Kernel patch loading method and device

A kernel and patch technology, applied in the computer field, can solve the problems of passivity, long cycle, and inability to protect user information security, and achieve the effect of ensuring information security.

Active Publication Date: 2018-04-20
BEIJING QIHOO TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has been observed that every time Android kernel vulnerabilities are exposed, the driver-related vulnerabilities of downstream component manufacturers account for a high proportion, sometimes accounting for more than half. Usually, downstream manufacturers can only rely on the over-the-air technology (OTA, Over-the- AirTechnology) for upgrades, and OTA upgrades generally have a longer cycle. For some high-risk driver-level vulnerabilities, if you rely on OTA upgrades every time to fix them, it will obviously be very passive.
During this period of time, hackers may have broken into the user terminal, implanted a Trojan horse or malicious program in the terminal, resulting in the leakage of user property or information, and cannot guarantee the security of user information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Kernel patch loading method and device
  • Kernel patch loading method and device
  • Kernel patch loading method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0015] An embodiment of the present invention provides a method for loading a kernel patch, which is applied to a terminal installed with a Linux system or other systems based on Linux, such as an Android system.

[0016] see figure 1 As shown, the loading method of the kernel patch includes the following steps:

[0017] S101: Obtain a placeholder function, and write the placeholder function into a kernel memory area to occupy a s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a kernel patch loading method and device, and aims to dynamically load and timely patch kernel patches and guarantee information security of users. The method includes the steps: acquiring a placeholder function, and writing the placeholder function into a kernel memory area to occupy preset storage space in the kernel memory area; acquiring a kernel patch code; writing thekernel patch code into the storage space.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for loading a kernel patch. Background technique [0002] The traditional kernel patching method is generally to unload the problematic kernel module or driver module, and dynamically load the patched kernel module or driver module. This method needs to rely on the opening of the loadable kernel module (LKM, LoadableKernel Modules) and the There is still enough free memory in the application memory area. [0003] In practical applications, based on security considerations, terminal manufacturers will disable the LKM function of Android mobile phones. However, it has been observed that every time Android kernel vulnerabilities are exposed, the driver-related vulnerabilities of downstream component manufacturers account for a high proportion, sometimes accounting for more than half. Usually, downstream manufacturers can only rely on the over-the-air technolog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/445
Inventor 高永岗张建新
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products