Method for using digital signature to detect falsification possibility of software

A digital signature and software technology, applied in electronic digital data processing, instrument, platform integrity maintenance, etc., can solve problems such as affecting users' use, unable to open encrypted files, etc.

Inactive Publication Date: 2011-04-20
无锡安腾软件开发有限公司
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Users will not be able to open encrypted files, which will seriously affect the user's use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for using digital signature to detect falsification possibility of software
  • Method for using digital signature to detect falsification possibility of software
  • Method for using digital signature to detect falsification possibility of software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Take the detection of Word2003 in Office2003 as an example.

[0021] First, you need to store the relevant information of Word into the feature database. The issuer is "Microsoft Code Signing PCA", and the name of the signer is "Microsoft Corporation". The source file name in its version information is "WinWord.exe". Its file version is 11. refer to figure 1 .

[0022] When we know that Word2003 starts to run, we detect the characteristics of its program. First, we read whether the program has a digital signature. If not, it must not be Word2003 or the program has been tampered with. If there is a digital signature, and its issuer is "Microsoft Code Signing PCA" with the name of the signatory "Microsoft Corporation". Then we can be sure that this program has not been tampered with.

[0023] Going one step further, we read the version information of this program. If it has no version information or the source file name in its version information is not "WinWord.exe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for detecting whether an application program is tampered or not. The principle that a digital signature can not be modified is utilized, and whether a program is tampered or not can be further determined by reading digital signature information contained in software and comparing the read digital signature information with the information which is saved in a feature library in advance. The method is mainly used for the field of computer information security. By adopting the method, the defect that a user maliciously forges a program the name and version information of which are same with the those of a controlled program, and then further utilizes the forged program to outtrick the protection of transparent encryption software so as to directly read a plaintext and further export the plaintext can be effectively prevented. Simultaneously, by adopting the method, the version number of the program can be firstly judged so as to make different settings according to different versions.

Description

Technical field [0001] Digital signature and file transparent encryption in computer cryptography belong to the field of computer information security. Background technique [0002] This invention is mainly used in file transparent encryption software. A very important basis for file transparent encryption technology is to identify whether the relevant process is controlled or not. When it is a controlled process, it can read the plaintext of the encrypted file, and the generated file is also encrypted. When it is an uncontrolled process, it can only read the ciphertext of the encrypted file, and the generated file is also an ordinary file. In this way, a precise control can be achieved, and the user's usage habits will not be affected while protecting important files. [0003] Currently, there are mainly three methods for process identification. [0004] 1) Use the name of the program [0005] 2) Use the relevant version information carried in the program for identific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F21/50
Inventor 邱文乔
Owner 无锡安腾软件开发有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products