Unlock instant, AI-driven research and patent intelligence for your innovation.

Program security verification method, device and terminal equipment

A security verification and program technology, applied in the computer field, can solve problems such as inability to program security verification, and achieve the effect of accurate security verification

Active Publication Date: 2021-10-22
PRANUS BEIJING TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to at least solve one of the above-mentioned technical defects, especially the technical defect that cannot effectively verify the security of the program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program security verification method, device and terminal equipment
  • Program security verification method, device and terminal equipment
  • Program security verification method, device and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention.

[0066] Those skilled in the art will understand that unless otherwise stated, the singular forms "a", "an", "said" and "the" used herein may also include plural forms. It should be further understood that the word "comprising" used in the description of the present invention refers to the presence of said features, integers, steps, operations, elements and / or components, but does not exclude the presence or addition of one or more other features, Integers, steps, operations, elements, components, and / or groups thereof. It will be unders...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide a program security verification method, device, and terminal equipment, wherein the program security verification method includes: when it is detected that the program starts running, reading the relevant data information of the program, and the relevant data information of the program includes the Signature information corresponding to the instruction sequence and the program; determine the first byte number of the relevant data information of the program; perform security verification on the program based on the first byte number. The program security verification method in the embodiment of the present invention determines a corresponding verification strategy based on the number of bytes of relevant data information of the program, and efficiently and accurately performs security verification on the program according to the corresponding verification strategy.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular, the present invention relates to a program security verification method, device and terminal equipment. Background technique [0002] With the rapid development of new technologies such as the Internet of Things, mobile Internet, and cloud computing, information technology has profoundly affected people's lifestyles, and ubiquitous information has become an important asset for countries, enterprises, and individuals. As the types of network security threats become increasingly diverse, these important information assets will be exposed to more and more threats, such as the illegal tampering of normal programs by malware. Enter malicious code to achieve the purpose you want to achieve. If the program is not verified for safety when the program is running, but the program is started directly, the program that has been illegally tampered with will be executed, thereby threa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51
CPCG06F21/51G06F2221/033
Inventor 高连凯
Owner PRANUS BEIJING TECH CO LTD