CN109918897A - A kind of password authentification test method and system based on AEP memory - Google Patents
A kind of password authentification test method and system based on AEP memory Download PDFInfo
- Publication number
- CN109918897A CN109918897A CN201910147463.3A CN201910147463A CN109918897A CN 109918897 A CN109918897 A CN 109918897A CN 201910147463 A CN201910147463 A CN 201910147463A CN 109918897 A CN109918897 A CN 109918897A
- Authority
- CN
- China
- Prior art keywords
- memory
- aep
- aep memory
- server
- test
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000010998 test method Methods 0.000 title claims abstract description 14
- 238000012360 testing method Methods 0.000 claims abstract description 79
- 238000001514 detection method Methods 0.000 claims abstract description 42
- 230000007613 environmental effect Effects 0.000 claims abstract description 26
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000000151 deposition Methods 0.000 claims description 3
- 238000009434 installation Methods 0.000 abstract description 21
- 238000000034 method Methods 0.000 abstract description 13
- 230000008569 process Effects 0.000 abstract description 10
- 230000006870 function Effects 0.000 description 12
- 230000006386 memory function Effects 0.000 description 8
- 230000009471 action Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000006467 substitution reaction Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of password authentification test method and system based on AEP memory, includes the following steps: that AEP memory configurations strategy is arranged;Internally deposit into capable encryption;It internally deposits to be decrypted after having encrypted after whether detection encryption is successful and to verifying AEP memory and environmental structure and the driving installation of AEP memory first is carried out to server, the test can be started after the installation is completed.Automatically it is memorymodel or mixed mode that AEP memory configurations strategy is arranged when test, and is encrypted to it;Test node is restarted after encryption, whether detection encryption releases after restarting into linux system.So far the entire test process of AEP memory password authentification is completed.After test, test result log can be checked and be analyzed, judges whether the AEP memory can be normally carried out encrypting and decrypting according to test result.Application of the invention substantially increases AEP memory security test, is conducive to the raising for entirely calculating environmental safety.
Description
Technical field
A kind of memory techniques field of the present invention, and in particular to password authentification test method and system based on AEP memory.
Background technique
With the cloud computing and big data etc. that the complexity of modem computer systems is higher and higher and recent years occurs
Raising of the emerging technology to environmental safety requirement is calculated, industry generally have recognized the need to from the bottom hardware of computer system
The encryption function of data is supported completely.
The mounting means of AEP memory is the same with common memory, is also mounted on memory slot position.But AEP memory can lead to
Adjustment distribution Provisioning Policy is crossed, memorymodel (memory mode), hard disk mode (APD mode) or mixed mode (mix are become
mode).It is similar with common memory when being set as 100% memorymodel (memory mode) for AEP Memory Allocation Strategy, tool
There is memory, can be used when memory.When being set as 100% hard disk mode (APD mode) for AEP Memory Allocation Strategy,
It can be used when hard disk, have the function of storage, but it is fast more than common hard disc read or write speed.In addition to this it is possible to real
Mixed mode (mix mode) now is set by AEP Memory Allocation Strategy, same memory virtual is made to resolve into hard disk function area
With memory function area, while there is memory function and hard disk function.
AEP memory in use, according to practical application scene, may often carry out memorymodel (memory
Mode), the switch operating under hard disk mode (APD mode) and mixed mode (mix mode) Three models is needed for difference
Memorymodel (memory mode) and mixed mode (mix mode) do the verifying of safety.
Summary of the invention
Aiming at the problem that different memorymodels needs to do the verifying of safety, the present invention provides a kind of based on AEP memory
Password authentification test method and system.
In a first aspect, the present invention provides a kind of password authentification test method based on AEP memory, include the following steps:
AEP memory configurations strategy is set;
Internally deposit into capable encryption;
Encrypted AEP memory is decrypted after whether detection encryption is successful and to verifying.
Further, before AEP memory configurations strategy is set, comprising:
Environmental structure is carried out to server to be measured and the driving of AEP memory is installed.
Further, AEP memory configurations strategy is set, comprising:
Memorymodel or mixed mode are saved as in setting AEP.The mounting means of AEP memory is the same with common memory, and
It is mounted in memory slot position.But AEP memory can become memorymodel (memory mode) by adjusting distribution Provisioning Policy
Or mixed mode (mix mode);Mixed mode (mix mode) is set by AEP Memory Allocation Strategy, keeps same memory empty
It is quasi- to resolve into hard disk function area and memory function area, while there is memory function and hard disk function.
Further, it after whether detection encryption is successful, is internally deposited after having been encrypted to verifying AEP memory in being decrypted, it is right
The encryption of AEP memory is verified, and is first carried out environmental structure and the driving installation of AEP memory to server to be measured, is after the installation is completed
It can start to test.Automatically it is memorymodel memory mode that AEP memory configurations strategy is arranged when test, and is encrypted to it;
Test node is restarted after encryption, restarts that the step of whether detection encryption succeeds, verify encryption back specifically includes:
Password authentification request is sent to authentication server;
It receives the encrypted authentication information that authentication server returns and is stored;
The encrypted authentication information is decrypted when receiving to AEP memory predetermined registration operation to generate identifying code and incite somebody to action
The identifying code of generation is transferred to authentication server;
When authentication server receives the identifying code and authentication server preset condition matches, verifying is encrypted to
Function.
Further, after sending password authentification request to authentication server, further includes:
Authentication server generates random number according to the password authentification request received and stores the random number;
The random number of generation is encrypted by the encrypted public key that authentication server generates and generates encrypted authentication information.
Further, it is internally deposited after having been encrypted after whether detection encryption is successful and to verifying AEP memory after being decrypted,
Further include:
Restart whether test node releases into detection encryption after linux system;
If so, the log that outputs test result, judges whether the AEP memory can be normally carried out encryption solution according to test result
It is close.
On the other hand, also a kind of password authentification test macro based on AEP memory of the present invention, including set in server to be measured
There is AEP memory;
Server to be measured further includes setup module, memory encrypting module and detection module;
Setup module, for AEP memory configurations strategy to be arranged;AEP memory in use, according to practical application field
Scape may often carry out the switch operating of memorymodel (memory mode) and mixed mode (mix mode);
Memory encryption/decryption module is decrypted encrypted memory for internally depositing into capable encryption;
Detection module, for whether succeeding to detection encryption/decryption;Environmental structure and AEP first are carried out to server to be measured
Memory driving installation, the test can be started after the installation is completed.Automatically it is memorymodel that AEP memory configurations strategy is arranged when test
Memory mode, and it is encrypted;Test node is restarted after encryption, restarts whether detection encryption back succeeds,
Further, which further includes environmental structure module;
Environmental structure module installs AEP to the AEP memory of server to be measured for carrying out environmental structure to server to be measured
Memory driving.
Further, which further includes authentication server, and the authentication server is communicated with server to be measured
Connection;
Detection module, for sending the solicited message of password authentification to server to be measured;
The authentication server for receiving the password authentification solicited message of detection module transmission, and returns to encryption and tests
Information is demonstrate,proved to server to be measured.
Further, server to be verified further includes identifying code generation module;
The identifying code generation module, for believing when receiving to AEP memory predetermined registration operation the encrypted authentication
Breath is decrypted to generate identifying code and the identifying code of generation is transferred to authentication server;
Authentication server, for when receiving the identifying code and authentication server preset condition matches, return to be tested
Card encrypts successful information to server to be verified.
The beneficial effects of the present invention are first carry out environmental structure and the driving installation of AEP memory to server, install
The test can be started afterwards.Automatically it is memorymodel or mixed mode that AEP memory configurations strategy is arranged when test, and is carried out to it
Encryption;Test node is restarted after encryption, restarts whether detection encryption back succeeds.It verifies after AEP memory has encrypted to memory
It is decrypted, whether detection encryption releases after restarting into linux system.So far the password authentification of AEP memory is completed entirely to test
Journey.After test, test result log can be checked and be analyzed, judges whether the AEP memory can be normal according to test result
Carry out encrypting and decrypting.Application of the invention substantially increases AEP memory security test, is conducive to entirely calculate environmental safety
Raising.
In addition, design principle of the present invention is reliable, structure is simple, has very extensive application prospect.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, for those of ordinary skill in the art
Speech, without creative efforts, is also possible to obtain other drawings based on these drawings.
Fig. 1 is the schematic flow chart of the method for one embodiment of the invention.
Specific embodiment
Technical solution in order to enable those skilled in the art to better understand the present invention, below in conjunction with of the invention real
The attached drawing in example is applied, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described implementation
Example is only a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, this field is common
Technical staff's every other embodiment obtained without making creative work, all should belong to protection of the present invention
Range.
The Key Term occurred in the present invention is explained below.
Embodiment one
As shown in Figure 1, the present invention provides a kind of password authentification test method based on AEP memory, include the following steps:
S1: carrying out environmental structure to server to be measured and installs the driving of AEP memory;
Server to be measured is attached with authentication server, and it is logical to can be carried out server to be measured and authentication server
Letter, the driving of installation AEP memory and test script;The mounting means of AEP memory is the same with common memory, is also mounted in memory slot
On position,
Check whether the memory of server to be measured can be normally carried out the reading of information;
According to inspection result, if memory can be normally carried out information and read execution test script progress test process, another party
Just, if reading memory information exception, test script and output error prompt information are not executed, tester is facilitated to examine
It looks into.
S2: setting AEP memory configurations strategy;
AEP memory in use, according to practical application scene, may often carry out memorymodel (memory
) and the switch operating of mixed mode (mix mode) mode;In this step, first to server to be measured carry out environmental structure and
The driving installation of AEP memory, the test can be started after the installation is completed, and it is memorymodel that memory configurations strategy, which is arranged, in when test automatically
(memory mode) or mixed mode (mix mode), makes same memory virtual resolve into hard disk function area and memory function
Area, while there is memory function and hard disk function.The step of encrypting to memory is executed after setting up AEP memory configurations strategy;
S3: it internally deposits into row and encrypts and test node is restarted;
Memory encrypting module internally deposits into the process of row encryption, and memory encrypting module first needs to check current service to be measured
The processor state in which of device, if that is, current server to be measured processor it is busy, memory encrypting module needs exit
To need to hang up the operating system of server to be measured, be exactly this field if the processor of server to be measured is in idle condition
The operating system that technical staff often says does not receive the input-output operation of other operation processes, and processor is used to receive memory encryption
The CIPHERING REQUEST that module is sent, and " return " key" more new command, to memory encrypting module, memory encrypting module receives key more
New key is generated when new command, memory encrypting module is used after being decrypted to the page that each of memory is encrypted with old key
The key that the heart generates re-starts encryption.
S4: whether detection encryption succeeds, if so, step S5 is executed, if it is not, executing step S3;In this step, if detection adds
Close unsuccessful execution step S3, while exporting the unsuccessful test l og of testing encryption;
S5: AEP memory is decrypted and restarts test node after having encrypted to verifying;
S6: whether detection encryption releases;If so, step S7 is executed, if it is not, executing step S5;Test decryption is exported simultaneously
Unsuccessful test log;
Environmental structure and the driving installation of AEP memory first are carried out to server, the test can be started after the installation is completed.When test
Automatic setting AEP memory configurations strategy is memorymodel or mixed mode, and is encrypted to it;To test node after encryption
Restart, restarts whether detection encryption back succeeds.Verifying AEP memory is internally deposited after having encrypted and is decrypted, and is restarted into Linux system
Whether detection encryption releases after system.So far the entire test process of AEP memory password authentification is completed.
S7: output test result log, judges whether the AEP memory can be normally carried out encrypting and decrypting according to test result.
Embodiment two
The present invention provides a kind of password authentification test method based on AEP memory, includes the following steps:
S1: carrying out environmental structure to server to be measured and installs the driving of AEP memory;
Server to be measured is attached with authentication server, and it is logical to can be carried out server to be measured and authentication server
Letter, the driving of installation AEP memory and test script;The mounting means of AEP memory is the same with common memory, is also mounted in memory slot
On position,
Check whether the memory of server to be measured can be normally carried out the reading of information;
According to inspection result, if memory can be normally carried out information and read execution test script progress test process, another party
Just, if reading memory information exception, test script and output error prompt information are not executed, tester is facilitated to examine
It looks into.
S2: setting AEP memory configurations strategy;
AEP memory in use, according to practical application scene, may often carry out memorymodel (memory
) and the switch operating of mixed mode (mix mode) mode;In this step, first to server to be measured carry out environmental structure and
The driving installation of AEP memory, the test can be started after the installation is completed, and it is memorymodel that memory configurations strategy, which is arranged, in when test automatically
(memory mode) or mixed mode (mix mode), makes same memory virtual resolve into hard disk function area and memory function
Area, while there is memory function and hard disk function.The step of encrypting to memory is executed after setting up AEP memory configurations strategy;
S3: it internally deposits into row and encrypts and test node is restarted;
Memory encrypting module internally deposits into the process of row encryption, and memory encrypting module first needs to check current service to be measured
The processor state in which of device, if that is, current server to be measured processor it is busy, memory encrypting module needs exit
To need to hang up the operating system of server to be measured, be exactly this field if the processor of server to be measured is in idle condition
The operating system that technical staff often says does not receive the input-output operation of other operation processes, and processor is used to receive memory encryption
The CIPHERING REQUEST that module is sent, and " return " key" more new command, to memory encrypting module, memory encrypting module receives key more
New key is generated when new command, memory encrypting module is used after being decrypted to the page that each of memory is encrypted with old key
The key that the heart generates re-starts encryption.
S4: whether detection encryption succeeds, if so, step S5 is executed, if it is not, executing step S3;
In this step, after whether detection encryption is successful, internally deposited after having been encrypted to verifying AEP memory in being decrypted, it is right
The encryption of AEP memory is verified, and is first carried out environmental structure and the driving installation of AEP memory to server to be measured, is after the installation is completed
It can start to test.Automatically it is memorymodel memory mode that AEP memory configurations strategy is arranged when test, and is encrypted to it;
Test node is restarted after encryption, restarts that the step of whether detection encryption succeeds, verify encryption back specifically includes:
Password authentification request is sent to authentication server;
It receives the encrypted authentication information that authentication server returns and is stored;
The encrypted authentication information is decrypted when receiving to AEP memory predetermined registration operation to generate identifying code and incite somebody to action
The identifying code of generation is transferred to authentication server;
When authentication server receives the identifying code and authentication server preset condition matches, verifying is encrypted to
Function.
It should be noted that in this step, after sending password authentification request to authentication server, further includes:
Authentication server generates random number according to the password authentification request received and stores the random number;
The random number of generation is encrypted by the encrypted public key that authentication server generates and generates encrypted authentication information.
S5: AEP memory is decrypted and restarts to test node after having encrypted to verifying;
S6: whether detection encryption releases;If so, step S7 is executed, if it is not, executing step S5;Ring first is carried out to server
Border is built to drive with AEP memory and be installed, and the test can be started after the installation is completed.AEP memory configurations strategy is set automatically when test
For memorymodel or mixed mode, and it is encrypted;Test node is restarted after encryption, restarting detection encryption back is
No success.Verifying AEP memory is internally deposited after having encrypted and is decrypted, and whether detection encryption releases after restarting into linux system.Extremely
This completes the entire test process of AEP memory password authentification.
S7: output test result log, judges whether the AEP memory can be normally carried out encrypting and decrypting according to test result.
Embodiment three
Also a kind of password authentification test macro based on AEP memory of the present invention, including be equipped in AEP in server to be measured
It deposits;
Server to be measured further includes setup module, memory encrypting module and detection module;
Setup module, for AEP memory configurations strategy to be arranged;
Memory encryption/decryption module is decrypted encrypted memory for internally depositing into capable encryption;
Detection module, for whether succeeding to detection encryption/decryption;
In the present embodiment, which further includes environmental structure module, environmental structure module, for carrying out to server to be measured
Environmental structure, the AEP memory installation AEP memory driving to server to be measured.
The system further includes authentication server, and the authentication server is communicatively coupled with server to be measured;
Detection module, for sending the solicited message of password authentification to server to be measured;
The authentication server for receiving the password authentification solicited message of detection module transmission, and returns to encryption and tests
Information is demonstrate,proved to server to be measured.
Explanation is needed further exist for, server to be verified further includes identifying code generation module;
The identifying code generation module, for believing when receiving to AEP memory predetermined registration operation the encrypted authentication
Breath is decrypted to generate identifying code and the identifying code of generation is transferred to authentication server;
Authentication server, for when receiving the identifying code and authentication server preset condition matches, return to be tested
Card encrypts successful information to server to be verified.
Environmental structure and the driving installation of AEP memory first are carried out to server, the test can be started after the installation is completed.When test
Automatic setting AEP memory configurations strategy is memorymodel or mixed mode, and is encrypted to it;To test node after encryption
Restart, restarts whether detection encryption back succeeds.Verifying AEP memory is internally deposited after having encrypted and is decrypted, and is restarted into Linux system
Whether detection encryption releases after system.So far the entire test process of AEP memory password authentification is completed.After test, it can check
And test result log is analyzed, judge whether the AEP memory can be normally carried out encrypting and decrypting according to test result.Of the invention answers
With AEP memory security test is substantially increased, be conducive to the raising for entirely calculating environmental safety.
Although by reference to attached drawing and combining the mode of preferred embodiment to the present invention have been described in detail, the present invention
It is not limited to this.Without departing from the spirit and substance of the premise in the present invention, those of ordinary skill in the art can be to the present invention
Embodiment carry out various equivalent modifications or substitutions, and these modifications or substitutions all should in covering scope of the invention/appoint
What those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, answer
It is included within the scope of the present invention.Therefore, protection scope of the present invention is answered described is with scope of protection of the claims
It is quasi-.
Claims (10)
1. a kind of password authentification test method based on AEP memory, which comprises the steps of:
AEP memory configurations strategy is set;
Internally deposit into capable encryption;
Encrypted AEP memory is decrypted after whether detection encryption is successful and to verifying.
2. a kind of password authentification test method based on AEP memory according to claim 1, which is characterized in that setting AEP
Before memory configurations strategy, comprising:
Environmental structure is carried out to server to be measured and the driving of AEP memory is installed.
3. a kind of password authentification test method based on AEP memory according to claim 2, which is characterized in that setting AEP
Memory configurations strategy, comprising:
Memorymodel or mixed mode are saved as in setting AEP.
4. a kind of password authentification test method based on AEP memory according to claim 3, which is characterized in that detection adds
It is close whether it is successful after and verifying during encrypted AEP memory has been decrypted, is verified the encryption of AEP memory, it is specific to wrap
It includes:
Password authentification request is sent to authentication server;
It receives the encrypted authentication information that authentication server returns and is stored;
The encrypted authentication information is decrypted when receiving to AEP memory predetermined registration operation to generate identifying code and will generate
Identifying code be transferred to authentication server;
When authentication server receives the identifying code and authentication server preset condition matches, verifying is encrypted successfully.
5. a kind of password authentification test method based on AEP memory according to claim 4, which is characterized in that verifying
Server is sent after password authentification request, further includes:
Authentication server generates random number according to the password authentification request received and stores the random number;
The random number of generation is encrypted by the encrypted public key that authentication server generates and generates encrypted authentication information.
6. a kind of password authentification test method based on AEP memory according to claim 3 or 5, which is characterized in that detection
After whether encryption is successful and to verifying after encrypted AEP memory is decrypted, further includes:
Restart whether test node releases into detection encryption after linux system;
If so, the log that outputs test result, judges whether the AEP memory can be normally carried out encrypting and decrypting according to test result.
7. a kind of password authentification test macro based on AEP memory, which is characterized in that including being equipped in AEP in server to be measured
It deposits;
Server to be measured further includes setup module, memory encrypting module and detection module;
Setup module, for AEP memory configurations strategy to be arranged;
Memory encryption/decryption module is decrypted encrypted memory for internally depositing into capable encryption;
Detection module, for whether succeeding to detection encryption/decryption.
8. a kind of password authentification test macro based on AEP memory according to claim 7, which is characterized in that the system
It further include environmental structure module;
Environmental structure module installs AEP memory to the AEP memory of server to be measured for carrying out environmental structure to server to be measured
Driving.
9. a kind of password authentification test macro based on AEP memory according to claim 8, which is characterized in that the system
It further include authentication server, the authentication server is communicatively coupled with server to be measured;
Detection module, for sending the solicited message of password authentification to server to be measured;
The authentication server for receiving the password authentification solicited message of detection module transmission, and returns to encrypted authentication letter
Cease server to be measured.
10. a kind of password authentification test macro based on AEP memory according to claim 9, which is characterized in that be verified
Server further includes identifying code generation module;
The identifying code generation module, for when receiving to AEP memory predetermined registration operation to the encrypted authentication information into
Row decryption is to generate identifying code and the identifying code of generation is transferred to authentication server;
Authentication server adds for when receiving the identifying code and authentication server preset condition matches, returning to verifying
Close successful information is to server to be verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910147463.3A CN109918897A (en) | 2019-02-27 | 2019-02-27 | A kind of password authentification test method and system based on AEP memory |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910147463.3A CN109918897A (en) | 2019-02-27 | 2019-02-27 | A kind of password authentification test method and system based on AEP memory |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109918897A true CN109918897A (en) | 2019-06-21 |
Family
ID=66962496
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910147463.3A Pending CN109918897A (en) | 2019-02-27 | 2019-02-27 | A kind of password authentification test method and system based on AEP memory |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109918897A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111984496A (en) * | 2020-07-16 | 2020-11-24 | 北京字节跳动网络技术有限公司 | Method, device, medium and electronic equipment for monitoring stack memory leakage |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140245011A1 (en) * | 2013-02-26 | 2014-08-28 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
CN107563228A (en) * | 2017-08-03 | 2018-01-09 | 致象尔微电子科技(上海)有限公司 | A kind of method of internal storage data encryption and decryption |
CN109033801A (en) * | 2018-07-25 | 2018-12-18 | 努比亚技术有限公司 | Method, mobile terminal and the storage medium of application program verification user identity |
CN109240864A (en) * | 2018-09-06 | 2019-01-18 | 郑州云海信息技术有限公司 | A kind of AEP memory DC test method and device |
-
2019
- 2019-02-27 CN CN201910147463.3A patent/CN109918897A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140245011A1 (en) * | 2013-02-26 | 2014-08-28 | Kabushiki Kaisha Toshiba | Device and authentication method therefor |
CN107563228A (en) * | 2017-08-03 | 2018-01-09 | 致象尔微电子科技(上海)有限公司 | A kind of method of internal storage data encryption and decryption |
CN109033801A (en) * | 2018-07-25 | 2018-12-18 | 努比亚技术有限公司 | Method, mobile terminal and the storage medium of application program verification user identity |
CN109240864A (en) * | 2018-09-06 | 2019-01-18 | 郑州云海信息技术有限公司 | A kind of AEP memory DC test method and device |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111984496A (en) * | 2020-07-16 | 2020-11-24 | 北京字节跳动网络技术有限公司 | Method, device, medium and electronic equipment for monitoring stack memory leakage |
CN111984496B (en) * | 2020-07-16 | 2024-04-16 | 北京字节跳动网络技术有限公司 | Method, device, medium and electronic equipment for monitoring stack memory leakage |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP4410821B2 (en) | Verifying the binding of the initial trusted device to the protected processing system | |
JP5522307B2 (en) | System and method for remote maintenance of client systems in electronic networks using software testing with virtual machines | |
CN100499652C (en) | Communication apparatus and authentication apparatus and method, and operation method | |
JPH10282884A (en) | Data processing method and its system | |
US10102378B2 (en) | Boot images for units under test | |
CN104104650B (en) | data file access method and terminal device | |
US20130055228A1 (en) | System and Method for Installing a Patch on a Computing System | |
CN110324315B (en) | Off-line authentication system and method thereof | |
CN114513310A (en) | Authentication method and device for vehicle diagnosis equipment, electronic equipment and medium | |
CN110990124A (en) | Cloud host recovery method and device | |
CN108400875A (en) | Authorization and authentication method, system, electronic equipment, storage medium based on key assignments | |
CN114244503B (en) | Password equipment performance test method | |
CN109918897A (en) | A kind of password authentification test method and system based on AEP memory | |
CN113821446A (en) | Test verification method and device for transaction system | |
CN117032908A (en) | Integrated computing device deployment operation method and system based on redundancy architecture | |
CN114884661B (en) | Hybrid security service cryptographic system | |
US11706027B2 (en) | Systems and methods for managing a compromised autonomous vehicle server | |
CN115618366A (en) | Authentication method and device for server | |
CN102096777B (en) | Secure programming of vehicle modules | |
JP5053756B2 (en) | Certificate verification server, certificate verification method, and certificate verification program | |
CN109446785B (en) | A kind of memory management method of smart card and its personal data | |
CN105808439B (en) | Application program of intelligent card remote test system | |
CN109388474A (en) | A kind of detection method and system of Qemu virtual credible root data integrity | |
CN113506107B (en) | Method for realizing block chain link point virtualization and block chain node | |
CN117938405B (en) | CDN service arrangement method, device, equipment and storage medium in multi-cloud environment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190621 |