Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and terminal for provision and loading of executable module

A technology of execution module and target end, which is applied in the direction of instrumentation, calculation, electrical digital data processing, etc., and can solve problems such as kernel security issues

Inactive Publication Date: 2016-07-20
ZTE CORP
View PDF2 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the developer modifies the third-party legitimate binary kernel module and adds offensive code, the kernel will automatically execute the added offensive code through insmod, resulting in serious kernel security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and terminal for provision and loading of executable module
  • Method and terminal for provision and loading of executable module
  • Method and terminal for provision and loading of executable module

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0057] In the first embodiment of the present invention, a method for providing an executable module, such as figure 1 As shown, the process executed on the host side includes the following specific steps:

[0058] Step S101, perform hash calculation on the executable module to obtain the executable module hash table.

[0059] Specifically, as is well known in the art, hash calculation is performed on binary values ​​of program modules or files to obtain a hash table.

[0060] Step S102, signing at least the hash table of the executable module to obtain signature information.

[0061] Specifically, the format of the signature information includes the following two sections: a signature section and an authentication section.

[0062]Step S103, encapsulating at least the executable module hash table, the signature information, and the executable module, and publishing the encapsulated data package, so that the target end obtains the data package based on at least the executabl...

no. 2 example

[0067] The second embodiment of the present invention is a method for providing an executable module. The method described in this embodiment is substantially the same as that in the first embodiment, except that the component part of the data packet further includes: a segment table. The hash table segment also includes: segment table hash table, and / or, hash table segment hash table. And, the signature information in step S102 of this embodiment is also somewhat different.

[0068] Specifically, in this embodiment, the components of the packet include the following sections: packet header, segment table, hash table segment, and executable module segment, which are similar to the ELF format; wherein, the segment table includes: hash Hash table segment header and executable module segment header, the content of the hash table segment header is the offset of the hash table segment relative to the starting position of the data packet, and the content of the executable module seg...

no. 3 example

[0073] The third embodiment of the present invention corresponds to the method for providing an executable module run by the host terminal in the first embodiment. This embodiment introduces a method for loading an executable module, such as figure 2 As shown, the processes performed on the target side include:

[0074] Step S301, acquiring data packets.

[0075] Specifically, the components of the obtained data packet include the following sections: data packet header, hash table segment and executable module segment, wherein, the total file size of the data packet, the hash table segment header and the executable module segment are placed in the data packet header. Module segment header, the content of the hash table segment header is the offset of the hash table segment relative to the starting position of the data packet, and the content of the executable module segment header is the offset of the executable module segment relative to the starting position of the data pac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and terminal for provision and loading of an executable module. Processes executed by the provision method on a host computer end comprise that Hash calculation is carried out to the executable module, so that a Hash table of the executable module can be obtained; signing is carried out at least aiming at the Hash table of the executable module, so that signing information can be obtained; and packaging is carried out at least aiming at the Hash table of the executable module, the signing information and the executable module, and a packaged data packet is issued, so that a target end can load the executable module in the data packet after the target end checks the data packet at least based on the Hash table of the executable module, the signing information and the executable module and after the data packet passes the checking. The method and terminal disclosed by the invention are applied in issuance and loading of the executable module, wherein the signing is carried out to the information such as the Hash table of the executable module, and the mobile communication terminal carries out authentication before loading the executable module, so that safety certification of the executable module can be implemented, and injective attacks made by the executable module to a system can be avoided.

Description

technical field [0001] The invention relates to the technical field of executable program development and use, in particular to a method for providing and loading an executable module and a terminal. Background technique [0002] In the existing kernel module (KernelModule, KMOD for short) development field, the developer loads the kernel module into the kernel space by commanding insmod. If the developer modifies the third-party legitimate binary kernel module and adds offensive code, the kernel will automatically execute the added offensive code through insmod, resulting in serious kernel security issues. [0003] In addition to the kernel module, the above-mentioned problems also exist in the development and loading process of other executable modules. Therefore, how to realize the safe loading of executable modules has become a technical problem to be solved urgently in this field. Contents of the invention [0004] The technical problem to be solved by the present in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/64
Inventor 贾嘉
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products