PROTECTING SENSITIVE DATA IN SOFTWARE PRODUCTS AND IN GENERATING CORE DUMPS
First Claim
Patent Images
1. A method of protecting sensitive data in a software product, said method comprising:
- compiling, by a processor, a source file of the software product to generate an object file, wherein the source file includes at least one piece of sensitive data marked with a specific identifier, and the object file has a secure data section for saving storage information of the at least one piece of sensitive data at compile-time and run-time; and
linking, by the processor, the object file to generate an executable file, wherein the executable file is to update the secure data section at run-time.
1 Assignment
0 Petitions
Accused Products
Abstract
Sensitive data is protected in a software product. A source file of the software product is compiled to generate an object file, in which the source file includes at least one piece of sensitive data marked with a specific identifier. The object file has a secure data section for saving storage information of the at least one piece of sensitive data at compile-time and run-time. The object file is linked to generate an executable file. The executable file updates the secure data section at run-time. Sensitive data is also protected when a core dump is generated.
22 Citations
19 Claims
-
1. A method of protecting sensitive data in a software product, said method comprising:
-
compiling, by a processor, a source file of the software product to generate an object file, wherein the source file includes at least one piece of sensitive data marked with a specific identifier, and the object file has a secure data section for saving storage information of the at least one piece of sensitive data at compile-time and run-time; and linking, by the processor, the object file to generate an executable file, wherein the executable file is to update the secure data section at run-time. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method of protecting sensitive data when a core dump is generated, said method comprising:
-
scanning a memory of a computer to find a secure data section in the memory, wherein the secure data section saves storage information of the sensitive data; acquiring the sensitive data, according to the storage information of the sensitive data in the found secure data section; processing the sensitive data to hide the sensitive data; and generating a core dump file. - View Dependent Claims (9, 10)
-
-
11. A device for protecting sensitive data in a software product, said device comprising:
-
a compiler executing on a processor, the compiler configured to compile a source file of the software product to generate an object file, wherein the source file includes at least one piece of sensitive data marked with a specific identifier, the object file having a secure data section for saving storage information of the at least one piece of sensitive data at compile-time and run-time; and a linker configured to link the object file to generate an executable file, the executable file to update the secure data section at run-time. - View Dependent Claims (12, 13, 14, 15, 16)
-
-
17. A device for protecting sensitive data when a core dump is generated, said device comprising:
-
a scanning module configured to scan a memory of a computer to find a secure data section in the memory, wherein the secure data section saves storage information of the sensitive data; a sensitive data acquisition module configured to acquire the sensitive data, according to the storage information of the sensitive data in the found secure data section; a processing module configured to process the sensitive data to hide the sensitive data; and a file generation module configured to generate a core dump file. - View Dependent Claims (18, 19)
-
Specification