Unlock instant, AI-driven research and patent intelligence for your innovation.

A file verification method and device

A verification method and verification algorithm technology, applied in the field of information security, can solve problems such as occupying storage space

Active Publication Date: 2020-02-14
CHINA MOBILE COMM GRP CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when the above scheme decrypts the ELF file, it needs to decrypt the encrypted symbols in the protected ELF file. Therefore, in the actual implementation, not only the dictionary used for decryption needs to be saved, but also another program is required. Decrypt the protected ELF file, occupying additional storage space

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A file verification method and device
  • A file verification method and device
  • A file verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] see figure 1 , which shows a method for file verification provided by an embodiment of the present invention, the method can be applied to a device capable of running a target ELF file, and the method can include:

[0054] S101: When running the target ELF file, obtain the actual check value of the target ELF file according to a preset check algorithm;

[0055] S102: During the process of running the target ELF file, read the verification reference value of the target ELF file from the preset gap byte of the target ELF file;

[0056] S103: comparing the actual verification value with the verification reference value;

[0057] S104: When the actual verification value is consistent with the verification reference value, it is determined that the verification is successful;

[0058] S105: When the actual verification value is inconsistent with the verification reference value, it is determined that the verification fails.

[0059] It should be noted that the preset veri...

Embodiment 2

[0064] to combine figure 1 The technical solution shown, such as figure 2 The overall format of the ELF file is shown, and the ELF file is a segment-based data structure. For an ELF file, the file begins with the ELF Header field information; then the program header table (Program Header Table); then the content information of each section Segment; then the section header table (SectionHeader Table), the section header table There are fields to record information such as the actual length of each Segment. The location of the section header table can be indicated by the value in the ELF Header field. In order to improve the access speed of the CPU, the length of each segment segment in the ELF file has a size alignment requirement. Therefore, the actual length of the Segment data in each section is usually less than or equal to the size of the Segment, which creates a gap between sections. In addition, in the ELF file format, the reserved fields reserved for each section ar...

Embodiment 3

[0072] In combination with the first two embodiments, before step S101, refer to Figure 4 , the method also includes the process of writing the verification reference value of the target ELF file into the gap byte in the target ELF file, which may specifically include:

[0073] S100A: traverse the target ELF file, and obtain the gap bytes in the target ELF file;

[0074] S100B: Write the verification reference value of the target ELF file into the gap bytes according to a preset writing rule.

[0075] It can be understood that step S100A and step S100B can be executed by the device for generating the target ELF file, which is not specifically limited in this embodiment of the present invention.

[0076] In conjunction with the preset gap bytes of the target ELF file described in Embodiment 2, it may specifically include: the space between each section in the target ELF file and the reserved reserved field of each section of the ELF file; correspondingly, step S100A may inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a file verification method and device. The method comprises the steps that when a target ELF file is run, an actual verification value of the target ELF file is obtained according to a preset verification algorithm; in the target ELF file running process, a verification reference value of the target ELF file is read from a preset void byte of the target ELF file; the actual verification value and the verification reference value are compared; when the actual verification value and the verification reference value are consistent, it is determined that verification succeeds; when the actual verification value and the verification reference value are not consistent, it is determined that verification fails. Therefore, characters in the ELF file do not need to be replaced, in the ELF file running process, the ELF file can be verified through the verification value saved in advance, and additional storage space is not occupied.

Description

technical field [0001] The invention relates to information security technology, in particular to a file verification method and device. Background technique [0002] Executable and Linking Format (ELF, Executable and Linking Format) file is a binary file that can be transferred to the central processing unit to run directly, or can be connected with multiple ELF files to form an executable file, so it is called It is widely used in applications such as computers, embedded systems and mobile terminals. [0003] At present, in order to prevent third parties from cracking ELF files through decompilation tools, there are many solutions to protect ELF files. For example, the symbols in the ELF file symbol table are replaced with encrypted symbols, making the encrypted symbols difficult to read. , to increase the threshold of files being maliciously cracked, so as to protect ELF files. [0004] However, when the above scheme decrypts the ELF file, it needs to decrypt the encryp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F11/10
CPCG06F11/1004
Inventor 石松泉左敏刘芳耿慧拯
Owner CHINA MOBILE COMM GRP CO LTD