CN107368713A - 保护软件的方法和安全组件 - Google Patents
保护软件的方法和安全组件 Download PDFInfo
- Publication number
- CN107368713A CN107368713A CN201710632392.7A CN201710632392A CN107368713A CN 107368713 A CN107368713 A CN 107368713A CN 201710632392 A CN201710632392 A CN 201710632392A CN 107368713 A CN107368713 A CN 107368713A
- Authority
- CN
- China
- Prior art keywords
- software
- target software
- target
- security component
- specific characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000012545 processing Methods 0.000 claims description 33
- 238000001629 sign test Methods 0.000 claims description 19
- 238000005457 optimization Methods 0.000 claims description 8
- 238000011161 development Methods 0.000 abstract description 4
- 230000008569 process Effects 0.000 description 8
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 8
- 238000005336 cracking Methods 0.000 description 7
- 238000001514 detection method Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000002513 implantation Methods 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000007246 mechanism Effects 0.000 description 2
- 241000700605 Viruses Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000002155 anti-virotic effect Effects 0.000 description 1
- 230000000712 assembly Effects 0.000 description 1
- 238000000429 assembly Methods 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000003672 processing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/10—Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
- G06F21/12—Protecting executable software
- G06F21/121—Restricting unauthorised execution of programs
- G06F21/125—Restricting unauthorised execution of programs by manipulating the program code, e.g. source code, compiled code, interpreted code, machine code
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Technology Law (AREA)
- Multimedia (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (12)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710632392.7A CN107368713B (zh) | 2017-07-28 | 2017-07-28 | 保护软件的方法和安全组件 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710632392.7A CN107368713B (zh) | 2017-07-28 | 2017-07-28 | 保护软件的方法和安全组件 |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107368713A true CN107368713A (zh) | 2017-11-21 |
CN107368713B CN107368713B (zh) | 2019-07-19 |
Family
ID=60308002
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710632392.7A Active CN107368713B (zh) | 2017-07-28 | 2017-07-28 | 保护软件的方法和安全组件 |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107368713B (zh) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804882A (zh) * | 2018-06-11 | 2018-11-13 | 北京北信源信息安全技术有限公司 | 一种正版软件检测处理方法和系统 |
CN110647751A (zh) * | 2018-06-26 | 2020-01-03 | 马上消费金融股份有限公司 | 一种jar包安全确定方法、系统、设备及计算机介质 |
CN111190611A (zh) * | 2018-11-15 | 2020-05-22 | 信特尼有限公司 | 软件安装方法 |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101477608A (zh) * | 2008-01-04 | 2009-07-08 | 胡敏 | 一种防止软件中数据和代码被修改的加密方法 |
CN102314578A (zh) * | 2011-09-26 | 2012-01-11 | 浪潮(北京)电子信息产业有限公司 | 一种实现软件保护的系统及方法 |
CN103647785A (zh) * | 2013-12-20 | 2014-03-19 | 北京奇虎科技有限公司 | 一种移动终端安全的控制方法、装置及系统 |
CN103823751A (zh) * | 2013-12-13 | 2014-05-28 | 国家计算机网络与信息安全管理中心 | 一种基于特征注入的仿冒应用程序监测方法 |
CN104021339A (zh) * | 2014-06-10 | 2014-09-03 | 北京奇虎科技有限公司 | 移动终端的安全支付方法及装置 |
US20150113284A1 (en) * | 2013-10-23 | 2015-04-23 | Samsung Electronics Co., Ltd. | Method and apparatus for protecting application program |
CN105701423A (zh) * | 2015-12-31 | 2016-06-22 | 深圳前海微众银行股份有限公司 | 应用于云端支付业务的数据存储方法及装置 |
CN105787373A (zh) * | 2016-05-17 | 2016-07-20 | 武汉大学 | 一种移动办公系统中Android终端数据防泄漏方法 |
-
2017
- 2017-07-28 CN CN201710632392.7A patent/CN107368713B/zh active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101477608A (zh) * | 2008-01-04 | 2009-07-08 | 胡敏 | 一种防止软件中数据和代码被修改的加密方法 |
CN102314578A (zh) * | 2011-09-26 | 2012-01-11 | 浪潮(北京)电子信息产业有限公司 | 一种实现软件保护的系统及方法 |
US20150113284A1 (en) * | 2013-10-23 | 2015-04-23 | Samsung Electronics Co., Ltd. | Method and apparatus for protecting application program |
