Unlock instant, AI-driven research and patent intelligence for your innovation.

Instruction reorganization method and device

A technology of command recombination and command, applied in the field of computer security, can solve problems such as leakage of secrets, loss of control of secret-related equipment or storage media, and inability to ensure that secret-related information is not lost, and achieve the effect of management

Inactive Publication Date: 2016-12-21
ANTAIOS (BEIJING) INFORMATION TECH
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The above-mentioned technologies are even more unable to prevent active or passive leakage of secrets by personnel involved in secrets. For example, insiders can carry storage devices, download required materials from internal networks or terminals and take away storage devices, resulting in internal leaks; Take the computing device with you directly
[0005] In summary, anti-copy technology cannot guarantee that confidential information will not be illegally stored on the terminal
Based on network filtering, it cannot ensure that confidential information is not lost
Confidential personnel may leak secrets through malicious code or malicious tools, and may also leak secrets due to loss of control of secret-related equipment or storage media

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Instruction reorganization method and device
  • Instruction reorganization method and device
  • Instruction reorganization method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0071] analyze

[0072] Such as figure 1 Shown is a schematic diagram of the system hierarchy of a computing device in the prior art. From top to bottom, the computing device includes: a user interface layer 101 , an application layer 102 , an operating system kernel layer 103 , a hardware mapping layer 104 and a hardware layer 105 .

[0073] Among them, the user interface layer 101 is an interface between the user and the device, through which the user interacts with the device (that is, other layers of the device, such as the application layer 102 ). The application layer 102 refers to the application softwa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an instruction recombining method in the operating process. The instruction recombining method includes the steps that step1, an instruction operating environment is cached; step2, a target address is read from a first storage position, a machine instruction segment to be dispatched is obtained according to the target address, and the last instruction of the machine instruction segment to be dispatched is a first jump instruction; step3, the target address of the first jump instruction is stored in the first storage position; step4, the first jump instruction is replaced by a second jump instruction to form a recombining instruction segment with a second address, and the second jump instruction points to an entry address of an instruction recombining platform; step5, the instruction operating environment is recovered, and execution is continued by jumping to the second address.

Description

technical field [0001] The invention relates to the field of computer security, in particular to an instruction recombination method and device. Background technique [0002] The existing field of electronic information security includes three sub-fields: system security, data security and equipment security. [0003] In the field of data security, the following three technologies are generally used to ensure data security: (1) Data content security technology, including data encryption and decryption technology and end-to-end data encryption technology, to ensure that the content of data is not illegally read during storage and transmission (2) Data security transfer technology, including preventing illegal copying, printing or other output, and ensuring the safety of data during use and transfer; (3) Network blocking technology, including network physical blocking and setting up network barriers, etc. . [0004] According to relevant analysis, the total effective detecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F9/44G06F21/50
Inventor 汪家祥杨潇
Owner ANTAIOS (BEIJING) INFORMATION TECH