Communication hub and method for verifying message among applications thereof

An application program and information verification technology, applied in the direction of inter-program communication, multi-program device, program control design, etc., to achieve the effect of preventing illegal access

Active Publication Date: 2018-03-09
WISTRON NEWEB
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, any malicious program can masquerade as a valid application and use IPC to transmit information to obtain user privacy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication hub and method for verifying message among applications thereof
  • Communication hub and method for verifying message among applications thereof
  • Communication hub and method for verifying message among applications thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] figure 1 is a block diagram of a communication hub according to an embodiment of the present invention. Please refer to figure 1 , the communication hub 100 includes a processor 110 , a storage unit 120 , a memory 130 , a remote communication unit 140 and a local communication unit 150 . The processor 110 is coupled to the storage unit 120 , the memory 130 , the remote communication unit 140 and the local communication unit 150 .

[0030] The processor 110 is, for example, a central processing unit (Central Processing Unit, CPU), an image processing unit (Graphic Processing Unit, GPU), a physical processing unit (Physics Processing Unit, PPU), a programmable microprocessor (Microprocessor), an embedded Control chip, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuits, ASIC) or other similar devices. The processor 110 is used to execute hardware, firmware and process data in the co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a communication hub and a method for verifying a message among applications thereof. In a start-up process, a processor uses a start-up program to generate a secret key for afirst and second application separately and transmits all the secret keys to the first and second applications, so that each of the applications carries corresponding at least one secret key when performing message transfer. After entering an operating system, when the first application receives a message from the second application, whether the message is valid is verified according to the secretkey carried in the message. When the message is judged to be valid, the first application passes back response information according to the message. When the message is judged to be invalid, the message is neglected or discarded. According to the communication hub, in the start-up process, a corresponding secret key is given to each of the applications, and the secret keys are utilized to performverification during message transfer among the applications, thereby preventing illegal access of malicious programs. In addition, a communication port of each application can be matched for verification, thereby further enhancing security.

Description

technical field [0001] The invention relates to an information verification mechanism, and in particular to an information verification method between a communication hub and its application programs. Background technique [0002] Generally speaking, data in each application program in the operating system is not allowed to be accessed by other application programs. This is to prevent private or confidential data from being accessed by other applications, so that other applications cannot obtain data directly through the shared memory. In order to enable different application programs to access resources and perform coordinated work, an inter-process communication (Inter-Process Communication, IPC) technology is used to transmit data or signals. However, any malicious program can masquerade as a valid application program and use IPC to transmit information to obtain user privacy. [0003] Therefore, a method for verifying information between a communication hub and its app...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/54
CPCG06F9/541G06F9/546
Inventor 陈建宇李文进钟启豪
Owner WISTRON NEWEB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products