CN103823751A (zh) * | 2013-12-13 | 2014-05-28 | 国家计算机网络与信息安全管理中心 | 一种基于特征注入的仿冒应用程序监测方法 |
CN103647785A (zh) * | 2013-12-20 | 2014-03-19 | 北京奇虎科技有限公司 | 一种移动终端安全的控制方法、装置及系统 |
CN104021339A (zh) * | 2014-06-10 | 2014-09-03 | 北京奇虎科技有限公司 | 移动终端的安全支付方法及装置 |
CN105701423A (zh) * | 2015-12-31 | 2016-06-22 | 深圳前海微众银行股份有限公司 | 应用于云端支付业务的数据存储方法及装置 |
CN105787373A (zh) * | 2016-05-17 | 2016-07-20 | 武汉大学 | 一种移动办公系统中Android终端数据防泄漏方法 |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108804882A (zh) * | 2018-06-11 | 2018-11-13 | 北京北信源信息安全技术有限公司 | 一种正版软件检测处理方法和系统 |
CN110647751A (zh) * | 2018-06-26 | 2020-01-03 | 马上消费金融股份有限公司 | 一种jar包安全确定方法、系统、设备及计算机介质 |
CN111190611A (zh) * | 2018-11-15 | 2020-05-22 | 信特尼有限公司 | 软件安装方法 |
Also Published As
Publication number | Publication date |
---|---|
CN107368713B (zh) | 2019-07-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9230099B1 (en) | Systems and methods for combining static and dynamic code analysis | |
Tan et al. | AutoISES: Automatically Inferring Security Specification and Detecting Violations. | |
TWI575397B (zh) | 利用運行期代理器及動態安全分析之應用程式逐點保護技術 | |
US9146833B2 (en) | System and method for correct execution of software based on a variance between baseline and real time information | |
Diamantaris et al. | Reaper: real-time app analysis for augmenting the android permission system | |
US20080163374A1 (en) | Automatic Vulnerability Detection and Response | |
Rastogi et al. | Uranine: Real-time privacy leakage monitoring without system modification for android | |
CN107368713B (zh) | 保护软件的方法和安全组件 | |
CN108205491B (zh) | 一种基于nkv6.0系统的可信技术兼容性测试方法 | |
JPWO2004075060A1 (ja) | コンピュータウィルス判断方法 | |
Bagheri et al. | Automated dynamic enforcement of synthesized security policies in android | |
US9514028B2 (en) | System and method for determining correct execution of software based on baseline and real time trace events | |
Kellogg et al. | Continuous compliance | |
Liu et al. | KUBO: Precise and Scalable Detection of User-triggerable Undefined Behavior Bugs in OS Kernel. | |
Yeh et al. | Craxdroid: Automatic android system testing by selective symbolic execution | |
US20090287679A1 (en) | Evaluation of tamper resistant software system implementations | |
US9003236B2 (en) | System and method for correct execution of software based on baseline and real time information | |
Kumar et al. | Hardware-assisted mechanisms to enforce control flow integrity: A comprehensive survey | |
CN111367505A (zh) | 一种JavaScript源代码保密方法、装置、设备及存储介质 | |
Jurn et al. | A survey of automated root cause analysis of software vulnerability | |
Hermann et al. | Getting to know you: Towards a capability model for java | |
Mori et al. | A tool for analyzing and detecting malicious mobile code | |
JP7008879B2 (ja) | 情報処理装置、情報処理方法及び情報処理プログラム | |
Song et al. | Finding Tizen security bugs through whole-system static analysis | |
Wang et al. | A Systematic Literature Review on Smart Contract Vulnerability Detection by Symbolic Execution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20211130 Address after: 201203 room 906, floor 9, building 1, No. 169 shengxia road and No. 1658 Zhangdong Road, pilot Free Trade Zone, Pudong New Area, Shanghai Patentee after: Shanghai Weibai Technology Co.,Ltd. Address before: 100193 5th floor 510, No. 5 Building, East Yard, No. 10 Wangdong Road, Northwest Haidian District, Beijing Patentee before: BEIJING SENSESHIELD TECHNOLOGY Co.,Ltd. |
|
CP02 | Change in the address of a patent holder | ||
CP02 | Change in the address of a patent holder |
Address after: 201203 room 912, 9 / F, building 1, No. 169 shengxia road and No. 1658 Zhangdong Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai Patentee after: Shanghai Weibai Technology Co.,Ltd. Address before: 201203 room 906, floor 9, building 1, No. 169 shengxia road and No. 1658 Zhangdong Road, pilot Free Trade Zone, Pudong New Area, Shanghai Patentee before: Shanghai Weibai Technology Co.,Ltd. |