Unlock instant, AI-driven research and patent intelligence for your innovation.

Software code starting method and system

A code and software technology, applied in the computer field, can solve problems such as hidden dangers of software security and easy interception of core codes, and achieve the effect of ensuring security

Inactive Publication Date: 2021-09-07
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF3 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of this manual provides a code startup method and system, which are used to solve the current problem that illegal users can easily intercept the core code when loading the core code in the software, which leads to the problem that the software has a great security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software code starting method and system
  • Software code starting method and system
  • Software code starting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0073] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of this specification, the technical solutions in the embodiments of this specification will be clearly and completely described below in conjunction with the drawings in one or more embodiments of this specification Obviously, the described embodiments are only some of the embodiments in this specification, not all of them. Based on the embodiments in this specification, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this document.

[0074] The system security function of software plays a vital role in the security of the software system, and the core code of the security function is the core part of the whole function. Usually, when the software loads the core code, the core code can be compiled into a binary file, and then loaded, parsed and run by the software system....

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a software code starting method and system. The method comprises the following steps: storing ciphertext data of a target code in target software in a security file system corresponding to a trusted execution environment TEE in advance; enabling the target software and the TEE to negotiate a key for encrypting the target code in advance; in this way, when the target software starts the target code, the code loading request can be sent to the TEE, and the TEE can decrypt the ciphertext data of the stored target code, encrypt the ciphertext data by using the negotiated key and then transmit the encrypted ciphertext data to the target software; and the target software loads and runs the target code after decryption.

Description

technical field [0001] This document relates to the field of computer technology, in particular to a software code startup method and system. Background technique [0002] There are various core functions in the software, and the binary data obtained after compiling the core code of each function is the core of the function runtime. Usually, when starting the core code, the core code can be directly compiled into a binary file, and then loaded, parsed, and run by the software system during the startup process. [0003] However, with the increasing complexity of the network environment, illegal users may hijack the software system during the software startup process. If an illegal user (such as a hacker) hijacks the software system, then the illegal user can intercept the binary content of the core code in the system and obtain the content of the core code through disassembly. After that, the illegal user can tamper with the core code and convert the tampered The core code ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/12G06F21/57G06F21/60
CPCG06F21/125G06F21/57G06F21/602
Inventor 帅峰云武鹏
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD