CN109858241A - A kind of single device code security executes and exchange method and its interactive system - Google Patents
A kind of single device code security executes and exchange method and its interactive system Download PDFInfo
- Publication number
- CN109858241A CN109858241A CN201711169338.XA CN201711169338A CN109858241A CN 109858241 A CN109858241 A CN 109858241A CN 201711169338 A CN201711169338 A CN 201711169338A CN 109858241 A CN109858241 A CN 109858241A
- Authority
- CN
- China
- Prior art keywords
- code
- ciphertext
- operating system
- implementing result
- single device
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention relates to a kind of single device code securities to execute and exchange method and its interactive system, including display and operating system, it is provided with encrypted file system and encrypting module and function call interception card module in an operating system, user issues the close cultural security of code dynamic to operating system and executes request, and file system requests encrypting module carries out coding encrypting and generates code ciphertext;File system proposes the request of ciphertext code conversion to encrypting module;Encrypting module returns to operating system after carrying out ciphertext code conversion;Encrypting module returns to operating system after carrying out ciphertext code conversion to the ciphertext of code operation result;Operating system by the ciphertext of non-switched code operation result with can show or the ciphertext of the accessible code operation result of interface merges, fusion results are sent to display or Processing Interface, and display is shown or Processing Interface handles operation result corresponding with code request.The safety of code in effective protection operating system of the present invention.
Description
Technical field
The invention belongs to the technical fields of single device code security protection more particularly to a kind of single device code security to execute
With exchange method and its interactive system.
Background technique
In the interbehavior of people and computer, code security is a problem to be solved.Have in the prior art various
Technical solution come ensure the links such as hard disc of computer, memory, screen cache save code security.There is peace in the prior art
It is complete that interbehavior is excessively cumbersome, is easy problem under attack.The present invention solves the generation of single device from a completely new angle
The execution of code safety, interface and interaction problems.
Summary of the invention
Technical problem to be solved by the present invention lies in, provide a kind of single device code security execute and exchange method and its
Interactive system, it is intended to solve code security execution and interbehavior is excessively cumbersome, is easy technical problem under attack.
It is executed and exchange method the invention is realized in this way providing a kind of single device code security, including following specific
Step:
(1), user issues the close cultural security of code dynamic to its file system using the operating system of single device and executes request,
The code includes code plaintext and/or code ciphertext, and it includes its file system to code plaintext that the safety, which executes request,
It carries out coding encrypting or/and carries out the request of ciphertext conversion dynamic generation code ciphertext to the code ciphertext;
(2), the file system proposes to encode the code in plain text to the encrypting module being arranged in single device memory
Encryption carries out the request of ciphertext code conversion to the code ciphertext, and code plaintext or cipher text is sent to encrypting module simultaneously;
(3), after the encrypting module carries out coding encrypting to the code in plain text or carries out ciphertext code conversion to the code ciphertext
Executable code ciphertext after conversion is returned into operating system;
(4), the operating system carries out execution calculation process to executable code ciphertext, and obtains code implementing result
Ciphertext;
(5), before the ciphertext of the code implementing result is pushed to user or relevant treatment interface, the operating system is first
It proposes to carry out the ciphertext of code implementing result the request of ciphertext code conversion to encrypting module, and by the ciphertext of code implementing result
It is sent to encrypting module;The operating system will intercept simultaneously to be shown or other relevant treatment interfaces are by image to be processed
And/or character code;
(6), the encrypting module executes the code after conversion to after the ciphertext progress ciphertext code conversion of code implementing result
As a result ciphertext returns to operating system;
(7), the ciphertext of the ciphertext of the non-switched code implementing result of the operating system and converted code implementing result into
Row fusion, which is generated, executes safely that request is corresponding to be shown or the accessible code execution of other relevant interfaces with personal code work
As a result, the display screen of single device shows that code implementing result or/and relevant interface handle code implementing result.
