SO file security reinforcement/calling method and system and reversible matrix generation server

A server and inverse matrix technology, applied in the direction of computer security devices, instruments, program/content distribution protection, etc., can solve problems such as source code security reinforcement of SO files, and achieve the effect of improving the difficulty of deciphering

Pending Publication Date: 2021-12-28
GLOBAL ENERGY INTERCONNECTION RES INST CO LTD +2
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

In this patented technology described in this patents, there has been developed an improved way to prevent unauthorised access (IoA) attacks against Java applications stored within their memory space called SO files. These methods involve adding extra layers inside each layer of encrypted code before sending it over wirelessly through wireless networks. By doing these modifications, even weakly-enclaced malware cannot gain knowledge about how they were executed without being detected. Additionally, certain techniques like hash tables have also been used to improve protection mechanisms such as reverse looking matrices. Overall, these technical improvements aim to enhance the strength of secure computing environments while reducing vulnerabilities associated with I/O connections.

Problems solved by technology

This patented technical problem addressed by the patents relates to developing a more effective way to improve the security of internet protocol networks while also addressing issues related to their potential damage caused due to hacking attempts made against these systems. Current solutions require expensive hardware components like smart cards or sensors, making them difficult to deploy across different platforms without being able to completely encrypt all important parts of the original sources during commissioning processes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SO file security reinforcement/calling method and system and reversible matrix generation server
  • SO file security reinforcement/calling method and system and reversible matrix generation server
  • SO file security reinforcement/calling method and system and reversible matrix generation server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] like figure 1 As shown, the present invention provides a SO file security hardening method, including: in the SO file security hardening system,

[0083] S101: Encrypt the SO file of the IoT application to obtain a binary file;

[0084] S102: Randomly split the binary file into multiple file segments;

[0085] S103: Randomly generate a lookup table matrix B and obtain a calculation matrix based on the lookup table matrix B;

[0086] S104: Encapsulate the calculation matrix and multiple file fragments to obtain an encapsulated SO file corresponding to the IoT application SO file.

[0087] S103 in the present invention: randomly generate the lookup table matrix B and obtain the calculation matrix based on the lookup table matrix B, the randomly generated lookup table matrix B can be sent to the reversible matrix generation server, and the reversible matrix generation server performs the lookup table matrix B The calculation matrix is ​​obtained through processing; when th

Embodiment 2

[0102] After the security hardening of the SO file, the SO file is encapsulated into a JAR package. Since the preprocessing process of the SO file needs to be performed before running the application JAR package, it is necessary to use a shell JAR file to integrate and serially reorganize the SO file, and SM4 to decrypt the SO file and the original JAR file. order of execution. The shell JAR file needs to meet:

[0103] 1. Replace with the same name as the original JAR file;

[0104] 2. The shell JAR uses the JNI mechanism to call the reorganized SO file first, then call SM4 to decrypt the SO file, and finally call the original JAR file;

[0105] 3. The driver shell JAR file must fully receive the input commands and parameters, and pass the commands and parameters to the original JAR file for execution.

[0106] Therefore the present invention also provides a calling method of SO file, such as Figure 11 As shown, when the IoT application calls the SO file during the execution

Embodiment 3

[0124] Based on the same inventive concept, the present invention also provides a calling system for SO files, including: shell files;

[0125] The shell file is used to: reorganize the pre-packaged SO file; then decrypt the reorganized SO file to obtain the IoT application SO file; execute operations on the IoT application SO file by calling the original JAR file;

[0126] Here, the SO file is encapsulated by using the SO file security hardening method provided by the present invention.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SO file security reinforcement/calling method and system and a reversible matrix generation server. The method comprises the following steps: encrypting an Internet of Things application SO file by using an SM4 algorithm to obtain a binary file; randomly splitting the binary file into a plurality of file fragments; and recombining and packaging based on a randomly generated lookup table matrix. According to the method, the self security protection capability of the Internet of Things APP SO file running on the Internet of Things terminal is improved, and the reverse analysis prevention capability of the SO file is greatly enhanced through the SM4 cryptographic algorithm and the file fragment lookup table recombination technology, so that the Internet of Things terminal and the Internet of Things application are further protected from being attacked by malicious networks, and the method has a high engineering practical value.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner GLOBAL ENERGY INTERCONNECTION RES INST CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products