CN109933410A - A kind of fictitious order delivery method and system based on virtualization technology - Google Patents
A kind of fictitious order delivery method and system based on virtualization technology Download PDFInfo
- Publication number
- CN109933410A CN109933410A CN201910220540.3A CN201910220540A CN109933410A CN 109933410 A CN109933410 A CN 109933410A CN 201910220540 A CN201910220540 A CN 201910220540A CN 109933410 A CN109933410 A CN 109933410A
- Authority
- CN
- China
- Prior art keywords
- protection function
- bytecode
- processing information
- compiler
- new bytecode
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Abstract
The present invention provides a kind of fictitious order delivery method and system based on virtualization technology compiles option by compiler inspection, obtain modified realization by protection function name, obtain modified by protection function list;The compiler successively handles all source files, generates new bytecode by protection function to be modified in all source files, while generating the processing information for containing new bytecode;Terminal obtains the processing information, explains the new bytecode for executing and containing in the processing information.It is achieved that dynamic change is by the realization of protection function when any; even if program it is same run time it is interior, the same bytecode by protection function can also update at any time, substantially prolong guard time; the effect of software protection is enhanced, safety is improved.
Description
Technical field
The present invention relates to originating parties under information security field more particularly to a kind of fictitious order based on virtualization technology
Method and system.
Background technique
Virtual machine protection is the new Software Protection Technique of one kind of information security field, and programmer is for the quilt in source file
Written in code program is protected, will be all unrecognized by protection code conversion machine and people, the bytecode run on a virtual machine,
Execution is explained to these bytecodes by virtual machine again in program operation, realizes the protection to software.
But used virtualization protection technique, the bytecode of generation are fixed not there are in dynamic base currently on the market
Become, APP can only be waited to update dynamic base when upgrading next time, and APP is when upgrading, black production personnel have sufficient time to crack,
The protecting effect of the prior art can only maintain a period of time.
Therefore the existing technology needs further improvement.
Summary of the invention
In view of the above shortcomings in the prior art, a kind of based on virtualization it is an object of the invention to be provided for user
The fictitious order delivery method and system of technology, with solve the bytecode that existing virtual machine protection technique generates immobilize and
Cause guard time short, the defect of safety difference, first embodiment provided by the invention is a kind of void based on virtualization technology
Pseudoinstruction delivery method, wherein the described method includes:
A, by compiler inspection compile option, obtain modified realization by protection function name, obtain modified protected
Protect function list;
B, the compiler successively handles all source files, generates new byte by protection function to be modified in all source files
Code, while generating the processing information for containing new bytecode;
C, terminal obtains the processing information, explains the new bytecode for executing and containing in the processing information.
Optionally, between the step B and step C further include:
Processing information write-in first is recorded file by C01, the compiler;
C02, cloud obtain the processing information in the first record file, and the processing information is issued to terminal.
Optionally, before the step A further include:
A0, pass through compiler, output calls the second of signature form to record file comprising virtual machine interpreter and locally.
Optionally, the step B further include:
B1, judge in currently processed source file whether containing with it is described it is modified by protection function list by protection letter
Several titles are identical by protection function, if so, thening follow the steps B2;If nothing, next source file is handled;
B2, in currently processed source file with it is described modified by identical by protection function name in protection function list
New bytecode is generated by protection function, reprocess next source file.
Optionally, the step B2 further include:
B21, the second record file is read in, obtain the virtual machine interpreter in the second record file and locally calls signature
Table, modified to be protected in protection function list by protection function is identical with described in currently processed source file
Function generates new bytecode.
Optionally, the processing information in the step B includes: current source filename, index functions, new bytecode and new word
Save the length of code.
Optionally, the step C includes:
C1, terminal are by the processing information update to memory pool;
C2, detect that control interpreter checks in memory pool whether have and be called when software operation is called by protection function
By the corresponding new bytecode of protection function;Interpreter is controlled if having explains that execution is corresponding by protection function with what is be called
New bytecode;
The step C further include:
If not having in memory pool and being called by the corresponding new bytecode of protection function, controls interpreter explanation and execute dynamic
With called by the corresponding bytecode of protection function in library.
Second embodiment provided by the invention is a kind of fictitious order sending system based on virtualization technology, wherein institute
The system of stating includes: compiler and terminal;
The compiler, for check compiling option, obtain modified realization by protection function name, obtain modified quilt
Protect function list;
All source files are successively handled, new bytecode is generated by protection function to be modified in all source files, is generated simultaneously
Processing information containing new bytecode;
The terminal explains the new bytecode for executing and containing in the processing information for obtaining the processing information.
Optionally, the system also includes clouds;
The compiler is also used to that the first record file is written the processing information into;
The compiler is also used to export comprising virtual machine interpreter and local the second record file for calling signature form;
The processing information is issued to terminal for obtaining the processing information in the first record file by the cloud.
Optionally, the terminal further includes interpreter;
The interpreter, for the quilt for whether having and being called in memory pool to be checked when software operation is called by protection function
Protect the corresponding new bytecode of function;It executes and is called by the corresponding new bytecode of protection function if so, explaining;If
It is no, then control interpreter explain execute in dynamic base be called by the corresponding bytecode of protection function.
Beneficial effect, the present invention provides a kind of fictitious order delivery method and system based on virtualization technology pass through
Compiler inspection compile option, obtain modified realization by protection function name, obtain modified by protection function list;
The compiler successively handles all source files, generates new bytecode by protection function to be modified in all source files, together
Shi Shengcheng contains the processing information of new bytecode;Terminal obtains the processing information, explains to execute and contain in the processing information
The new bytecode.It is achieved that dynamic change is by the realization of protection function when any, even if in the same of program
Run time it is interior, the same bytecode by protection function can also update at any time, substantially prolong guard time, enhance software
The effect of protection, improves safety.
Detailed description of the invention
Fig. 1 is a kind of step process of fictitious order delivery method based on virtualization technology of first embodiment of the invention
Figure;
Fig. 2 is the step flow chart of situation 2 in first embodiment of the invention;
Fig. 3 is a kind of theory structure frame of fictitious order sending system based on virtualization technology of second embodiment of the invention
Figure.
Specific embodiment
To make the objectives, technical solutions, and advantages of the present invention clearer and more explicit, right as follows in conjunction with drawings and embodiments
The present invention is further described.It should be appreciated that specific embodiment described herein is used only for explaining the present invention, and do not have to
It is of the invention in limiting.
As shown in Figure 1, first embodiment provided by the invention is originating party under a kind of fictitious order based on virtualization technology
Method, including following steps:
S1, by compiler inspection compile option, obtain modified realization by protection function name, obtain modified protected
Protect function list;
Step S1 is carried out on the basis of existing virtualization software protection technique, existing virtualization software protection technique
It is: virtualization process is carried out by protection function to what is specified in source file by compiler, after all source files are compiled
To a dynamic base, to by the bytecode of generation when protection function progress virtualization process, there are in dynamic base, dynamic base can be put
Enter software installation packet, be installed on mobile phone, software is protected.
Specified from a source file by protection function, there are two types of modes, and one is own defined in a certain source file
Function is required to protect, then source filename is added in configuration file;Another kind is, in the function that a certain source file defines
In, only partial function needs to protect, for needing partial function to be protected to add customized attribute, for example, can choose
After the parameter list that its function defines, addition _ _ attribute ((_ _ annotate__ before function body
((" ivmp ")))), the attribute of making by oneself added herein is ivmp, it can choose other legal attributes when practical operation,
It is not limited in ivmp.
Compiler reads configuration file in compiling, and function defined in the source file recorded is used as by protection letter
Number;For the source file being not present in configuration file, defined in function have attribute be _ _ attribute ((_ _
Annotate__ ((" ivmp ")))), then it is assumed that it is to be protected function, passes through the method, it is possible to specify is in multiple source files more
A function be by protection function, it is all it is specified a set is formed by protection function, be denoted as PS.
Modification part is by the realization of protection function in PS, that is, only modification part is in the prior art in the present application
By the realization of protection function, compiler used in the present patent application is LLVM compiler, and the LLVM compiler has one to be used for
The modified compiling option by protection function list is obtained, this compiling option is customized name, such as is named as-hot-
Update-funcs, compiler compile-time check-hot-update-funcs compile option, obtain the quilt that all modifications are realized
Protect function name, at the same obtain it is modified by protection function list, it is described modified to be listed by protection function list
The title by protection function that all modifications are realized, when being listed by-hot-update-funcs by protection function name, letter
It is several be referred to as between separated with comma, such as-hot-update-funcs=func1, func2, func3, func4.
Before step S1 further include:
S0, pass through compiler, output calls the second of signature form to record file comprising virtual machine interpreter and locally.
A dynamic base is obtained after the prior art compiles each source file, bytecode is generated there are in dynamic base, compiles simultaneously
Virtual machine interpreter that one uses when having recorded for compiling each source file can be exported and local call the of signature form by translating device
Two record files, each source file have the virtual machine interpreter of oneself and locally call signature form, the second record file
Title and format there is no limit can customize setting, such as record file for second and be named as ivmp_record_json, lattice
Formula is json.
S2, the compiler successively handle all source files, are generated to be modified in all source files by protection function
New bytecode, while generating the processing information for containing new bytecode;
The step S2 further include:
S21, judge in currently processed source file whether containing with it is described modified by being protected in protection function list
Function name is identical by protection function, if so, thening follow the steps S22;If nothing, next source file is handled;
S22, in currently processed source file with it is described it is modified by protection function list by protection function name phase
Same generates new bytecode by protection function, reprocesses next source file.
Compiler successively handles each source file, when the current source file of compiler processes, traverses being protected in current source file
Function is protected, if being had one or more titles by protection function being protected after the modification in protection function in current source file
It protects in function list, then new bytecode is generated by protection function to be one or more of, reprocess next source file.
If the title by protection function in current source file not after the modification by protection function list, directly
Handle next source file.
While for one or more of generation new bytecodes by protection function, the processing for containing new bytecode is generated
Information, the processing information include: current source filename, index functions, the length of new bytecode and new bytecode.
The step S22 further include:
S221, the second record file is read in, obtain the virtual machine interpreter in the second record file and locally calls signature
Table, be in currently processed source file with it is described it is modified by protection function list by the identical quilt of protection function name
Function is protected to generate new bytecode.
Between step S2 and step S3 also:
Processing information write-in first is recorded file by S301, the compiler;.
Successively handle all source files by LLVM compiler, every processing one source file will just generate in treatment process
Processing information write-in the first record file comprising new bytecode, there is no limit for the title and format of the second record file,
It can customize setting, such as the first record file be named as ivmp_hot_update_bytecode_json, format
For json, after having handled all source files, then file is recorded by first by developer and uploads to cloud.Here the first record
The name of file and the second record file is only for distinguishing two different record files, does not represent the time sequencing of appearance
Or severity level.
S302, cloud obtain the processing information in the first record file, and the processing information is issued to terminal.
Beyond the clouds, the content of ivmp_hot_update_bytecode_json file is extracted, as unit of function
Be issued to terminal, i.e., processing information as unit of function, in a unit include source filename, index functions (with by protection letter
Number is defined in current source file the corresponding serial number of appearance sequence, is incremented by since 0), the length of new bytecode, new bytecode
Degree.
S3, terminal obtain the processing information, explain the new bytecode for executing and containing in the processing information.
The terminal can be computer, embedded device, mobile phone, IPAD, smartwatch etc., and all can be with runs software simultaneously
Support the terminal device of function of surfing the Net, the processing information containing new bytecode is issued to terminal by cloud, in the soft of terminal operating
Part detects that the processing information that cloud issues, the terminal obtain the processing information.
The step S3 further include:
S31, terminal are by the processing information update to memory pool;
S32, detect that control interpreter checks in memory pool whether have and be called when software operation is called by protection function
By the corresponding new bytecode of protection function;Interpreter is controlled if having explains that execution is corresponding by protection function with what is be called
New bytecode;
The step S3 further include:
If not having in memory pool and being called by the corresponding new bytecode of protection function, controls interpreter explanation and execute dynamic
With called by the corresponding bytecode of protection function in library.
The terminal updates the new bytecode in the processing information to memory pool, comprising: terminal judges the new word
Whether corresponding bytecode has been had in memory pool by protection function belonging to section code, has directly stored bytecode if without if
Into memory pool;Judge that whether already existing bytecode is identical in new bytecode and memory pool, does not do if they are the same again if having
Any processing, judges whether current time already present bytecode uses by interpreter again if different, if otherwise directly will
The new bytecode handled in information replaces current time already present bytecode;If then first by current time already present byte
Code labeling is out-of-date, then updates the new bytecode in information is handled to memory pool, and after interpreter explanation has executed, will be marked
Out-of-date bytecode is denoted as to delete from memory pool.
The operation of software needs to call a series of functions, and when a certain called by protection function, interpreter will be explained and be held
Row is described by protection function, be arranged the interpreter first go in memory pool to have checked whether it is described by the corresponding new word of protection function
Save code, by the source filename for including in processing information, index functions, terminal can be quickly found out in memory pool whether have it is described
By the corresponding new bytecode of protection function, have, execute, otherwise interpreter goes to explain the bytecode executed in dynamic base.
Rear end developer selected part can be updated its bytecode by protection function at any time in this way, pass through cloud
It issues, terminal updates new bytecode to memory pool, in software run time call by protection function, explains and executes by protection function
New bytecode, it is achieved that when any dynamic change by the realization of protection function, overcome in the prior art, byte
Code changeless defect in dynamic base.
The technical solution of first embodiment in order to better understand the present invention, in conjunction with Fig. 2, citing is in practical application below
Several situations that can be potentially encountered: it is applied to mobile phone terminal;
A. all source files are compiled by LLVM compiler, output ivmp_record_json(second records file);
B. developer modifies PS and concentrates by the realization of protection function p1, p2, p3, p4, setting compiling option-hot-update-
funcs=p1,p2,p3,p4;The LLVM compiler run-time check compiling option, obtain modified realization by protection function,
It obtains modified by protection function list;
C. compiler successively handles each source file, if having in current source file by protection function after the modification by protection letter
In ordered series of numbers table, then new bytecode is generated by protection function for this, need to read in ivmp_record_json in compilation process, so
All source files have been handled, while ivmp_hot_update_bytecode_ is written into the processing information containing new bytecode
Json(first records file);
D. by ivmp_hot_update_bytecode_json and cloud is uploaded to by developer;
E. cloud extracts the content of ivmp_hot_update_bytecode_json, is issued to mobile phone terminal;
Situation 1:
F. the new bytecode that the software detection run in mobile phone terminal is issued to cloud, detect it is all by protection function p1, p2,
P3, p4 then will all new bytecode be updated to memory pool without corresponding bytecode in memory pool;
G. for software run time call by protection function p1, interpreter goes memory pool to check, there is a corresponding new bytecode of p1, solves
It releases and executes this new bytecode.
Situation 2:
F1. the new bytecode that the software detection run in mobile phone terminal is issued to cloud, detection p1, p2, p3 do not have corresponding byte
Code is in memory pool, then by the new bytecode update of p1, p2, p3 to memory pool, p4 has corresponding bytecode X in memory pool;
F2. detect that bytecode X corresponding with p4 is explained execution in memory pool, it is out-of-date that X is labeled as, then by p4's
New bytecode X1 is updated to memory pool, and after the completion of waiting X to execute, X is deleted;
G1. software run time call goes memory pool to check by protection function p5, interpreter, without the corresponding new bytecode of p5, then
It goes to explain the corresponding bytecode of p5 executed in dynamic base.
Situation 3:
F1. the new bytecode that the software detection run in mobile phone terminal is issued to cloud, detection p1, p2, p3 do not have corresponding byte
Code is in memory pool, then by the new bytecode update of p1, p2, p3 to memory pool, p4 has corresponding bytecode X in memory pool;
F21. detect that bytecode corresponding with p4 currently has not been explained device execution in memory pool, directly replaces X and issues for cloud
New bytecode X1;
G. for software run time call by protection function p1, interpreter goes memory pool to check, there is a corresponding new bytecode of p1, solves
It releases and executes this new bytecode.
Foregoing provide the combination of several situations existing for first embodiment step f, g, but first embodiment and not only
It is limited to above-mentioned several situations.
As shown in figure 3, being a kind of based on virtual the present invention also provides second embodiment based under the premise of the above method
The fictitious order sending system of change technology, wherein the system comprises: compiler 10 and terminal 20;
The compiler 10, for check compiling option, obtain modified realization by protection function name, obtain modified
By protection function list;
All source files are successively handled, new bytecode is generated by protection function to be modified in all source files, is generated simultaneously
Processing information containing new bytecode;
The terminal 20 explains the new bytecode for executing and containing in the processing information for obtaining the processing information.
Optionally, the system also includes clouds 30;
The compiler 10 is also used to that the first record file is written the processing information into;
The compiler 10 is also used to export comprising virtual machine interpreter and local the second record file for calling signature form;
The processing information is issued to terminal for obtaining the processing information in the first record file by the cloud 30
20。
Optionally, the terminal 20 further includes interpreter 201;
The interpreter 201, for whether when software operation is called by protection function, checking to have and be called in memory pool
By the corresponding new bytecode of protection function;It executes and is called by the corresponding new bytecode of protection function if so, explaining;If
It is no, then control interpreter explain execute in dynamic base be called by the corresponding bytecode of protection function.
All bytecodes of the prior art update dynamic base in upgrading, could update bytecode, lead to there are in dynamic base
Technical solution of the present invention is crossed, does not have to update dynamic base, if cloud has issued new bytecode, software simultaneously arrives the update of new bytecode
Memory pool, setting interpreter will explain whether when executing a certain function by protection first checking in memory pool has corresponding new word
Code is saved, dynamic base is checked if not.Rear end developer can be chosen with any time arbitrarily by protection function to it in this way
Bytecode is updated, and is issued by cloud, and the workload that the present invention updates bytecode is compared to be upgraded by the entirety of software
The workload for updating bytecode is much smaller.
The present invention provides a kind of fictitious order delivery method and system based on virtualization technology, passes through compiler inspection
Compile option, obtain modified realization by protection function name, obtain modified by protection function list;Pass through the volume
It translates device and successively handles all source files, new bytecode is generated by the compiling of protection function to be modified in all source files, simultaneously
Generate the processing information for containing new bytecode;Terminal obtains the processing information, contains in the explanation execution processing information
The new bytecode.It is achieved that dynamic change is by the realization of protection function when any, even if in the same fortune of program
In row period, the same bytecode by protection function can also update at any time, substantially prolong guard time, enhance software guarantor
The effect of shield, improves safety.
It, can according to the technique and scheme of the present invention and its hair it is understood that for those of ordinary skills
Bright design is subject to equivalent substitution or change, and all these changes or replacement all should belong to the guarantor of appended claims of the invention
Protect range.
Claims (10)
1. a kind of fictitious order delivery method based on virtualization technology, which is characterized in that the described method includes:
A, by compiler inspection compile option, obtain modified realization by protection function name, obtain modified protected
Protect function list;
B, all source files are successively handled by the compiler, is generated newly to be modified in all source files by protection function
Bytecode, while generating the processing information for containing new bytecode;
C, terminal obtains the processing information, explains the new bytecode for executing and containing in the processing information.
2. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step
Between B and step C further include:
Processing information write-in first is recorded file by C01, the compiler;
C02, cloud obtain the processing information in the first record file, and the processing information is issued to terminal.
3. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step
Before A further include:
A0, pass through compiler, output calls the second of signature form to record file comprising virtual machine interpreter and locally.
4. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step
B further include:
B1, judge in currently processed source file whether containing with it is described it is modified by protection function list by protection letter
Several titles are identical by protection function, if so, thening follow the steps B2;If nothing, next source file is handled;
B2, in currently processed source file with it is described modified by identical by protection function name in protection function list
New bytecode is generated by protection function, reprocess next source file.
5. the fictitious order delivery method according to claim 4 based on virtualization technology, which is characterized in that the step
B2 further include:
B21, the second record file is read in, obtain the virtual machine interpreter in the second record file and locally calls signature
Table, be in currently processed source file with it is described it is modified by protection function list by the identical quilt of protection function name
Function is protected to generate new bytecode.
6. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step
Processing information in B includes: current source filename, index functions, the length of new bytecode and new bytecode.
7. the fictitious order delivery method according to claim 1 based on virtualization technology, which is characterized in that the step
C includes:
C1, terminal are by the processing information update to memory pool;
C2, detect that control interpreter checks in memory pool whether have and be called when software operation is called by protection function
By the corresponding new bytecode of protection function;If so, control interpreter explain execute be called it is corresponding by protection function
New bytecode;
The step C further include:
If not having in memory pool and being called by the corresponding new bytecode of protection function, controls interpreter explanation and execute dynamic
With called by the corresponding bytecode of protection function in library.
8. a kind of fictitious order sending system based on virtualization technology characterized by comprising compiler and terminal;
The compiler, for check compiling option, obtain modified realization by protection function, obtain modified protected
Function list;
All source files are successively handled, new bytecode is generated by protection function to be modified in all source files, is generated simultaneously
Processing information containing new bytecode;
The terminal explains the new bytecode for executing and containing in the processing information for obtaining the processing information.
9. the fictitious order sending system according to claim 8 based on virtualization technology, which is characterized in that the system
It further include cloud;
The compiler is also used to that the first record file is written the processing information into;
The compiler is also used to export virtual machine interpreter for compiling all source files and local calls the of signature form
Two record files;
The processing information is issued to terminal for obtaining the processing information in the first record file by the cloud.
10. the fictitious order sending system according to claim 8 based on virtualization technology, which is characterized in that the end
End further includes interpreter;
The interpreter, for the quilt for whether having and being called in memory pool to be checked when software operation is called by protection function
Protect the corresponding new bytecode of function;It executes and is called by the corresponding new bytecode of protection function if so, explaining;If
It is no, then control interpreter explain execute in dynamic base be called by the corresponding bytecode of protection function.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910220540.3A CN109933410B (en) | 2019-03-22 | 2019-03-22 | Virtual instruction issuing method and system based on virtualization technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910220540.3A CN109933410B (en) | 2019-03-22 | 2019-03-22 | Virtual instruction issuing method and system based on virtualization technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109933410A true CN109933410A (en) | 2019-06-25 |
CN109933410B CN109933410B (en) | 2021-06-01 |
Family
ID=66988058
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910220540.3A Active CN109933410B (en) | 2019-03-22 | 2019-03-22 | Virtual instruction issuing method and system based on virtualization technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109933410B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110673929A (en) * | 2019-09-29 | 2020-01-10 | 北京智游网安科技有限公司 | Method for protecting abnormal mechanism, intelligent terminal and storage medium |
CN110675256A (en) * | 2019-08-30 | 2020-01-10 | 阿里巴巴集团控股有限公司 | Method and device for deploying and executing intelligent contracts |
US10783082B2 (en) | 2019-08-30 | 2020-09-22 | Alibaba Group Holding Limited | Deploying a smart contract |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070083274A (en) * | 2006-02-07 | 2007-08-24 | 에스케이 텔레콤주식회사 | Method for excuting java virtual machine on mobile communication terminal by using fast memory access bytecode |
US20140245275A1 (en) * | 2013-02-26 | 2014-08-28 | Red Hat, Inc. | Bytecode modification |
CN104504341A (en) * | 2015-01-21 | 2015-04-08 | 联想(北京)有限公司 | Operating system bug repairing method and device |
CN107592338A (en) * | 2017-08-08 | 2018-01-16 | 新智云数据服务有限公司 | More new system, method and the relevant device of a kind of dynamic base |
CN108196852A (en) * | 2017-12-26 | 2018-06-22 | 北京华为数字技术有限公司 | A kind of software running method, update method and relevant apparatus |
CN108614714A (en) * | 2018-04-25 | 2018-10-02 | 咪咕文化科技有限公司 | A kind of dynamic base update method, device and storage medium |
US10146515B1 (en) * | 2015-03-10 | 2018-12-04 | Twitter, Inc. | Live code updates |
CN108932406A (en) * | 2017-05-18 | 2018-12-04 | 北京梆梆安全科技有限公司 | Virtualization software guard method and device |
CN109445807A (en) * | 2017-08-28 | 2019-03-08 | 腾讯科技(深圳)有限公司 | Realize the method, apparatus and computer readable storage medium of application program update |
-
2019
- 2019-03-22 CN CN201910220540.3A patent/CN109933410B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20070083274A (en) * | 2006-02-07 | 2007-08-24 | 에스케이 텔레콤주식회사 | Method for excuting java virtual machine on mobile communication terminal by using fast memory access bytecode |
US20140245275A1 (en) * | 2013-02-26 | 2014-08-28 | Red Hat, Inc. | Bytecode modification |
CN104504341A (en) * | 2015-01-21 | 2015-04-08 | 联想(北京)有限公司 | Operating system bug repairing method and device |
US10146515B1 (en) * | 2015-03-10 | 2018-12-04 | Twitter, Inc. | Live code updates |
CN108932406A (en) * | 2017-05-18 | 2018-12-04 | 北京梆梆安全科技有限公司 | Virtualization software guard method and device |
CN107592338A (en) * | 2017-08-08 | 2018-01-16 | 新智云数据服务有限公司 | More new system, method and the relevant device of a kind of dynamic base |
CN109445807A (en) * | 2017-08-28 | 2019-03-08 | 腾讯科技(深圳)有限公司 | Realize the method, apparatus and computer readable storage medium of application program update |
CN108196852A (en) * | 2017-12-26 | 2018-06-22 | 北京华为数字技术有限公司 | A kind of software running method, update method and relevant apparatus |
CN108614714A (en) * | 2018-04-25 | 2018-10-02 | 咪咕文化科技有限公司 | A kind of dynamic base update method, device and storage medium |
Non-Patent Citations (1)
Title |
---|
徐小辉: "《构件化软件动态更新与验证技术》", 30 June 2018, 天津大学出版社 * |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110675256A (en) * | 2019-08-30 | 2020-01-10 | 阿里巴巴集团控股有限公司 | Method and device for deploying and executing intelligent contracts |
US10783082B2 (en) | 2019-08-30 | 2020-09-22 | Alibaba Group Holding Limited | Deploying a smart contract |
US11010303B2 (en) | 2019-08-30 | 2021-05-18 | Advanced New Technologies Co., Ltd. | Deploying a smart contract |
US11307990B2 (en) | 2019-08-30 | 2022-04-19 | Advanced New Technologies Co., Ltd. | Deploying a smart contract |
CN110673929A (en) * | 2019-09-29 | 2020-01-10 | 北京智游网安科技有限公司 | Method for protecting abnormal mechanism, intelligent terminal and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109933410B (en) | 2021-06-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106775723B (en) | Android platform-based system firmware customization method and Android device | |
CN103955363B (en) | A kind of manufacture method of program upgrade installation package | |
US11579856B2 (en) | Multi-chip compatible compiling method and device | |
CN108733988A (en) | The guard method of executable program on Android platform | |
CN109933410A (en) | A kind of fictitious order delivery method and system based on virtualization technology | |
US10684846B2 (en) | Using semantic annotations to control compatibility behaviors | |
CN107480476B (en) | Android native layer instruction compiling virtualization shell adding method based on ELF infection | |
CN110187910B (en) | Thermal updating method, device, equipment and computer readable storage medium | |
CN110716715A (en) | Application program development method, device, equipment and medium | |
CN100492387C (en) | Method and system for software protected development based on Keil C51 | |
CN106648755B (en) | Method and device for dynamically loading dex in android art environment | |
CN111740948B (en) | Data packet issuing method, dynamic updating method, device, equipment and medium | |
CN109670299A (en) | A kind of method and electronic equipment creating Python sandbox environment | |
CN110059456A (en) | Code protection method, code protection device, storage medium and electronic equipment | |
CN114610640A (en) | Fuzzy testing method and system for trusted execution environment of Internet of things | |
CN112612502A (en) | Patch generation method, device, equipment and storage medium | |
CN111782334B (en) | Dynamic link library file virtualization method, storage medium and terminal equipment | |
CN108845864B (en) | Spring frame-based JVM garbage recycling method and device | |
CN105005497A (en) | Method and apparatus for calling local function in Java card virtual machine | |
CN102999371A (en) | Lua script-based human-computer interface development method and system | |
CN111880804A (en) | Application program code processing method and device | |
JP2006163686A (en) | Compiling method, compiling program, compiling device and recording medium for compile | |
US20170083298A1 (en) | Resilient format for distribution of ahead-of-time compiled code components | |
CN111796832B (en) | Hot patch file generation method, device, equipment and storage medium | |
CN115220873A (en) | Method for running Open Harmony application in Android system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |