Patents Assigned to Beijing Zhongtian Antai Technology Co., Ltd.
-
Publication number: 20150012732Abstract: A method for recombining runtime instruction comprising: an instruction running environment is buffered; the machine instruction segment to be scheduled is obtained; the second jump instruction which directs an entry address of an instruction recombining platform is inserted before the last instruction of the obtained machine instruction segment to generate the recombined instruction segment comprising the address A?; the value A of the address register of the buffered instruction running environment is modified to the address A?; the instruction running environment is recovered.Type: ApplicationFiled: September 25, 2014Publication date: January 8, 2015Applicant: Beijing Zhongtian Antai Technology Co., Ltd.Inventor: Jiaxiang Wang
-
Patent number: 8893272Abstract: A method for recombining runtime instruction comprising: an instruction running environment is buffered; the machine instruction segment to be scheduled is obtained; the second jump instruction which directs an entry address of an instruction recombining platform is inserted before the last instruction of the obtained machine instruction segment to generate the recombined instruction segment comprising the address A?; the value A of the address register of the buffered instruction running environment is modified to the address A?; the instruction running environment is recovered.Type: GrantFiled: April 29, 2011Date of Patent: November 18, 2014Assignee: Beijing Zhongtian Antai Technology Co., Ltd.Inventor: Jiaxiang Wang
-
Publication number: 20140053276Abstract: A safe data storage method is disclosed, the method comprises the following steps: hardware instructions are received; the hardware instructions are analyzed; and if the hardware instructions are storage instructions, a target address in the storage instructions is modified to be the corresponding storage address in a storage apparatus; the modified storage instructions are sent to a hardware layer. A safe data storage device is also disclosed, the device comprises the following units: a receiving unit adapted for receiving hardware instructions; an instruction analyzing unit adapted for analyzing the hardware instructions and judging whether the hardware instructions are storage instructions; an instruction modifying unit adapted for modifying a target address in the storage instructions to be the corresponding storage address in a safe storage apparatus; a sending unit adapted for sending the modified storage instructions to a hardware layer.Type: ApplicationFiled: April 29, 2011Publication date: February 20, 2014Applicant: BEIJING ZHONGTIAN ANTAI TECHNOLOGY CO., LTD.Inventor: Jiaxiang Wang
-
Publication number: 20140047222Abstract: A method for recombining runtime instruction comprising: an instruction running environment is buffered; the machine instruction segment to be scheduled is obtained; the second jump instruction which directs an entry address of an instruction recombining platform is inserted before the last instruction of the obtained machine instruction segment to generate the recombined instruction segment comprising the address A?; the value A of the address register of the buffered instruction running environment is modified to the address A?; the instruction running environment is recovered.Type: ApplicationFiled: April 29, 2011Publication date: February 13, 2014Applicant: Beijing Zhongtian Antai Technology Co., Ltd.Inventor: Jiaxiang Wang
-
Publication number: 20140047553Abstract: A method for data security reading includes steps of: receiving a hardware instruction; analyzing said hardware instruction; if said hardware instruction is a reading instruction, obtaining the source address in the reading instruction; searching a mapping bitmap and modifying the reading address in the reading instruction according to the data of the mapping bitmap, wherein the mapping bitmap is used to indicate whether the data stored in a local storage address is dumped to said security storage device; transmitting the modified reading instruction to a hardware layer. An apparatus for data security reading includes a receiving unit, an instruction analyzing unit, an instruction modifying unit and a transmitting unit. The Trojan horse or malicious tools cannot store or transmit the acquired information even if the secret information has been obtained, so that the data always exists in controllable security range.Type: ApplicationFiled: April 29, 2011Publication date: February 13, 2014Applicant: Beijing Zhongtian Antai Technology Co., Ltd.Inventor: Jiaxiang Wang
-
Publication number: 20130219464Abstract: A method for standardizing computer system action, including: intercepting invoking command; obtaining data structure of the intercepted invoking command after intercepting the invoking command; determining the sponsor of the intercepted invoking command based on the data structure of the obtained and intercepted invoking command, and determining operation method and operation object of the intercepted invoking command; matching the sponsor, the operation method and the operation object of the intercepted invoking command with rules of standardizing computer system action, judging whether to allow executing the intercepted invoking command. The present disclosure determines the sponsor of the intercepted invoking command according to the data structure of the invoicing command, and can monitor comprehensively computer system. If only the sponsor is spiteful, the disclosure does not all allow executing the intercepted invoking command, thus detecting lawless operation comprehensively and effectively.Type: ApplicationFiled: December 21, 2010Publication date: August 22, 2013Applicant: Beijing Zhongtian Antai Technology Co., Ltd.Inventors: Jiaxing Wang, Lidong Qu
-
Publication number: 20130174162Abstract: A method for constructing data structures and a method for describing running states of a computer and state transitions thereof are provided. The method for constructing the data structure, which describes the execution processes of computer codes, includes: when the computer is running, constructs the data structure using the code segment wherein lies a calling instruction as a node and using the calling relationship between the code segment initiating the calling instruction and the called code segment, which are both constructed by the calling instruction, as a calling path. The data structure includes every node and the calling path between every calling and called nodes. When a certain calling instruction is executed, it is possible to describe the running state of the computer when the calling instruction is executed with the data structure consisting of all nodes and calling paths before the calling instruction by constructing the above data structure.Type: ApplicationFiled: September 26, 2010Publication date: July 4, 2013Applicant: Beijing Zhongtian Antai Technology Co., Ltd.Inventors: Jiaxiang Wang, Lidong Qu