Software program module integrity detection method based on PKI public key algorithm

一种完整性检测、软件程序的技术,应用在公共密钥基础设施的信任模型、电气元件、数字传输系统等方向,能够解决不能有效地防止软件非法篡改和利用、软件程序效率降低等问题,达到防止非法篡改和利用、保护知识产权的效果

Active Publication Date: 2018-10-16
KOAL SOFTWARE CO LTD
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention: Aiming at the problems that the existing software protection means cannot effectively prevent the software from being illegally tampered with and used, resulting in a decrease in the efficiency of the software program and the possibility that the software is disabled by the anti-virus software, etc., it provides a A software program module integrity detection method based on PKI public key algorithm to prevent software from being illegally tampered with and exploited without affecting the normal functions of the software program

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] In order to make the technical means, creative features, objectives and effects achieved by the present invention easy to understand, the present invention will be further described below in conjunction with specific illustrations.

[0017] noun analysis

[0018] Executable files: Executable programs, in pe format for windows, and elf format for linux and android platforms, mostly organized in the form of a header plus a section area.

[0019] Section area: English description is section, which means a code block or data block in the executable file

[0020] Program entry point: the location where the executable file starts to run after it is executed.

[0021] PKI: public key infrastructure, for a detailed description, please refer to Baidu Encyclopedia

[0022] http: / / baike.baidu.com / link? url=3A-5BhM_c0tlNvAHfDHXi5_Im7FJg89A3FLDXTN_O2Qw7LifdK83tSKZVmyHGODaPqvVkn6DrYoLQ6Xqm3DRFa.

[0023] Public Key Algorithm: An algorithm that uses two completely different but co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software program module integrity detection method based on a PKI public key algorithm, and the method comprises the steps: carrying out the signing of a program module through a fixed certificate based on the PKI public key algorithm and a dedicated loading module; verifying module signature, loading a module, decrypting an imported table envelope, restoring an importedtable and starting a signature verifying thread of a code region during operation through comprising a fixed public key certificate, modulate signature and imported table digital envelope; entering anoriginal program inlet point for continuing the execution, wherein the secret keys employed during signing are consistent with the certificates employed during signature verification in a one-to-onemanner. The beneficial effects of the invention lie in that the method protects software from being tampered and used illegally under the condition that the normal function of the software is not affected, and also protects the intellectual property of a software owner.

Description

technical field [0001] The invention relates to the technical field of software protection, in particular to a software program module integrity detection method based on a PKI public key algorithm. Background technique [0002] With the popularity of computers in daily production, various application software running on computers have become more and more abundant, and it can be described as a prosperous scene today. Behind the prosperity of various application software, driven by interests, various illegal tampering and cracking technologies for application software are also developing continuously. The main way is to modify the software through static or dynamic analysis methods, so as to obtain The use license of the software, the purpose of destroying the normal function of the software or executing malicious code. On the one hand, this kind of behavior makes the intellectual property rights of the software owner suffer, and on the other hand, it threatens the security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/32H04L29/06
CPCH04L9/006H04L9/3263H04L63/123
Inventor 彭相钰曾政王佩成
Owner KOAL SOFTWARE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products