Unlock instant, AI-driven research and patent intelligence for your innovation.

Command restructuring method and device

A technology of instruction reorganization and instruction, applied in the field of computer security, can solve the problems of leaking secrets, unable to prevent secret-related personnel from actively or passively leaking secrets, and unable to ensure that secret-related information is not illegally stored, etc., to achieve the effect of management

Inactive Publication Date: 2016-06-29
ANTAIOS (BEIJING) INFORMATION TECH
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned technologies are even more unable to prevent active or passive leakage of secrets by personnel involved in secrets. For example, insiders can carry storage devices, download required materials from internal networks or terminals and take away storage devices, resulting in internal leaks; Take the computing device with you directly
[0005] In summary, anti-copy technology cannot guarantee that confidential information will not be illegally stored on the terminal
Based on network filtering, it cannot ensure that confidential information is not lost
Confidential personnel may leak secrets through malicious code or malicious tools, and may also leak secrets due to loss of control of secret-related equipment or storage media

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Command restructuring method and device
  • Command restructuring method and device
  • Command restructuring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0043] analyze

[0044] like figure 1 Shown is a schematic diagram of the system hierarchy of a computing device in the prior art. From top to bottom, the computing device includes: a user interface layer 101 , an application layer 102 , an operating system kernel layer 103 , a hardware mapping layer 104 and a hardware layer 105 .

[0045] Among them, the user interface layer 101 is an interface between the user and the device, through which the user interacts with the device (that is, other layers of the device, such as the application layer 102 ). The application layer 102 refers to the application software ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an instruction recombining method in the operating process. The method includes the steps that step1, an instruction operating environment is cached; step2, addresses and parameters of jump instructions stored in a stack are obtained, the address of a next instruction to be operated is calculated, the address is a zeroth address, and a first address is set to be the zeroth address; step2, an address corresponding table is searched for by using the first address, if a record is found, the cached instruction operating environment is recovered, and execution is continued by jumping to a found corresponding address to complete instruction recombining this time; step3, if no record is found, a machine instruction segment to be executed is obtained starting from the first address, the end of the instruction segment is the jump instruction, and the address where the jump instruction is located is a third address; step4, starting from the first address till the third address, machine codes are disassembled, and disassembly results are processed through a lexical analyzer to generate recombined assembly codes.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an instruction recombination method and device. Background technique [0002] The existing field of electronic information security includes three sub-fields: system security, data security and equipment security. [0003] In the field of data security, the following three technologies are generally used to ensure data security: (1) Data content security technology, including data encryption and decryption technology and end-to-end data encryption technology, to ensure that the content of data is not illegally read during storage and transmission (2) Data security transfer technology, including preventing illegal copying, printing or other output, and ensuring the safety of data during use and transfer; (3) Network blocking technology, including network physical blocking and setting up network barriers, etc. . [0004] According to relevant analysis, the total effective detecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/30
Inventor 汪家祥杨潇
Owner ANTAIOS (BEIJING) INFORMATION TECH