Service source code encryption storage, evaluation and authentication method

The invention relates to the technical field of information security, and discloses a service source code encryption storage and evaluation authentication method, and the encryption method comprises the following steps: generating a symmetric key, a first asymmetric key and a second asymmetric key;...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: GUO HUI, DONG MING, YAO TUOZHONG, PEI GAOXIANG, HU MINGGUANG, YE HONGWU, CHEN DANER, SHEN CHENGTAO
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention relates to the technical field of information security, and discloses a service source code encryption storage and evaluation authentication method, and the encryption method comprises the following steps: generating a symmetric key, a first asymmetric key and a second asymmetric key; encrypting a service source code through the symmetric key to obtain an encrypted source code; dividing the encrypted source code into code blocks, and recording the operation sequence of each code block; an operation control module, a decryption module and an encryption module are embedded in the encrypted source code; encrypting the operation sequence of the code blocks through the first public key to obtain an encrypted operation sequence; encrypting a symmetric key through the second public key to obtain an encrypted symmetric key; and storing the encrypted symmetric key and the first private key in the UKEY. According to the method, the confidentiality of core codes and algorithms is effectively protected, the