The embodiments of the present invention are implemented as follows, and a kind of single device code security executes and interactive system, including display screen,
Processing Interface, human-computer interaction and operating system are provided with encrypted file system in the operating system, function call interception is inserted
Part module and encrypting module,
User issues the close cultural security of code dynamic to its file system using the operating system of single device and executes request, the generation
Code includes code plaintext and/or code ciphertext, and it includes that its file system compiles code plaintext that the safety, which executes request,
Code encryption or/and the request that ciphertext conversion dynamic generation code ciphertext is carried out to the code ciphertext;
The file system carries out coding encrypting or close to the code to the proposition of the encrypting module of operating system in plain text to the code
Text carries out the request of ciphertext code conversion, and the code plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module will conversion after carrying out coding encrypting or code ciphertext progress ciphertext code conversion in plain text to the code
Executable code ciphertext afterwards returns to operating system;
The operating system processes and executes executable code ciphertext, and obtains the ciphertext of code implementing result;
Before the ciphertext of the code implementing result is pushed to user or relevant treatment interface, the operating system elder generation Xiang Jiami
Module proposes to carry out the request of ciphertext code conversion to the ciphertext of code implementing result, and the ciphertext of code implementing result is sent to
Encrypting module;The operating system will intercept simultaneously to be shown or other relevant treatment interfaces are by image to be processed and/or text
Word code;
The encrypting module carries out the code implementing result after conversion after ciphertext code conversion the ciphertext of code implementing result
Ciphertext return to operating system;
The operating system carries out the ciphertext of the ciphertext of non-switched code implementing result and converted code implementing result
Fusion generates show or other relevant treatment interface accessible codes hold corresponding with personal code work safety execution request
Row is as a result, the display screen of single device shows that code implementing result or/and relevant interface handle code implementing result.
Compared with prior art, single device code security of the invention execute and exchange method and its interactive system have with
Lower feature:
1. code most times in the memory, CPU, network of terminal are all disposable ciphertexts, all without complete
Plaintext code at most also only has part plaintext code, encrypts or encrypt converted meter obtained in the encrypting module each time
Calculation machine execute code integrality, validity be all it is different and unique, the implementing result of ciphertext code is also ciphertext, out
Locate the operation of identical its computer of ciphertext code binary result be also it is different, this has at all with existing Code obfuscation
Difference.
2. the encrypted state of ciphertext code in a hard disk and the encryption text shape in other component (memory, CPU, network etc.)
Disposable stochastic transformation relationship mathematically is only existed between state, it can not be from the ciphertext code and its attribute (API tune on these components
With, variable name, function name, pointer, execute process etc.) find corresponding code and its attribute on hard disk.
3. even if code needs to be decrypted into plaintext code in the application, can not also find on hard disk corresponding ciphertext code and
Its attribute (API Calls, variable name, function name, pointer, execution process etc.), does not injure the safety of ciphertext code in hard disk.
4. human-computer interaction is also to be completed by disposable ciphertext code, usability, safety and the body of user are not influenced
The consistency tested.
5. Processing Interface is also to be completed by disposable ciphertext code, the usability of interface, safety, consistent is not influenced
Property and integrality.
6. ciphertext code and original plaintext code have same enforceability, the usability and execution one of code are not influenced
Cause property.
7. identical its operation result of ciphertext code in source is also secret and transparent for executor (computer CPU)
, and the result executed every time be all it is different, but the effect of overall execution to attendee (such as people, Processing Interface and
Encrypting module etc.) it is equivalent, " correct " property is judged by the people that is serviced or computer.
8. disposable safe conversion can be carried out between ciphertext code and ciphertext code, the safety of ciphertext code is not injured
Property.
Detailed description of the invention
Fig. 1 is the schematic illustration of one preferred embodiment of single device code operational safety method of the present invention.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below
Accompanying drawings and embodiments are closed, the present invention will be described in further detail.It should be appreciated that specific embodiment described herein is only
To explain the present invention, it is not intended to limit the present invention.
