CN112328932A - Operation execution method, electronic device and computer-readable storage medium - Google Patents
Operation execution method, electronic device and computer-readable storage medium Download PDFInfo
- Publication number
- CN112328932A CN112328932A CN202010752384.8A CN202010752384A CN112328932A CN 112328932 A CN112328932 A CN 112328932A CN 202010752384 A CN202010752384 A CN 202010752384A CN 112328932 A CN112328932 A CN 112328932A
- Authority
- CN
- China
- Prior art keywords
- module
- functional module
- function
- execution result
- function module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 230000006870 function Effects 0.000 claims abstract description 163
- 238000012544 monitoring process Methods 0.000 claims description 21
- 238000004590 computer program Methods 0.000 claims description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000005034 decoration Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44521—Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Stored Programmes (AREA)
Abstract
The embodiment of the application provides an operation execution method, electronic equipment and a computer readable storage medium, and relates to the technical field of network security. The method is applied to an electronic device, the electronic device comprises a first functional module and a second functional module, the first functional module can realize partial functions of the second functional module, and the method comprises the following steps: the second function module receives a first calling request sent by the browser, wherein the first calling request is used for requesting to call the second function module to execute target operation; the second function module calls the first function module to execute a first sub-operation in the target operation by using the first function module to obtain a first execution result; and the second functional module executes the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result, and feeds the second execution result back to the browser. The embodiment of the application realizes the purpose of greatly saving the storage space of the electronic equipment.
Description
Technical Field
The present application relates to the field of network security technologies, and in particular, to an operation execution method, an electronic device, and a computer-readable storage medium.
Background
Usually, people can complete transfer, remittance or bank account inquiry by using internet bank through a browser. Because the security required by a series of operations performed by using the internet bank is high, the browser completes the corresponding operations by calling the CSP functional module. The CSP functional module is a stand-alone program for performing encryption and decryption operations, and contains a large number of related functions that can be used for performing encryption and decryption operations.
The CSP functional module can be a 64-bit program or a 32-bit program, so that the browser selects whether to call the 32-bit program or the 64-bit program according to actual requirements when calling the CSP functional module.
Therefore, the inventor finds that, in the prior art, a large amount of memory space is occupied because 32-bit CSP functional modules and 64-bit CSP functional modules need to be stored in advance.
Disclosure of Invention
The application provides a method and a device for feeding back an execution result, electronic equipment and a computer readable storage medium, which can solve the problem that in the prior art, two sets of complete CSP functional modules are stored for being called by a browser, so that a large amount of storage space is occupied. The technical scheme is as follows:
in a first aspect, an electronic device is provided, where the electronic device includes a first functional module and a second functional module, and the first functional module is capable of implementing a part of functions of the second functional module, and the method includes:
the second function module receives a first calling request sent by the browser, wherein the first calling request is used for requesting to call the second function module to execute target operation;
the second function module calls the first function module to execute a first sub-operation in the target operation by using the first function module to obtain a first execution result;
and the second functional module executes the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result, and feeds the second execution result back to the browser.
The first function module comprises a first function library; the second function module calls the first function module to execute a first sub-operation in the target operation by using the first function module, and the method comprises the following steps:
the second function module sends a second calling request to the monitoring process, wherein the second calling request is used for requesting to call the first function library of the first function module;
the monitoring process calls the first function module so that the program of the first function module uses the functions in the first function library to execute the first sub-operation in the target operation in the execution process.
The first functional module executes a first sub-operation in the target operation, and after obtaining a first execution result, the method further includes:
the first function module feeds back the first execution result to the second function module through the monitoring process.
The method further comprises the following steps:
the first function module receives a third calling request sent by the browser, wherein the third calling request is used for requesting to call the first function module to execute a first sub-operation;
the first functional module executes the first sub-operation to obtain a first execution result, and feeds the first execution result back to the browser.
The first functional module is a 32-bit encryption module; the second functional module is a 64-bit encryption module. Or the first functional module is a 64-bit encryption module; the second functional module is a 32-bit encryption module.
In a second aspect, an electronic device for operation execution is provided, including:
the first functional module is used for realizing partial functions of the second functional module;
the second function module is used for receiving a first calling request sent by the browser, and the first calling request is used for requesting to call the second function module to execute target operation; the first function module is used for calling to execute a first sub-operation in the target operation by utilizing the first function module to obtain a first execution result; and the second sub-operation executing unit is used for executing the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result, and feeding the second execution result back to the browser.
The first function module comprises a first function library; the second function module calls the first function module to execute the first sub-operation in the target operation by using the first function module, and the second function module is used for:
sending a second calling request to the monitoring process, wherein the second calling request is used for requesting to call the first function library of the first function module;
the monitoring process calls the first function module so that the program of the first function module uses the functions in the first function library to execute the first sub-operation in the target operation in the execution process.
The first function module is further configured to feed back the first execution result to the second function module through the monitoring process.
The first function module is further used for receiving a third calling request sent by the browser, wherein the third calling request is used for requesting to call the first function module to execute the first sub-operation;
the first function module is further used for executing the first sub-operation to obtain a first execution result, and feeding the first execution result back to the browser.
The first functional module is a 32-bit encryption module; the second functional module is a 64-bit encryption module. Or the first functional module is a 64-bit encryption module; the second functional module is a 32-bit encryption module.
In a third aspect, an electronic device is provided, which includes:
one or more processors;
a memory;
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the operation execution method is executed.
In a fourth aspect, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor, implements the operation execution method described above.
The beneficial effect that technical scheme that this application provided brought is:
the technical scheme provided by the application is applied to the electronic equipment, the electronic equipment comprises the first functional module and the second functional module, and part of functions of the second functional module can be realized by the first functional module, therefore, when the electronic equipment stores relevant data of the second functional module, only the relevant data which cannot be realized by the first functional module in the second functional module needs to be stored, but the relevant data which can be realized by the first functional module is not stored, namely, only the part of data of the second functional module needs to be stored. When the browser needs to call the second function module to execute the target operation, the second function module calls the first function module to execute the first sub-operation of the target operation by using the first function module to obtain a first execution result, executes the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result, and feeds the second execution result back to the browser. Therefore, the scheme only needs to store complete relevant data of the first functional module, the second functional module only needs to store partial data, and when the second functional module needs to be called, the second functional module can complete all self operations through calling the first functional module, so that the storage space of the electronic equipment is greatly saved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of an operation execution method according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating a method for implementing operation execution by a first functional module according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an operation execution electronic device according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
An embodiment of the present application provides an operation execution method, and as shown in fig. 1, the method is applied to an electronic device, where the electronic device includes a first function module and a second function module, and the specific method includes:
step S11, when the browser needs to call the second function module, sending a first call request to the second function module, wherein the first call request is used for requesting to call the second function module to execute the target operation;
step S12, after receiving the first call request, the second functional module calls the first functional module to execute the first sub-operation in the target operation by using the first functional module to obtain a first execution result;
specifically, the first function module comprises a first function library;
when the second function module calls the first function module, sending a second calling request to the monitoring process, wherein the second calling request is used for calling a first function library of the first function module; after the monitoring process calls the first function module, the program of the first function module uses the function in the first function library to execute a first sub-operation in the target operation in the execution process;
therefore, only partial data and functions of the second functional module need to be saved in the electronic device provided by the application, that is, data and functions corresponding to the first operation which can be realized by the first functional module do not need to be saved, and only information such as complete related data and functions of the first functional module need to be saved.
In this step, the requirement that the second function module calls the first function module can be monitored in real time by using the monitoring process, and the execution state of the execution result is fed back by the first function module.
In the above process, the browser calls the second function module, so that it is necessary for the execution result fed back by the second function module. After the first functional module finishes executing the first sub-operation to obtain a first execution result, the first execution result can be directly fed back to the second functional module, and the first execution result serving as an intermediate result can not be fed back to the browser.
