Supercharge Your Innovation With Domain-Expert AI Agents!

Kernel repair method and device

A repair method and kernel technology, which is applied in the field of computer and information security, can solve problems such as device adaptation and security manufacturers' difficulty in obtaining device source code, etc., and achieve the effect of achieving security

Active Publication Date: 2019-04-09
BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, it is difficult for security vendors to obtain device source code, and it is also difficult to adapt to thousands of devices on the market. Therefore, a flexible mechanism is urgently needed to allow security vendors to insert patch logic regardless of platform restrictions.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Kernel repair method and device
  • Kernel repair method and device
  • Kernel repair method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0025] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0026] figure 1 An exemplary system architecture 100 to which embodiments of the kernel repairing method or the kernel repairing apparatus of the present application can be applied is shown.

[0027] Such as figure 1 As shown, the system architecture 100 may include termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application discloses a kernel repair method and device. A specific implementation of the method includes: loading a patch for repairing the target function to be repaired in the kernel, the patch is written in a memory-safe language or a memory-safe language subset of a non-memory-safe language; using The memory safety language engine executes the patch; receiving a call request for calling the repair interface to repair the target function during the execution of the patch, wherein the repair interface is provided by the memory safety language engine for Interface for function repair; execute the requested repair interface to repair the target function. Realized hot patching and security of the kernel.

Description

technical field [0001] The present application relates to the field of computer technology, specifically to the field of information security, and in particular to a kernel repair method and device. Background technique [0002] Kernel vulnerabilities are a technical problem faced by Android devices. At present, although a large number of kernel vulnerabilities have been disclosed, there are still many Android devices that do not receive timely updates. The black industry can use these vulnerabilities to break through almost all security protection mechanisms such as encryption, fingerprints, and data isolation set in the device. Mobile phone manufacturers cannot concentrate on discovering and repairing kernel vulnerabilities like third-party manufacturers with security capabilities, so it is difficult to solve this problem only by relying on mobile phone manufacturers. In addition, the Android industry chain is very long, and it is too late for kernel patches to reach use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/568G06F2221/034G06F8/658G06F21/57H04L67/34G06F21/00G06F8/654
Inventor 张煜龙包沉浮韦韬
Owner BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More