It please refers to shown in Fig. 1, single device code security of the present invention executes and the preferred embodiment of exchange method, including as follows
Specific steps:
(1), user issues the close cultural security of code dynamic to its file system using the operating system of single device and executes request,
The code include code in plain text and/or code ciphertext, the code include executable source code, compiling byte stream code,
At least one of cpu instruction code of compiling etc., it is described safety execute request include its file system to the code in plain text into
Row coding encrypting or/and the request that ciphertext conversion dynamic generation code ciphertext etc. is carried out to the code ciphertext.
(2), the file system proposes to carry out the code in plain text to the encrypting module being arranged in single device memory
Coding encrypting carries out the request of ciphertext code conversion to the code ciphertext, and the code plaintext or cipher text is sent to encryption simultaneously
Module.The code ciphertext includes variable parameter corresponding to code function and code function, for example including soft keyboard,
Cookie, token request etc..Variable parameter corresponding to code function and code function be all it is safe, even if computer
CPU does not reach plaintext code, and also without plaintext code in memory, code security implementing result, also only the talent can be seen
White and encrypting module could be authenticated to mistake.
(3), the encrypting module carries out coding encrypting in plain text to the code or carries out ciphertext coding turn to the code ciphertext
The executable code ciphertext after conversion is returned into operating system after changing.
(4), the operating system carries out execution calculation process to executable code ciphertext, and obtains code and execute knot
The ciphertext of fruit.The accessible code operation result of described displayable or Processing Interface is also ciphertext, the ciphertext include encryption and/
Or variable parameter corresponding to the code function and code function obscured at random etc..
(5), before the ciphertext of the code implementing result is pushed to user or relevant treatment interface, the operation system
System first proposes to carry out the ciphertext of code implementing result the request of ciphertext code conversion to encrypting module, and by code implementing result
Ciphertext is sent to encrypting module;The operating system will intercept simultaneously to be shown or other relevant treatment interfaces are by figure to be processed
Picture and/or character code.
(6), the encrypting module carries out the code after conversion after ciphertext code conversion the ciphertext of code implementing result
The ciphertext of implementing result returns to operating system.The ciphertext of displayable or accessible interface code operation result is not limited to wrap
At least one of contain: in subcode, ciphertext, font, CSS, HTML, js code etc..
(7), the operating system is by the ciphertext of non-switched code implementing result and converted code implementing result
Ciphertext carries out fusion and generates show or other relevant treatment interfaces can be handled corresponding with personal code work safety execution request
Code implementing result, the display screen of single device show or/and relevant interface processing processing code implementing result.In this step
The fusion results for being sent to display screen or interface are disposable, fusion, interactive and implementing result binary coding after refreshing
It is not identical every time, but the semanteme for the content that user sees or interface receives is to understand and constant.In display screen or interface
Code is arranged by safe handling, including without complete real code, without plain code human-computer interaction, the implementing result safety such as tokenized
It applies.The effect and original plaintext code correctness of operating system overall execution are equivalent: computer executes code " correct ", human-computer interaction
" correct ", " correct " are equal to " encrypting module can be confirmed " or " people can understand ".In the present invention, step (2) and step
(3) it can be repeated several times until code ciphertext carries out ciphertext code conversion completely.
A kind of single device code security of the invention executes and interactive system, including display screen, Processing Interface, human-computer interaction
And operating system, encrypted file system, function call interception card module and encrypting module are provided in the operating system,
User issues the close cultural security of code dynamic to its file system using the operating system of single device and executes request, the code packet
Containing code in plain text and/or code ciphertext, this safely execute request include file system to the code in plain text carry out coding encrypting or/
With the request etc. for carrying out ciphertext conversion dynamic generation code ciphertext to the code ciphertext.The file system adds to operating system
Close module proposition carries out coding encrypting to the code in plain text or carries out the request of ciphertext code conversion to the code ciphertext, and simultaneously
The code plaintext or cipher text is sent to encrypting module.The encrypting module carried out coding encrypting to the code or in plain text to the generation
The executable code ciphertext after conversion is returned into operating system after code ciphertext progress ciphertext code conversion.The operating system
Executable code ciphertext is processed and executed, and obtains the ciphertext of code implementing result.In the code implementing result
Ciphertext be pushed to before user or other Processing Interfaces, the operating system is first proposed to encrypting module to code implementing result
Ciphertext carry out the request of ciphertext code conversion, and the ciphertext of code implementing result is sent to encrypting module.The operating system
Intercepting simultaneously will show or other relevant treatment interfaces are by image to be processed and/or character code.The encrypting module pair
The ciphertext of the code implementing result after conversion is returned into operation system after the ciphertext progress ciphertext code conversion of code implementing result
System.The operating system melts the ciphertext of non-switched code implementing result and the ciphertext of converted code implementing result
Request is corresponding to be shown or the accessible code implementing result of other relevant interfaces at executing safely with personal code work for symphysis,
The display screen of single device is shown or relevant interface processing code implementing result.