Step S13, the second functional module executes the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result;
in the step, after the second functional module completes the first sub-operation by means of the first functional module, the second functional module completes the remaining operations according to the obtained first execution result to obtain a second execution result;
in step S14, the second function module feeds back the second execution result to the browser.
In step S12, after "the first function module executes the first sub-operation in the target operation, and obtains the first execution result", the method further includes: the first function module feeds back the first execution result to the second function module through the monitoring process.
In the embodiment of the present application, a possible implementation manner is provided, as shown in fig. 2, a browser may directly call a first function module to execute a related operation, where the process is as follows:
step S21, the browser sends a third call request to the first function module; the third calling request is used for requesting to call the first functional module to execute the first sub-operation;
step S21, after the first functional module receives the third call request, it executes the first sub-operation; the method specifically comprises the following steps:
the program of the first function module executes a first sub-operation by using the function in the first function library to obtain a first execution result;
in step S22, the first function module feeds back the first execution result to the browser.
Specifically, in the two embodiments, the first functional module is a 32-bit encryption module; the second functional module is a 64-bit encryption module. Or the first functional module is a 64-bit encryption module; the second functional module is a 32-bit encryption module. The encryption module may be a Cryptographic Service Provider (CSP).
The technical scheme provided by the application is applied to the electronic equipment, the electronic equipment comprises the first functional module and the second functional module, and part of functions of the second functional module can be realized by the first functional module, therefore, when the electronic equipment stores relevant data of the second functional module, only the relevant data which cannot be realized by the first functional module in the second functional module needs to be stored, but the relevant data which can be realized by the first functional module is not stored, namely, only the part of data of the second functional module needs to be stored. When the browser needs to call the second function module to execute the target operation, the second function module calls the first function module to execute the first sub-operation of the target operation by using the first function module to obtain a first execution result, and executes the rest second sub-operations which are not executed in the target operation according to the first execution result of the first function module to obtain a second execution result, and feeds the second execution result back to the browser. Therefore, the scheme only needs to store complete relevant data of the first functional module, the second functional module only needs to store partial data, and when the second functional module needs to be called, the second functional module can complete all self operations through calling the first functional module, so that the storage space of the electronic equipment is greatly saved.
For convenience of introduction, the electronic device is described by taking an example in which the electronic device stores a complete 32-bit CSP module and a partial 64-bit CSP module, the 32-bit CSP module can be used to execute partial functions of the 64-bit CSP module, the 32-bit CSP module includes a first function library, the first function library includes a plurality of functions, and the specific process is as follows:
step A, the browser sends a first calling request to a 64-bit CSP module to call the 64-bit CSP module to complete target operation;
step B, after receiving the first calling request, the 64-bit CSP module sends a second calling request to the monitoring process, wherein the second calling request is used for requesting to call the 32-bit CSP module to complete the first sub-operation in the target operation;
step C, the monitoring process sends the second call request to the 32-bit CSP module;
step D, after receiving the second call request, the 32-bit CSP module executes a first sub-operation in the target operation by using a function in the first function library in the execution process through a program of the 32-bit CSP module, and obtains a first execution result;
step E, the 32-bit CSP module sends the first execution result to the 64-bit CSP module;
the first execution result is used as an intermediate result obtained by calling the 64-bit CSP module by the browser, and can be directly fed back to the 64-bit CSP module without being fed back to the browser.
Step F, the 64-bit CSP module executes the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result;
and G, feeding back the second execution result to the browser by the 64-bit CSP module.
An embodiment of the present application provides an electronic device for performing an operation, and as shown in fig. 3, the electronic device includes:
a first functional module 31 for implementing a part of the functions of the second functional module 32;
the second function module 32 is configured to receive a first call request sent by the browser 33, where the first call request is used to request to call the second function module 31 to execute a target operation; the first function module 31 is used for calling to execute a first sub-operation in the target operation by using the first function module 31 to obtain a first execution result, and feeding the first execution result back to the browser 33; and is configured to execute the remaining unexecuted second sub-operation in the target operation according to the first execution result to obtain a second execution result, and feed the second execution result back to the browser 33.
The first function module 31 includes a first function library; the second function module 32 calls the first function module 31 to execute the first sub-operation in the target operation by using the first function module 31, and the second function module 32 is configured to:
a first function library for sending a first call request to the monitoring process, where the first call request is used to request to call the first function module 31;
the monitoring process calls the first function module 31 so that the program of the first function module 31 executes the first sub-operation in the target operation using the function in the first function library 31 during execution.
The first functional module 31 is further configured to feed back the first execution result to the second functional module 32 through the monitoring process;
and a second function module 32, configured to feed back the first execution result to the browser 33.
The first functional module 31 is further configured to receive a third call request sent by the browser 33, where the third call request is used to request to call the first functional module 31 to execute the first sub-operation;
the first functional module 31 is further configured to execute the first sub-operation to obtain a first execution result, and feed the first execution result back to the browser 33;
the first functional module 31 is a 32-bit encryption module; the second functional module 32 is a 64-bit encryption module. Or, the first functional module 31 is a 64-bit encryption module; the second functional module 32 is a 32-bit encryption module.
An embodiment of the present application provides an electronic device, including: a memory and a processor; at least one program stored in the memory for execution by the processor, which when executed by the processor, implements: the electronic equipment comprises the first functional module and the second functional module, and partial functions of the second functional module can be realized by the first functional module, so that when the electronic equipment stores the related data of the second functional module, only the related data which cannot be realized by the first functional module in the second functional module needs to be stored, but the related data which can be realized by the first functional module is not stored, namely, only the partial data of the second functional module needs to be stored. When the browser needs to call the second function module to execute the target operation, the second function module calls the first function module so as to utilize the first function module to execute the first sub-operation of the corresponding operation of the target to obtain a first execution result, and executes the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result, and feeds the second execution result back to the browser. Therefore, the scheme only needs to store complete relevant data of the first functional module, the second functional module only needs to store partial data, and when the second functional module needs to be called, the second functional module can complete all self operations through calling the first functional module, so that the storage space of the electronic equipment is greatly saved.
In an alternative embodiment, an electronic device is provided, as shown in fig. 4, the electronic device 4000 shown in fig. 4 comprising: a processor 4001 and a memory 4003. Processor 4001 is coupled to memory 4003, such as via bus 4002. Optionally, the electronic device 4000 may further comprise a transceiver 4004. In addition, the transceiver 4004 is not limited to one in practical applications, and the structure of the electronic device 4000 is not limited to the embodiment of the present application.
The Processor 4001 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 4001 may also be a combination that performs a computational function, including, for example, a combination of one or more microprocessors, a combination of a DSP and a microprocessor, or the like.
The Memory 4003 may be a ROM (Read Only Memory) or other types of static storage devices that can store static information and instructions, a RAM (Random Access Memory) or other types of dynamic storage devices that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic Disc storage medium or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 4003 is used for storing application codes for executing the scheme of the present application, and the execution is controlled by the processor 4001. Processor 4001 is configured to execute application code stored in memory 4003 to implement what is shown in the foregoing method embodiments.
Among them, electronic devices include but are not limited to: electronic equipment such as mobile phones, notebook computers, servers and the like.
The present application provides a computer-readable storage medium, on which a computer program is stored, which, when running on a computer, enables the computer to execute the corresponding content in the foregoing method embodiments. Compared with the prior art, when the related data of the second functional module is saved, only the related data which cannot be realized by the first functional module in the second functional module is needed to be saved, but the related data which can be realized by the first functional module is not needed to be saved, namely, only partial data of the second functional module is needed to be saved. When the browser needs to call the second function module to execute the target operation, the second function module calls the first function module to execute the first sub-operation of the corresponding operation of the target by using the first function module to obtain a first execution result, executes the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result, and feeds the second execution result back to the browser. Therefore, the scheme only needs to store complete relevant data of the first functional module, the second functional module only needs to store partial data, and when the second functional module needs to be called, the second functional module can complete all self operations through calling the first functional module, so that the storage space of the electronic equipment is greatly saved.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (14)
1. An operation execution method applied to an electronic device including a first functional module and a second functional module, wherein the first functional module is capable of implementing a partial function of the second functional module, the method comprising:
the second function module receives a first calling request sent by a browser, wherein the first calling request is used for requesting to call the second function module to execute target operation;
the second function module calls the first function module to execute a first sub-operation in the target operation by using the first function module to obtain a first execution result;
and the second functional module executes the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result, and feeds the second execution result back to the browser.
2. The method of claim 1, wherein the first function module comprises a first function library; the second function module calls the first function module to execute a first sub-operation in the target operation by using the first function module, and the method comprises the following steps:
the second function module sends a second call request to a monitoring process, wherein the second call request is used for requesting to call the first function library of the first function module;
and the monitoring process calls the first functional module so that the program of the first functional module uses the function in the first functional library to execute the first sub-operation in the target operation in the execution process.
3. The method of claim 2, wherein the first functional module executes the first sub-operation of the target operation, and after obtaining the first execution result, further comprising:
and the first functional module feeds back the first execution result to the second functional module through the monitoring process.
4. The method of claim 1, further comprising:
the first function module receives a third calling request sent by the browser, wherein the third calling request is used for requesting to call the first function module to execute the first sub-operation;
and the first functional module executes the first sub-operation to obtain a first execution result, and feeds the first execution result back to the browser.
5. The method of claims 1-4, wherein the first functional module is a 32-bit cryptographic module; the second functional module is a 64-bit encryption module.
6. The method of claims 1-4, wherein the first functional module is a 64-bit cryptographic module; the second functional module is a 32-bit encryption module.
7. An electronic device for operation execution, comprising:
the first functional module is used for realizing partial functions of the second functional module;
the second function module is used for receiving a first calling request sent by a browser, and the first calling request is used for requesting to call the second function module to execute target operation; the first function module is used for calling to execute a first sub-operation in the target operation by utilizing the first function module to obtain a first execution result; and the browser is used for executing the second sub-operation which is not executed in the target operation according to the first execution result to obtain a second execution result, and feeding the second execution result back to the browser.
8. The electronic device of claim 7, wherein the first function module comprises a first function library; the second function module calls the first function module to execute a first sub-operation in the target operation by using the first function module, and the second function module is used for:
sending a second call request to a monitoring process, wherein the second call request is used for requesting to call the first function library of the first function module;
and the monitoring process calls the first functional module so that the program of the first functional module uses the function in the first functional library to execute the first sub-operation in the target operation in the execution process.
9. The electronic device of claim 8, wherein the first functional module is further configured to:
and feeding back the first execution result to the second functional module through the monitoring process.
10. The electronic device of claim 7, wherein the first functional module is further configured to:
receiving a third calling request sent by the browser, wherein the third calling request is used for requesting to call the first function module to execute the first sub-operation;
the first function module is further configured to execute the first sub-operation to obtain a first execution result, and feed back the first execution result to the browser.
11. Method electronic device according to claims 7-10, characterized in that the first functional module is a 32-bit cryptographic module; the second functional module is a 64-bit encryption module.
12. Method electronic device according to claims 7-10, characterized in that the first functional module is a 64-bit cryptographic module; the second functional module is a 32-bit encryption module.
13. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: performing the operation performing method according to any one of claims 1-6.
14. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the operation execution method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010752384.8A CN112328932A (en) | 2020-07-30 | 2020-07-30 | Operation execution method, electronic device and computer-readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010752384.8A CN112328932A (en) | 2020-07-30 | 2020-07-30 | Operation execution method, electronic device and computer-readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112328932A true CN112328932A (en) | 2021-02-05 |
Family
ID=74302957
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010752384.8A Pending CN112328932A (en) | 2020-07-30 | 2020-07-30 | Operation execution method, electronic device and computer-readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112328932A (en) |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070285271A1 (en) * | 2006-06-09 | 2007-12-13 | Microsoft Corporation | Verifiable integrity guarantees for machine code programs |
CN102662739A (en) * | 2012-03-23 | 2012-09-12 | 深圳市文鼎创数据科技有限公司 | Method and device for realizing function calling |
CN103593238A (en) * | 2012-08-16 | 2014-02-19 | 腾讯科技(深圳)有限公司 | Method and device for controlling invocation of application programming interfaces |
CN104579687A (en) * | 2015-01-19 | 2015-04-29 | 浪潮电子信息产业股份有限公司 | CSP implementation based on USBKEY |
CN105468941A (en) * | 2015-12-30 | 2016-04-06 | 杭州华为数字技术有限公司 | Right control method and device |
CN107480029A (en) * | 2017-08-02 | 2017-12-15 | 北京深思数盾科技股份有限公司 | A kind of monitoring method and device of function call time |
CN110399181A (en) * | 2019-07-23 | 2019-11-01 | 深圳市元征科技股份有限公司 | Software Development Kit funcall method, system and electronic equipment and medium |
-
2020
- 2020-07-30 CN CN202010752384.8A patent/CN112328932A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070285271A1 (en) * | 2006-06-09 | 2007-12-13 | Microsoft Corporation | Verifiable integrity guarantees for machine code programs |
CN102662739A (en) * | 2012-03-23 | 2012-09-12 | 深圳市文鼎创数据科技有限公司 | Method and device for realizing function calling |
CN103593238A (en) * | 2012-08-16 | 2014-02-19 | 腾讯科技(深圳)有限公司 | Method and device for controlling invocation of application programming interfaces |
CN104579687A (en) * | 2015-01-19 | 2015-04-29 | 浪潮电子信息产业股份有限公司 | CSP implementation based on USBKEY |
CN105468941A (en) * | 2015-12-30 | 2016-04-06 | 杭州华为数字技术有限公司 | Right control method and device |
CN107480029A (en) * | 2017-08-02 | 2017-12-15 | 北京深思数盾科技股份有限公司 | A kind of monitoring method and device of function call time |
CN110399181A (en) * | 2019-07-23 | 2019-11-01 | 深圳市元征科技股份有限公司 | Software Development Kit funcall method, system and electronic equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP4053711A1 (en) | Consensus method for blockchain, and consensus node, electronic device and storage medium | |
CN113781202B (en) | Data processing method, device, computer equipment and storage medium | |
CN111737300A (en) | Service processing method, device, equipment and computer readable storage medium | |
CN105488125A (en) | Page access method and apparatus | |
CN111163130A (en) | Network service system and data transmission method thereof | |
CN112214334A (en) | Micro-service calling method and device, electronic equipment and computer-readable storage medium | |
CN111897662A (en) | Offset processing method and device, electronic equipment and computer readable storage medium | |
CN111445340A (en) | Method and device for estimating value of financial product, electronic equipment and readable storage medium | |
CN116578245B (en) | Memory access circuit, memory access method, integrated circuit, and electronic device | |
CN112818336A (en) | Data access method, data access device and computer readable storage medium | |
CN112328932A (en) | Operation execution method, electronic device and computer-readable storage medium | |
CN111597093B (en) | Exception handling method, device and equipment thereof | |
CN113157603B (en) | Data reading device, method, chip, computer device and storage medium | |
CN111367750B (en) | Exception handling method, device and equipment thereof | |
CN111061576B (en) | Method and system for creating entity object | |
CN112799791A (en) | Method and device for calling distributed lock, electronic equipment and storage medium | |
CN109561123B (en) | Token caching method and device | |
CN111639129A (en) | Transaction processing method and device, electronic equipment and computer-readable storage medium | |
CN110929195A (en) | Data caching strategy determining method and device and electronic equipment | |
CN111966972B (en) | Program encryption method, device, electronic equipment and computer readable storage medium | |
CN113254449B (en) | ID generation method, device, equipment and storage medium | |
CN114050991B (en) | Method, device, equipment and storage medium for testing proxy | |
CN112306402B (en) | Program execution method, electronic device, and computer-readable storage medium | |
CN113328848B (en) | Parameterized S box generation method, device, equipment and storage medium | |
EP3244340A1 (en) | Method for securely running an application |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |