Safety verification method, compiling device, device and system capable of running .net programs
A security verification and program technology, applied in the field of security verification, can solve the problems that the security of .NET cards cannot be completely guaranteed, and the CRC verification is not safe enough, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0100] Embodiment 1 of the present invention provides a security verification method, see figure 1 , the method includes:
[0101] Step 101: Compile the .NET assembly, and add strong naming to the .NET assembly during the compilation process, and obtain the executable file after adding the strong naming;
[0102] On the one hand, strong naming is used to prevent executable files from being tampered with and version control, which is provided by the compiler during compilation. Add strong naming to the assembly, CLR (Common Language Runtime, common language runtime) can guarantee that two assemblies with the same strong naming are completely consistent in any respect. In other words, strong naming provides the CLR with a unique identifier for an assembly. After strong naming is added, the host generates a key pair, including a public key and a private key. The public key is stored in the manifest of the executable file, and the private key is invisible. Strongly named assemb...
Embodiment 2
[0160] An embodiment of the present invention provides a safety verification system. For the working method of the system, reference may be made to the method in Embodiment 1, which will not be repeated here. see figure 2 , the system includes: a compiling device 201 and a .NET card 202;
[0161] Among them, see image 3 , the compiling device 201 specifically includes:
[0162] The compilation module 201A is used to compile the .NET program, and add a strong name to the .NET program during the compilation process to obtain the .NET executable file;
[0163] The obtaining module 201B is used to obtain the public key, public key identifier, original data and signature data including the index table in the .NET executable file;
[0164] The sending module 201C is used to send the public key, the public key identifier, the original data containing the index table and the signature data obtained by the obtaining module 201B to the inside of the .NET card, the public key, the p...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 