The code is ciphertext, which includes but is not limited to variable parameter corresponding to code function and code function
Deng all can safely executing, even if computer CPU does not all reach plaintext code, also without plaintext code in memory.
The code function that is described to show or the accessible code operation result of interface is ciphertext, obscuring comprising encryption and/or at random
And variable parameter corresponding to code function etc..The fusion results for being sent to display screen or Processing Interface are disposable, brushes
Fusion, interactive and implementing result binary coding be not identical every time after new, the content that user sees or Processing Interface receives
Semanteme is to understand and constant.The file system proposes close to code to the encrypting module being arranged in single device memory
Text carry out ciphertext code conversion request and the encrypting module to code ciphertext carry out ciphertext code conversion after by after conversion can
The code ciphertext of execution returns to file system and is repeated several times until code ciphertext carries out ciphertext code conversion completely.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention
Made any modifications, equivalent replacements, and improvements etc., should all be included in the protection scope of the present invention within mind and principle.
Claims (10)
1. a kind of single device code security executes and exchange method, comprise the following specific steps that:
(1), user issues the close cultural security of code dynamic to its file system using the operating system of single device and executes request,
The code includes code plaintext and/or code ciphertext, and it includes its file system to code plaintext that the safety, which executes request,
It carries out coding encrypting or/and carries out the request of ciphertext conversion dynamic generation code ciphertext to the code ciphertext;
(2), the file system proposes to encode the code in plain text to the encrypting module being arranged in single device memory
Encryption carries out the request of ciphertext code conversion to the code ciphertext, and the code plaintext or cipher text is sent to encryption mould simultaneously
Block;
(3), after the encrypting module carries out coding encrypting to the code in plain text or carries out ciphertext code conversion to the code ciphertext
Executable code ciphertext after conversion is returned into operating system;
(4), the operating system carries out execution calculation process to executable code ciphertext, and obtains code implementing result
Ciphertext;
(5), before the ciphertext of the code implementing result is pushed to user or relevant treatment interface, the operating system is first
It proposes to carry out the ciphertext of code implementing result the request of ciphertext code conversion to encrypting module, and by the ciphertext of code implementing result
It is sent to encrypting module;The operating system will intercept simultaneously to be shown or other relevant treatment interfaces are by image to be processed
And/or character code;
(6), the encrypting module executes the code after conversion to after the ciphertext progress ciphertext code conversion of code implementing result
As a result ciphertext returns to operating system;
(7), the operating system by the ciphertext of non-switched code implementing result with it is close with converted code implementing result
Text carries out fusion and generates show or other relevant interfaces accessible code corresponding with personal code work safety execution request
Implementing result, the display screen of single device show that code implementing result or/and relevant interface handle code implementing result.
2. single device code security as described in claim 1 executes and exchange method, which is characterized in that the code is close
Text, the ciphertext include variable parameter corresponding to code function and code function, all can safely be executed, even if meter
Calculation machine CPU does not reach plaintext code, without plaintext code in memory yet.
3. single device code security as described in claim 1 executes and exchange method, which is characterized in that it is described displayable or
The accessible code operation result of Processing Interface is ciphertext, the ciphertext include encryption and/or the code function obscured at random and
Variable parameter corresponding to code function.
4. single device code security as described in claim 1 executes and exchange method, which is characterized in that sent out in step (7)
The fusion results for being sent to display screen or Processing Interface are disposable, fusion, interactive and implementing result binary system volume after refreshing
Code is not identical every time, and the semanteme for the content that user sees or Processing Interface receives is to understand and constant.
5. single device code security as described in claim 1 executes and exchange method, which is characterized in that step (2) and step
(3) it is repeated several times until relevant code ciphertext carries out ciphertext code conversion completely.
6. a kind of single device code security executes and interactive system, which is characterized in that including display screen, Processing Interface, man-machine friendship
Mutual and operating system is provided with encrypted file system, function call interception card module and encryption mould in the operating system
Block,
User issues the close cultural security of code dynamic to its file system using the operating system of single device and executes request, the generation
Code includes code plaintext and/or code ciphertext, and it includes that its file system compiles code plaintext that the safety, which executes request,
Code encryption or/and the request that ciphertext conversion dynamic generation code ciphertext is carried out to the code ciphertext;
The file system carries out coding encrypting or close to the code to the proposition of the encrypting module of operating system in plain text to the code
Text carries out the request of ciphertext code conversion, and the code plaintext or cipher text is sent to encrypting module simultaneously;
The encrypting module carries out coding encrypting in plain text to the code or will turn after carrying out ciphertext code conversion to the code ciphertext
Executable code ciphertext after changing returns to operating system;
The operating system processes and executes executable code ciphertext, and obtains the ciphertext of code implementing result;
Before the ciphertext of the code implementing result is pushed to user or relevant treatment interface, the operating system elder generation Xiang Jiami
Module proposes to carry out the request of ciphertext code conversion to the ciphertext of code implementing result, and the ciphertext of code implementing result is sent to
Encrypting module;The operating system will intercept simultaneously to be shown or other relevant treatment interfaces are by image to be processed and/or text
Word code;
The encrypting module carries out the code implementing result after conversion after ciphertext code conversion the ciphertext of code implementing result
Ciphertext return to operating system;
The operating system carries out the ciphertext of the ciphertext of non-switched code implementing result and converted code implementing result
Fusion generates or other relevant interfaces accessible code execution corresponding displayable with personal code work safety execution request
As a result, the display screen of single device shows that code implementing result or/and relevant interface handle code implementing result.
7. single device code security as claimed in claim 6 executes and interactive system, which is characterized in that the code is close
Text, the ciphertext include variable parameter corresponding to code function and code function, all can safely be executed, even if meter
Calculation machine CPU does not reach plaintext code, without plaintext code in memory yet.
8. single device code security as claimed in claim 6 executes and interactive system, which is characterized in that it is described displayable or
The accessible code operation result of Processing Interface is ciphertext, the ciphertext include encryption and/or the code function obscured at random and
Variable parameter corresponding to code function.
9. single device code security as claimed in claim 6 executes and interactive system, which is characterized in that be sent to display screen or
The fusion results of Processing Interface are that disposably, fusion, interactive and implementing result binary coding be not identical every time after refreshing,
The semanteme for the content that user sees or Processing Interface receives is to understand and constant.
10. single device code security as claimed in claim 6 executes and interactive system, which is characterized in that the file system
To the encrypting module that is arranged in single device memory propose to carry out the code in plain text coding encrypting or to the code ciphertext into
Executable code ciphertext after the request of row ciphertext code conversion returns to operating system and is repeated several times until code ciphertext
Ciphertext code conversion is carried out completely.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711169338.XA CN109858241B (en) | 2017-11-22 | 2017-11-22 | Single-equipment code safe execution and interaction method and interaction system thereof |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711169338.XA CN109858241B (en) | 2017-11-22 | 2017-11-22 | Single-equipment code safe execution and interaction method and interaction system thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109858241A true CN109858241A (en) | 2019-06-07 |
CN109858241B CN109858241B (en) | 2021-12-17 |
Family
ID=66887428
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711169338.XA Active CN109858241B (en) | 2017-11-22 | 2017-11-22 | Single-equipment code safe execution and interaction method and interaction system thereof |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109858241B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050262343A1 (en) * | 2003-05-02 | 2005-11-24 | Jorgensen Jimi T | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
CN103761456A (en) * | 2013-10-12 | 2014-04-30 | 利尔达科技集团股份有限公司 | Anti-cracking method for core code of singlechip |
CN104166822A (en) * | 2013-05-20 | 2014-11-26 | 阿里巴巴集团控股有限公司 | Data protecting method and device |
CN104885093A (en) * | 2012-12-12 | 2015-09-02 | 思杰系统有限公司 | Encryption-based data access management |
CN105704149A (en) * | 2016-03-24 | 2016-06-22 | 国网江苏省电力公司电力科学研究院 | Safety protection method for power mobile application |
-
2017
- 2017-11-22 CN CN201711169338.XA patent/CN109858241B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050262343A1 (en) * | 2003-05-02 | 2005-11-24 | Jorgensen Jimi T | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
CN1961525A (en) * | 2003-05-02 | 2007-05-09 | 吉瑞泰克有限公司 | Pervasive, user-centric network security enabled by dynamic datagram switch and an on-demand authentication and encryption scheme through mobile intelligent data carriers |
CN104885093A (en) * | 2012-12-12 | 2015-09-02 | 思杰系统有限公司 | Encryption-based data access management |
CN104166822A (en) * | 2013-05-20 | 2014-11-26 | 阿里巴巴集团控股有限公司 | Data protecting method and device |
CN103761456A (en) * | 2013-10-12 | 2014-04-30 | 利尔达科技集团股份有限公司 | Anti-cracking method for core code of singlechip |
CN105704149A (en) * | 2016-03-24 | 2016-06-22 | 国网江苏省电力公司电力科学研究院 | Safety protection method for power mobile application |
Non-Patent Citations (3)
Title |
---|
吕琴: "云计算中数据存储安全的研究", 《贵州大学学报( 自然科学版)》 * |
郎讯: "基于代理重加密的云存储密文访问控制方案", 《计算机应用》 * |
金浩: "分布式控制系统在线升级技术的研究与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 * |
Also Published As
Publication number | Publication date |
---|---|
CN109858241B (en) | 2021-12-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108595989B (en) | Mobile APP safety protection system and method under iOS | |
US20210312334A1 (en) | Model parameter training method, apparatus, and device based on federation learning, and medium | |
CN105450620B (en) | A kind of information processing method and device | |
JP6257754B2 (en) | Data protection | |
CN110008745B (en) | Encryption method, computer equipment and computer storage medium | |
CN103218549B (en) | A kind of method of Java source code encryption and decryption and device | |
CN108512830A (en) | Information cipher processing method, device, computer equipment and storage medium | |
CN105187389B (en) | A kind of Web access method and system for obscuring encryption based on number | |
CN107786331B (en) | Data processing method, device, system and computer readable storage medium | |
CN112202754B (en) | Data encryption method and device, electronic equipment and storage medium | |
CN106228076B (en) | A kind of picture validation code guard method and system based on SGX | |
CN104463040A (en) | Secure input method and system for password | |
CN104253689B (en) | Subscriber card verifying dynamic password method and system based on Quick Response Code | |
CN109977685A (en) | Web page contents encryption method, encryption device and system | |
CN109214196A (en) | A kind of data interactive method, device and equipment | |
CN105656626B (en) | Reverse recombination encryption method | |
CN103414727A (en) | Encryption protection system for input password input box and using method thereof | |
CN110224834A (en) | Identity identifying method, decryption and ciphering terminal based on dynamic token | |
CN108667598B (en) | Device and method for realizing secure key exchange and secure key exchange method | |
CN115883052A (en) | Data encryption method, data decryption method, device and storage medium | |
CN115603907A (en) | Method, device, equipment and storage medium for encrypting storage data | |
CN104901951A (en) | Mobile terminal based cipher data processing and interaction method in Web application | |
CN113630412B (en) | Resource downloading method, resource downloading device, electronic equipment and storage medium | |
CN109858241A (en) | A kind of single device code security executes and exchange method and its interactive system | |
US20170085371A1 (en) | System and method for an enhanced xor cipher through extensions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |