Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for protecting sensitive data in software product

A technology for sensitive data and software products, applied in digital data protection, computer security devices, electrical digital data processing, etc., can solve problems such as impossibility and difficulty in debugging, and achieve the effect of improving security and avoiding leakage

Active Publication Date: 2015-09-02
IBM CORP
View PDF6 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the user of the software product is concerned about the disclosure of sensitive data and is unwilling to provide sufficient debugging data, it will make it more difficult or impossible to debug the problem of the software product

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting sensitive data in software product
  • Method and apparatus for protecting sensitive data in software product
  • Method and apparatus for protecting sensitive data in software product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Preferred embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although preferred embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0023] figure 1 A block diagram of an exemplary computer system / server 12 suitable for use in implementing embodiments of the invention is shown. figure 1 The computer system / server 12 shown is only an example and should not impose any limitation on the functions and scope of use of the embodiments of the present invention.

[0024] Such as figure 1 As shown, computer system / server 12 takes the form of a general purpose computing device. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Sensitive data is protected in a software product. A source file of the software product is compiled to generate an object file, in which the source file includes at least one piece of sensitive data marked with a specific identifier. The object file has a secure data section for saving storage information of the at least one piece of sensitive data at compile-time and run-time. The object file is linked to generate an executable file. The executable file updates the secure data section at run-time. Sensitive data is also protected when a core dump is generated.

Description

technical field [0001] The invention relates to a sensitive data protection technology, in particular to a method and a device for protecting sensitive data in a software product from being leaked during memory dumping. Background technique [0002] Most existing operating systems and software products support a memory dump (core dump) mechanism. When an exception occurs during the running of a software product, the operating system will perform a memory dump and generate a memory dump file. In the memory dump file, the data in the memory at the moment when the exception occurs is saved, and these data are helpful for fault analysis. It can be understood that the occurrence of many abnormalities depends on specific types of data in the operating environment, so it is difficult to reproduce such abnormalities in the test environment. The memory dump file can truly record the state of the computer memory when an exception occurs. Therefore, the data in the memory dump file ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/60
CPCG06F21/629G06F8/41G06F8/54G06F11/0706G06F11/0778G06F11/366G06F21/6209
Inventor 卫李俊史达飞贾双双冯锐
Owner IBM CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products