Software program module integrity detection method based on PKI public key algorithm
一种完整性检测、软件程序的技术,应用在公共密钥基础设施的信任模型、电气元件、数字传输系统等方向,能够解决不能有效地防止软件非法篡改和利用、软件程序效率降低等问题,达到防止非法篡改和利用、保护知识产权的效果
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0016] In order to make the technical means, creative features, objectives and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.
[0017] noun analysis
[0018] Executable files: Executable programs, in pe format for windows, and elf format for linux and android platforms, mostly organized in the form of a header plus a section area.
[0019] Section area: English description is section, which means a code block or data block in the executable file
[0020] Program entry point: the location where the executable file starts to run after it is executed.
[0021] PKI: public key infrastructure, for a detailed description, please refer to Baidu Encyclopedia
[0022] http: / / baike.baidu.com / link? url=3A-5BhM_c0tlNvAHfDHXi5_Im7FJg89A3FLDXTN_O2Qw7LifdK83tSKZVmyHGODaPqvVkn6DrYoLQ6Xqm3DRFa.
[0023] Public Key Algorithm: An algorithm that uses two completely different but co...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap