended claims.
[0054]For the encryption key of the front-end code, the current industry usually: obtain the key from the server through an interface request; store the key in the local client cache; or store the key in the obfuscated compression code of the client. However, none of the above-mentioned processing methods for encryption keys can guarantee the security of the keys. Embodiments of the present invent...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


