Software security hardening method, device, electronic device and storage medium

A technology for software security and hardening devices, applied in the field of information security, can solve the problems of reducing model accuracy, training, and model training data cannot be disclosed, so as to achieve the effect of ensuring operation accuracy and reducing hardening time

Active Publication Date: 2021-06-08
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in related technologies, there is no guarantee that the model is also protected while providing protection for the code, and the method of providing protection for the model requires training the model, but the training data of the model is usually not public, so it cannot be trained, even if it can Retraining it will also reduce the accuracy of the model

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software security hardening method, device, electronic device and storage medium
  • Software security hardening method, device, electronic device and storage medium
  • Software security hardening method, device, electronic device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the purpose, technical solutions and advantages of the present disclosure clearer, the present disclosure will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings.

[0045] It should be noted that, unless otherwise defined, the technical terms or scientific terms used in one or more embodiments of the present specification shall have ordinary meanings understood by those skilled in the art to which the present disclosure belongs. "First", "second" and similar words used in one or more embodiments of the present specification do not indicate any order, quantity or importance, but are only used to distinguish different components. "Comprising" or "comprising" and similar words mean that the elements or items appearing before the word include the elements or items listed after the word and their equivalents, without excluding other elements or items. Words such as "connected" or "con...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosure provides a software security hardening method, device, electronic equipment, and storage medium, including: extracting identification information from pre-acquired software to be hardened; determining the code to be hardened and the model to be hardened according to the software to be hardened; The code verification information and model verification information are respectively added to the model to be strengthened and the code to be strengthened to obtain the strengthened model and the strengthened code; and the strengthened model and the strengthened code are reorganized to obtain the strengthened software. This disclosure builds a mutual authentication relationship between the code to be reinforced and the model to be reinforced, and does not need to retrain the model to be reinforced, which ensures the running accuracy of the model after reinforcement, and does not modify the core logic in the software, reducing reinforcement time.

Description

technical field [0001] The present disclosure relates to the technical field of information security, and in particular, to a software security hardening method, device, electronic equipment, and storage medium. Background technique [0002] In the related art, the reinforcement of the code and the model in the software is completely independent. For example, the code in the software is protected by rewriting the code or obfuscating the code, and the model in the software is protected by encryption or backdoor protection. However, in related technologies, there is no guarantee that the model is also protected while providing protection for the code, and the method of providing protection for the model requires training the model, but the training data of the model is usually not public, so it cannot be trained, even if it can Retraining it will also reduce the accuracy of the model. Contents of the invention [0003] In view of this, the present disclosure proposes a soft...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/14
CPCG06F21/14
Inventor 徐国爱徐国胜王浩宇王晨宇华嘉仪
Owner BEIJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products