WO2007074992A1 - Method for detecting malicious code changes from hacking of program loaded and executed on memory through network - Google Patents
Method for detecting malicious code changes from hacking of program loaded and executed on memory through network Download PDFInfo
- Publication number
- WO2007074992A1 WO2007074992A1 PCT/KR2006/005582 KR2006005582W WO2007074992A1 WO 2007074992 A1 WO2007074992 A1 WO 2007074992A1 KR 2006005582 W KR2006005582 W KR 2006005582W WO 2007074992 A1 WO2007074992 A1 WO 2007074992A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- confirming
- errors
- confirming errors
- server
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0766—Error or fault reporting or storing
- G06F11/0772—Means for error signaling, e.g. using interrupts, exception flags, dedicated error registers
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/0703—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
- G06F11/0706—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
- G06F11/0727—Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a storage system, e.g. in a DASD or network based storage system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
- G06F11/08—Error detection or correction by redundancy in data representation, e.g. by using checking codes
- G06F11/10—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
- G06F11/1004—Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Definitions
- the present invention relates to a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network.
- the present invention relates to a method for detecting malicious code changes from hacking of a program loaded and executed on the memory under the client-server model in real time.
- a program provided at a server in general under client-server model is often executed at a client terminal in real time. At this time, a hacking is tried to hinder from fulfilling the original objective of the program in execution.
- a hacking method is divided into a method that prohibits from executing the intended original objective of a program by creating a crack in the code of executing the program that exists in a file type, and a method that makes changes in a program that is loaded on the memory for execution.
- a method of the latter gets more problematic in recent days in that this method will bring about a fatal damage that is similar to the effect of the former, and the latter is more effective in hacking in real time, thus a preventative measure is necessary.
- the present invention will provide a new method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network.
- An objective of the present invention is to provide a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network under client-server model.
- a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network comprises the following steps of: creating a first data for confirming errors with regard to the program code area that a server wishes to protect; transmitting a request message created based on the first data for confirming errors to a client; creating a second data for confirming errors with regard to the code area according to the request message at the client; transmitting an answer message created based on the second data for confirming errors to the server; and comparing the first data for confirming errors with the second data for confirming errors at the server.
- Both the first data for confirming errors and the second data for confirming errors may be created with regard to the entire area of the program to be protected or with regard to a part of the code area by extracting the starting point and ending point of at least one function constituting a program.
- At least one part of the code area exists, and both the first data for confirming errors and the second data for confirming errors may be created with regard to a part of each of the code area.
- An ending point is the area where a return code is extracted in prearranged numbers by executing a disassembling step from a starting point, a point right before the starting point of a different function after the starting point of the different function is extracted by executing a disassembling step from the starting point of the different function, and the ending point is the point away from a starting point by a prefixed length.
- the first data for confirming errors and the second data for confirming errors comprises an instruction constituting a function, or further comprises an operand constituting a function.
- a CRC (Cyclic Redundancy Check) data, a Check Sum data, or a Hash data are used as a first data for confirming errors and a second data for confirming errors.
- Both the request message and the answer message are encrypted and transmitted based on session key shared by a server and a client, both the request message and the answer message are decrypted based on the session key, and thereby security in data transmission is duly considered.
- FIG. 1 is a flowchart of a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network under client- server model according to the present invention.
- the present invention will be described in detail in the following with reference to the drawing attached herein. [21]
- the present invention relates to a method for detecting an outside attack that changes a program code is loaded on the memory when the program code that is executed through a network under client-server model.
- the present invention communicates data by transmitting a request message and an answer message between a client and a server under client-server model. Further, a session key is shared for encrypting and decrypting of data in transmission for a security purpose.
- Whether a program code is modified or not is detected in the present invention by the following steps of: creating a first data for confirming errors at a server with regard to the executing the program code, creating a second data for confirming errors corresponding to the first data for confirming errors, and comparing the first data for confirming errors and the second data for confirming errors.
- the first data for confirming errors and the second data for confirming errors in accordance with the present invention are selected from the group consisting of a CRC (Cyclic Redundancy Check) data, a Check Sum data, and a Hash data that contain an instruction only or both an instruction and an operand.
- CRC Cyclic Redundancy Check
- FIG. 1 illustrates a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network under client-server model according to the present invention.
- a first data for confirming errors with regard to the program code area on the memory is firstly created when the program that a server wishes to protect is loaded and executed on the memory at step 101.
- the first data for confirming errors may be created with regard to the entire program code to be protected or with regard to a part of the program code.
- more than one part may be set up.
- functions in a fixed number may be selected from the functions constituting the program for executing.
- the number of functions are determined depending on the number of the functions that constitutes the code to be protected and thereby is set up particularly according to the program to be protected. In other words, if a part of the code to be protected is comprised of ten functions, the ten functions shall be selected. Further, it may be all right to select a part of the memory address at which executing code is loaded.
- an ending point of a function is determined by executing a disassembling step from starting point.
- ending point may be the point where a return code is extracted in a prescribed number during the process of disassembling.
- a point right before the starting point may be set up as an ending point of the function.
- a point which is away from the starting point of a function by a certain length may be the ending point. Not to mention, the length shall fall within the scope of the entire code area.
- an instruction in charge of real calculation of a function is drawn out by executing a disassembling step from a starting point to an ending point, and a first d ata for confirming errors is created to include the instruction.
- the first data for confirming errors including an instruction further comprises an operand which executes a function for calculation.
- the first data for confirming errors may be created in consideration of the address which is relocated.
- a request message corresponding to the first data for confirming errors is transmitted to a client.
- the content of the request message is that a second data for confirming errors shall have a random order based on the first data for confirming errors.
- the request message is preferably transmitted in an encrypted form based on a session key in consideration of security during data communication.
- a client creates a second data for confirming errors corresponding to the first data for confirming errors according to the request message.
- the request message is encrypted
- the encrypted request message is decrypted based on the session key.
- the second data for confirming errors creates a second data for confirming errors including an instruction that is detected at applicable area while executing the disassembling step requested by the server from starting point of the memory address to ending point.
- a second data for confirming errors is created including not only an instruction but also an operand.
- a second data for confirming errors with respect to each address is created, and the second data for confirming errors can be created by arranging in a random order according to the request of a request message.
- the client creates an answer message at step 104, based on the second data for confirming errors created in that manner, and transmits the answer message to the server.
- an answer message may be encrypted and transmitted in the same manner as in a request message.
- step 105 after the server receives the answer message, the first data for confirming errors and the second data for confirming errors are compared, and thereafter it is determined whether both are identical or not. At this time, if an answer message is found out to be encrypted, the answer message is decrypted and thereafter the original second data for confirming error is restored.
- a program may run continuously as in step 106, and thereafter whether a code on the memory is changed or not is periodically or randomly inspected from step 101 regarding the code area to be protected if there is a need for that.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Quality & Reliability (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Detection And Correction Of Errors (AREA)
Abstract
A method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network comprising the following steps of: creating a first data for confirming errors with regard to the program code area that a server wishes to protect; transmitting a request message created based on the first data for confirming errors to a client; creating a second data for confirming errors with regard to the code area according to the request message at the client; transmitting an answer message created based on the second data for confirming errors to the server; and comparing the first data for confirming errors with the second data for confirming errors at the server.
Description
Description
METHOD FOR DETECTING MALICIOUS CODE CHANGES
FROM HACKING OF PROGRAM LOADED AND EXECUTED
ON MEMORY THROUGH NETWORK
Technical Field
[1] The present invention relates to a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network.
More particularly, the present invention relates to a method for detecting malicious code changes from hacking of a program loaded and executed on the memory under the client-server model in real time. [2]
Background Art [3] A program provided at a server in general under client-server model is often executed at a client terminal in real time. At this time, a hacking is tried to hinder from fulfilling the original objective of the program in execution. [4] A hacking method is divided into a method that prohibits from executing the intended original objective of a program by creating a crack in the code of executing the program that exists in a file type, and a method that makes changes in a program that is loaded on the memory for execution. [5] Among all the above, a method of the latter gets more problematic in recent days in that this method will bring about a fatal damage that is similar to the effect of the former, and the latter is more effective in hacking in real time, thus a preventative measure is necessary. [6] Accordingly, the present invention will provide a new method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network. [7]
Disclosure of Invention
Technical Problem [8] An objective of the present invention is to provide a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network under client-server model. [9]
Technical Solution [10] For accomplishing the above and other objectives of the present invention, a
method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network according to the present invention comprises the following steps of: creating a first data for confirming errors with regard to the program code area that a server wishes to protect; transmitting a request message created based on the first data for confirming errors to a client; creating a second data for confirming errors with regard to the code area according to the request message at the client; transmitting an answer message created based on the second data for confirming errors to the server; and comparing the first data for confirming errors with the second data for confirming errors at the server.
[11] Both the first data for confirming errors and the second data for confirming errors may be created with regard to the entire area of the program to be protected or with regard to a part of the code area by extracting the starting point and ending point of at least one function constituting a program.
[12] At least one part of the code area exists, and both the first data for confirming errors and the second data for confirming errors may be created with regard to a part of each of the code area.
[13] An ending point is the area where a return code is extracted in prearranged numbers by executing a disassembling step from a starting point, a point right before the starting point of a different function after the starting point of the different function is extracted by executing a disassembling step from the starting point of the different function, and the ending point is the point away from a starting point by a prefixed length.
[14] The first data for confirming errors and the second data for confirming errors comprises an instruction constituting a function, or further comprises an operand constituting a function.
[15] A CRC (Cyclic Redundancy Check) data, a Check Sum data, or a Hash data are used as a first data for confirming errors and a second data for confirming errors.
[16] Both the request message and the answer message are encrypted and transmitted based on session key shared by a server and a client, both the request message and the answer message are decrypted based on the session key, and thereby security in data transmission is duly considered.
[17] The present invention will be apparent with reference to the detailed description and the drawing attached herein.
[18]
Brief Description of the Drawings
[19] Fig. 1 is a flowchart of a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network under client- server model according to the present invention.
[20] The present invention will be described in detail in the following with reference to the drawing attached herein. [21]
Best Mode for Carrying Out the Invention
[22] The present invention relates to a method for detecting an outside attack that changes a program code is loaded on the memory when the program code that is executed through a network under client-server model.
[23] The present invention communicates data by transmitting a request message and an answer message between a client and a server under client-server model. Further, a session key is shared for encrypting and decrypting of data in transmission for a security purpose.
[24] Whether a program code is modified or not is detected in the present invention by the following steps of: creating a first data for confirming errors at a server with regard to the executing the program code, creating a second data for confirming errors corresponding to the first data for confirming errors, and comparing the first data for confirming errors and the second data for confirming errors.
[25] The first data for confirming errors and the second data for confirming errors in accordance with the present invention are selected from the group consisting of a CRC (Cyclic Redundancy Check) data, a Check Sum data, and a Hash data that contain an instruction only or both an instruction and an operand.
[26] Fig. 1 illustrates a method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network under client-server model according to the present invention.
[27] With reference to Fig. 1, a first data for confirming errors with regard to the program code area on the memory is firstly created when the program that a server wishes to protect is loaded and executed on the memory at step 101.
[28] At this time, the first data for confirming errors may be created with regard to the entire program code to be protected or with regard to a part of the program code. When creating for parts, more than one part may be set up.
[29] In case of setting up parts of the code area, functions in a fixed number may be selected from the functions constituting the program for executing. The number of functions are determined depending on the number of the functions that constitutes the code to be protected and thereby is set up particularly according to the program to be protected. In other words, if a part of the code to be protected is comprised of ten functions, the ten functions shall be selected. Further, it may be all right to select a part of the memory address at which executing code is loaded.
[30] In respect of a method of selecting a function, an ending point of a function is
determined by executing a disassembling step from starting point. At this time, ending point may be the point where a return code is extracted in a prescribed number during the process of disassembling. Further, if a starting point of a different function is detected, a point right before the starting point may be set up as an ending point of the function. As far as a method of establishing an ending point is concerned, a point which is away from the starting point of a function by a certain length may be the ending point. Not to mention, the length shall fall within the scope of the entire code area.
[31] In this manner, an instruction in charge of real calculation of a function is drawn out by executing a disassembling step from a starting point to an ending point, and a first d ata for confirming errors is created to include the instruction. At this time, the first data for confirming errors including an instruction further comprises an operand which executes a function for calculation. In case that an address may be relocated when an operand is loaded on the memory, the first data for confirming errors may be created in consideration of the address which is relocated.
[32] Likewise, when a first data for confirming errors is created, a request message corresponding to the first data for confirming errors is transmitted to a client. At this time, when creating a request message at the server, the content of the request message is that a second data for confirming errors shall have a random order based on the first data for confirming errors. The request message is preferably transmitted in an encrypted form based on a session key in consideration of security during data communication.
[33] At step 103, a client creates a second data for confirming errors corresponding to the first data for confirming errors according to the request message. At this time, if the request message is encrypted, the encrypted request message is decrypted based on the session key. The second data for confirming errors creates a second data for confirming errors including an instruction that is detected at applicable area while executing the disassembling step requested by the server from starting point of the memory address to ending point. At this time, if there is a request message, a second data for confirming errors is created including not only an instruction but also an operand.
[34] With respect to a list of the memory address included in the request message, a second data for confirming errors with respect to each address is created, and the second data for confirming errors can be created by arranging in a random order according to the request of a request message.
[35] The client creates an answer message at step 104, based on the second data for confirming errors created in that manner, and transmits the answer message to the server. At this time, an answer message may be encrypted and transmitted in the same
manner as in a request message.
[36] At the following step 105 after the server receives the answer message, the first data for confirming errors and the second data for confirming errors are compared, and thereafter it is determined whether both are identical or not. At this time, if an answer message is found out to be encrypted, the answer message is decrypted and thereafter the original second data for confirming error is restored.
[37] As a result of the comparison, if the first data for confirming errors and the second data for confirming errors are identical, a program may run continuously as in step 106, and thereafter whether a code on the memory is changed or not is periodically or randomly inspected from step 101 regarding the code area to be protected if there is a need for that.
[38] If the first data for confirming errors is different from the second data for confirming errors, an alert procedure is executed in the way that a warning message is transmitted to the client terminal or a connection with the server is lost at step 107, based on the detection of malicious code changes by an attack from outside.
[39] Simple changes and modifications of the present invention can be easily carried out by those who are ordinarily skilled in the art, and the changes and modifications are deemed to be with the scope of the present invention.
Claims
Claims
[1] A method for detecting malicious code changes from hacking of a program loaded and executed on the memory through a network comprising the steps of: creating a first data for confirming errors with regard to a program code area that a server wishes to protect; transmitting a request message created based on the first data for confirming errors to a client; creating a second data for confirming errors with regard to the code area according to the request message at the client; transmitting an answer message created based on the second data for confirming errors to the server; and comparing the first data for confirming errors with the second data for confirming errors at the server. [2] The method as defined in Claim 1, wherein both said first data for confirming errors and said second data for confirming errors are created with regard to the entire code area of the program to be protected. [3] The method as defined in Claim 1, wherein said first data for confirming errors and said second data for confirming errors are created with regard to the part of the code area by extracting a starting point and an ending point of at least one function constituting the program. [4] The method as defined in Claim 1, wherein at least one of said part of the code area exists, and wherein both said first data for confirming errors and said second data for confirming errors are created with regard to parts of each of the code area. [5] The method for as defined in Claim 3 or 4, wherein said ending point is the point where a return code is extracted in fixed numbers by executing disassembling from a starting point. [6] The method as defined in Claim 3 or 4, wherein said ending point is right before the starting point of a different function when the starting point of the different function is extracted by executing disassembling from the starting point. [7] The method as defined in Claim 3 or 4, wherein said ending point is the point away from the starting point by a prearranged length. [8] The method as defined in Claim 3 or 4, wherein said first data for confirming errors and said second data for confirming errors comprises an instruction constituting the function. [9] The method as defined in Claim 8, wherein said first data for confirming errors and said second data for confirming errors further comprise an operand con-
stituting the function. [10] The method as defined in Claim 1, wherein said first data for confirming errors and said second data for confirming errors are a CRC (Cyclic Redundancy
Check) data. [11] The method as defined in Claim 1, wherein said first data for confirming errors and said second data from confirming errors are a Check Sum data. [12] The method as defined in Claim 1, wherein said first data for confirming errors and said second data for confirming errors are a Hash data. [13] The method as defined in Claim 1, wherein said request message is encrypted and transmitted based on the session key shared by the server and the client. [14] The method as defined in Claim 13, further comprising a step of decrypting the request message in an encrypted form at the client where the request message in an encrypted form is received. [15] The method as defined in Claim 14, wherein said answer message is encrypted and transmitted based on the session key shared by the server and the client. [16] The method defined in Claim 15, further comprising a step of decrypting said answer message in an encrypted form at the server where said answer message in an encrypted form is received.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR10-2005-0129616 | 2005-12-26 | ||
KR1020050129616A KR100663034B1 (en) | 2005-12-26 | 2005-12-26 | Method and system for detecting change of code in memory |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2007074992A1 true WO2007074992A1 (en) | 2007-07-05 |
Family
ID=37866488
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/KR2006/005582 WO2007074992A1 (en) | 2005-12-26 | 2006-12-19 | Method for detecting malicious code changes from hacking of program loaded and executed on memory through network |
Country Status (2)
Country | Link |
---|---|
KR (1) | KR100663034B1 (en) |
WO (1) | WO2007074992A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SG161167A1 (en) * | 2008-10-23 | 2010-05-27 | Hung Chien Chou | Real-time data protection method and data protection device for implementing the same |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101052735B1 (en) * | 2009-03-06 | 2011-07-29 | 주식회사 안철수연구소 | Method for detecting presence of memory operation and device using same |
KR101335326B1 (en) * | 2011-12-30 | 2013-12-02 | (주)네오위즈게임즈 | Client Apparatus, Watching Server, and Method for Preventing Falsification of Watching Area |
KR101623266B1 (en) | 2014-09-17 | 2016-05-20 | (주)스마일게이트엔터테인먼트 | Method and server for verification detection of memory protecting file using crc algorism |
EP3772842A1 (en) * | 2019-08-07 | 2021-02-10 | Siemens Aktiengesellschaft | Detection of manipulated clients of a factory control system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5919257A (en) * | 1997-08-08 | 1999-07-06 | Novell, Inc. | Networked workstation intrusion detection system |
US6195767B1 (en) * | 1998-09-14 | 2001-02-27 | Phillip M. Adams | Data corruption detection apparatus and method |
US6640317B1 (en) * | 2000-04-20 | 2003-10-28 | International Business Machines Corporation | Mechanism for automated generic application damage detection and repair in strongly encapsulated application |
US6889159B2 (en) * | 2002-07-22 | 2005-05-03 | Finisar Corporation | Scalable multithreaded system testing tool |
-
2005
- 2005-12-26 KR KR1020050129616A patent/KR100663034B1/en active IP Right Grant
-
2006
- 2006-12-19 WO PCT/KR2006/005582 patent/WO2007074992A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5919257A (en) * | 1997-08-08 | 1999-07-06 | Novell, Inc. | Networked workstation intrusion detection system |
US6195767B1 (en) * | 1998-09-14 | 2001-02-27 | Phillip M. Adams | Data corruption detection apparatus and method |
US6640317B1 (en) * | 2000-04-20 | 2003-10-28 | International Business Machines Corporation | Mechanism for automated generic application damage detection and repair in strongly encapsulated application |
US6889159B2 (en) * | 2002-07-22 | 2005-05-03 | Finisar Corporation | Scalable multithreaded system testing tool |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
SG161167A1 (en) * | 2008-10-23 | 2010-05-27 | Hung Chien Chou | Real-time data protection method and data protection device for implementing the same |
Also Published As
Publication number | Publication date |
---|---|
KR100663034B1 (en) | 2007-01-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN101783801B (en) | Software protection method based on network, client side and server | |
EP3270318B1 (en) | Dynamic security module terminal device and method for operating same | |
CN101136049B (en) | Information processing system, information processing method, information processing program, computer readable medium and computer data signal | |
US20170034189A1 (en) | Remediating ransomware | |
CN101473335A (en) | Information processing terminal and status notifying method | |
CN112235321B (en) | Short message verification code anti-brushing method and device | |
CN108900479A (en) | Short message verification code acquisition methods and device | |
CN104092647A (en) | Network access method, system and client | |
CN111415161A (en) | Block chain-based data verification method and device and computer-readable storage medium | |
CN112559005A (en) | Internet of things equipment firmware updating method and system based on block chain and distributed storage | |
JP2019057167A (en) | Computer program, device and determining method | |
CN104980449B (en) | The safety certifying method and system of network request | |
WO2007074992A1 (en) | Method for detecting malicious code changes from hacking of program loaded and executed on memory through network | |
CN111597537A (en) | Block chain network-based certificate issuing method, related equipment and medium | |
CN111585995A (en) | Method and device for transmitting and processing safety wind control information, computer equipment and storage medium | |
CN114095228A (en) | Safe access method, system and device for data of Internet of things based on block chain and edge calculation and storage medium | |
KR101436404B1 (en) | User authenticating method and apparatus | |
CN111224826B (en) | Configuration updating method, device, system and medium based on distributed system | |
CN105100030B (en) | Access control method, system and device | |
CN115118504B (en) | Knowledge base updating method and device, electronic equipment and storage medium | |
CN102262717B (en) | Method, device and equipment for changing original installation information and detecting installation information | |
CN112732676B (en) | Block chain-based data migration method, device, equipment and storage medium | |
CN111786938B (en) | Method, system and electronic equipment for preventing malicious resource acquisition | |
CN112434318B (en) | Encryption method and system for remote equipment of Internet of things | |
CN116578954A (en) | Data processing method and device of platform system and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 06835289 Country of ref document: EP Kind code of ref document: A1 |