Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for identifying credible progress

A process and execution file technology, applied in the field of computer technology program development, can solve problems such as low recognition efficiency, slow program running, and reduced experience, and achieve the effect of efficient recognition and determination

Active Publication Date: 2012-12-26
BEIJING VRV SOFTWARE CO LTD
View PDF1 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in actual software requirements, performing MD5 value calculation on the entire executable program will cause problems such as slow running of the program
In addition, for different versions of software in the same series, it is necessary to calculate the MD5 value of each version of the executable program, resulting in low efficiency in identifying the process of the same series of software applications, affecting the execution efficiency of the entire software, and reducing the experience of users using the software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying credible progress
  • Method for identifying credible progress

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0023] The main idea of ​​the technical solution of the present invention is to improve the traditional method of performing MD5 calculation on the whole file to obtain the electronic fingerprint, and combine the information such as the electronic fingerprint, digital signature and process name of the executable file to judge whether the executable program is trustworthy .

[0024] figure 1 It is a flow chart of the present invention for obtaining information such as electronic fingerprints and digital signatures from executable files. like figure 1 As shown, the extraction process includes the following steps:

[0025] Step 101, the program of extracting electronic fingerprints runs.

[0026] Step 102, calculating the size of the executable file of the application program that needs to extract ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identifying a credible progress, which judges whether an executable file is credible or not by combining information, such as electronic fingerprint, digital signature, executable file name, and the like. The method comprises the following steps of: comparing an acquired electronic fingerprint with an originally extracted electronic fingerprint through carrying out electronic fingerprint calculation on a current executable file; if the acquired electronic fingerprint and the originally extracted electronic fingerprint are the same, judging the progress is a credible process; if the acquired electronic fingerprint and the originally extracted electronic fingerprint are different, acquiring the digital signature and the file name of the executable file, and comparing with the originally extracted information; if the information is consistent through comparison, regarding the process as the credible progress; and if any one of items is not consistent through comparison, regarding the process as an incredible progress. By utilizing the technical scheme, the credibility of the progress can be identified and confirmed correctly and efficiently.

Description

technical field [0001] The invention relates to the field of computer technology program development, in particular to a method for identifying a trustworthy process in the process of using an application program to control driver program encryption and decryption. Background technique [0002] In the development of computer programs, according to the actual functional requirements, it is often necessary to realize the processing-related program operations by identifying and determining the correctness and reliability of the process. [0003] The traditional method closer to the present invention is to obtain the file electronic fingerprint (a string of characters) through MD5 calculation to determine whether the file has changed. However, in actual software requirements, performing MD5 value calculation on the entire executable program will cause problems such as slow running of the program. In addition, for different versions of software in the same series, it is necessar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/00G06F21/50
Inventor 林皓高曦姜涛
Owner BEIJING VRV SOFTWARE CO LTD