Secret key storage method and device, secret key calling method and device, storage medium and electronic device

A key storage and key technology, applied in the computer field, can solve problems such as insufficient key security of dynamic link library files, and achieve the effects of solving the problem of insufficient key security, improving key security, and improving key security.

Pending Publication Date: 2022-08-02
联动优势电子商务有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The main purpose of this application is to provide a key storage, call method and device, storage mediu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secret key storage method and device, secret key calling method and device, storage medium and electronic device
  • Secret key storage method and device, secret key calling method and device, storage medium and electronic device
  • Secret key storage method and device, secret key calling method and device, storage medium and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make those skilled in the art better understand the solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. Obviously, the described embodiments are only The embodiments are part of the present application, but not all of the embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the scope of protection of the present application.

[0031] It should be noted that the terms "first", "second", etc. in the description and claims of the present application and the above drawings are used to distinguish similar objects, and are not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a key storage method and device, a key calling method and device, a storage medium and an electronic device. The method comprises the steps that preset file configuration information is stored in a preset compiling language, and the preset file configuration information at least comprises one of the following information: secret key information, an ID of an operating system client application and signature summary information of the operating system application; in the method for obtaining the key information provided by the preset compiling language, the ID of the client application of the operating system and the signature summary information of the application of the operating system need to be verified; and compiling the code in the preset compilation language to obtain a target dynamic link library file. According to the application, the technical problem of insufficient key security of the dynamic link library file is solved. According to the invention, the feature information is added in the storage stage, and the verification is added in the calling stage, so that the key security is improved.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular, to a key storage and invocation method and device, storage medium, and electronic device. Background technique [0002] A key acts as a "key" to which other information can be obtained. Generally, an executable program corresponding to the C or C++ language is obtained by saving the original key in the C language or the C++ language, which is generally a .so file. The generated .so file cannot be decompiled to obtain the original key information, which completes the storage of the key. The Java language calls the .so file through JNI to get the key. [0003] In the related art, although the original key is stored in the C language and the C++ language, a corresponding executable program is obtained, for example, a .so dynamic link library file is obtained. The Java language calls the .so file through JNI to get the key. Although this can ensure that the C langua...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/57G06F21/64G06F8/30G06F8/41
CPCG06F21/572G06F21/64G06F8/315G06F8/41
Inventor 田晓阳高志国吴福军
Owner 联动优势电子商务有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products