Unlock instant, AI-driven research and patent intelligence for your innovation.

Image software generation method, device and corresponding terminal

A technology for generating devices and software, which is applied in the field of mobile Internet, can solve problems such as not publishing source codes, achieve the effects of improving security, avoiding the spread of attack methods, and increasing the difficulty of attacks

Active Publication Date: 2021-05-28
北京元心君盛科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Often the software systems released on the market do not publish the source code, and attackers can only attack through reverse engineering

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Image software generation method, device and corresponding terminal
  • Image software generation method, device and corresponding terminal
  • Image software generation method, device and corresponding terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]Embodiments of the present invention will be described in detail below, and examples of the embodiments are illustrated in the drawings, in which the same or similar reference numerals represent the same or similar elements or elements having the same or similar functions. The following is exemplary by way of reference to the accompanying drawings, and is intended to be construed as limiting the invention.

[0039]Those skilled in the art will appreciate that unless specifically declared, the singular forms, "one", "" ",", ", and" "", can include plural form. It should be further understood that the phrase "comprising" in the specification of the present invention means that there is the features, integers, steps, operations, components, and / or components, but do not exclude presence or addition of one or more other features. Integer, steps, operations, components, components, and / or groups. It should be understood that when the components are "connected" or "coupled" to anot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a mirror software generating method, device and corresponding terminal. The method includes: respectively compiling each source code file constituting the target software into corresponding binary files; determining multiple links of multiple binary files according to preset link rules sequence; link multiple binary files according to any link sequence to generate executable files of the target software; in this way, multiple versions of binary image executable files with the same functions of the target software are generated, making it difficult for APT attackers to find attack patterns and Give up, and even if an APT attacker obtains a certain binary executable file and uses reverse engineering to break it successfully, other binary executable files for the same target software cannot be referenced, avoiding the spread of the same attack method, and effectively increasing the difficulty of reverse APT attacks , Improve the security of various types of networks and terminal equipment at all levels.

Description

Technical field[0001]The present invention relates to the field of mobile Internet technology, in particular, the present invention relates to a method, apparatus, and corresponding terminal of mirroring software.Background technique[0002]In recent years, APT (Advanced Persistent Threat, advanced persistent threat) has become a trendy noun for the information security turns, which has become the main security threats faced by various networks and end equipment at all levels. It makes the security threat to become a purpose, organized, premeditated group attack.[0003]It is difficult to give an accurate definition of APT. The definition given by the National Standards and Technology Research Institute is: An attacker with complex complex technology uses multiple attack vectors (such as network, physical and fraud), with rich resource creation opportunities to achieve their own purpose. . These purposes typically include tampering with the information technology architecture of the tar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 高连凯
Owner 北京元心君盛科技有限公司