Software program module integrity detection method based on PKI public key algorithm
A technology of integrity detection and software program, applied in the trust model of public key infrastructure, electrical components, digital transmission system, etc., can solve the problems such as the inability to effectively prevent the illegal tampering and utilization of software, and the reduction of software program efficiency. Achieve the effect of preventing illegal tampering and utilization and protecting intellectual property rights
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0016] In order to make the technical means, creative features, objectives and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.
[0017] noun analysis
[0018] Executable files: Executable programs, in pe format for windows, and elf format for linux and android platforms, mostly organized in the form of a header plus a section area.
[0019] Section area: English description is section, which means a code block or data block in the executable file
[0020] Program entry point: the location where the executable file starts to run after it is executed.
[0021] PKI: public key infrastructure, for a detailed description, please refer to Baidu Encyclopedia
[0022] http: / / baike.baidu.com / link? url=3A-5BhM_c0tlNvAHfDHXi5_Im7FJg89A3FLDXTN_O2Qw7LifdK83tSKZVmyHGODaPqvVkn6DrYoLQ6Xqm3DRFa.
[0023] Public Key Algorithm: An algorithm that uses two completely different but co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
