Unlock instant, AI-driven research and patent intelligence for your innovation.

File signature method, file check method, and corresponding apparatuses and devices

A technology for verifying devices and file names, which is applied in safety communication devices, computer safety devices, electrical components, etc., can solve the problems of high upgrade cost and low flexibility, achieve high flexibility, reduce calculation amount, and reduce upgrade cost Effect

Inactive Publication Date: 2018-08-21
ALIBABA GRP HLDG LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, the protected file information and MD5 value of the above method need to be stored in the safe storage area. Any modification of the protected file needs to update the safe storage area.
Low flexibility and high upgrade cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • File signature method, file check method, and corresponding apparatuses and devices
  • File signature method, file check method, and corresponding apparatuses and devices
  • File signature method, file check method, and corresponding apparatuses and devices

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0044] Terms used in the embodiments of the present invention are only for the purpose of describing specific embodiments, and are not intended to limit the present invention. As used in the embodiments of the present invention and the appended claims, the singular forms "a", "said" and "the" are also intended to include the plural forms unless the context clearly indicates otherwise.

[0045] It should be understood that the term "and / or" used herein is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean that A exists alone, and A and B exist simultaneously. B, there are three situations of B alone. In addition, the character " / " in this articl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a file signature method, a file check method, and corresponding apparatuses and devices. Signature files are generated for protected file information and hash values of protected files, wherein the hash values are used for file check in a file check process; and in the way, in an operation system upgrading process, if a protected file is updated, a signature file is regenerated only for the protected file to replace the existing signature file, without being like the prior art that MD5 needs to be recalculated for all the protected files and update is performed, so thatthe calculation amount and the upgrading cost are reduced and the flexibility is higher.

Description

【Technical field】 [0001] The invention relates to the field of computer application technology, in particular to a file signature method, a file verification method, and corresponding devices and equipment. 【Background technique】 [0002] The operating system is the support environment for the normal operation of the program, and the security of the operating system determines the overall security of the user during the use of each program on the operating system. Among them, preventing tampering of protected files in the operating system is an important part of improving the security of the operating system. [0003] In order to prevent tampering of protected files in the operating system, the file verification schemes currently used mainly include: [0004] 1) File signature process: store protected file information in a secure storage area; calculate a unified MD5 value for all protected files, and then store the MD5 value in the secure storage area. [0005] 2) File ve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L9/32
CPCG06F21/6218G06F2221/2107H04L9/0643H04L9/3247
Inventor 慕银锁董民李利民陶伟成
Owner ALIBABA GRP HLDG LTD