Service source code encryption storage, evaluation and authentication method
The invention relates to the technical field of information security, and discloses a service source code encryption storage and evaluation authentication method, and the encryption method comprises the following steps: generating a symmetric key, a first asymmetric key and a second asymmetric key;...
Gespeichert in:
Hauptverfasser: | , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention relates to the technical field of information security, and discloses a service source code encryption storage and evaluation authentication method, and the encryption method comprises the following steps: generating a symmetric key, a first asymmetric key and a second asymmetric key; encrypting a service source code through the symmetric key to obtain an encrypted source code; dividing the encrypted source code into code blocks, and recording the operation sequence of each code block; an operation control module, a decryption module and an encryption module are embedded in the encrypted source code; encrypting the operation sequence of the code blocks through the first public key to obtain an encrypted operation sequence; encrypting a symmetric key through the second public key to obtain an encrypted symmetric key; and storing the encrypted symmetric key and the first private key in the UKEY. According to the method, the confidentiality of core codes and algorithms is effectively protected, the |
---|