Abstract:
The present invention relates to a method and an apparatus for generating an executable file of a multi-instance service. The method includes: performing compilation for a source file corresponding to a multi-instance service, to obtain a first-class object file, where the multi-instance service includes N instances, and N is a natural number greater than or equal to 2; performing an object copy of the first-class object file N−1 times, to obtain N−1 new first-class object files; and performing linking to the first-class object file and the N−1 new first-class object files, to generate an executable file. In the present invention, an executable file is generated by performing mirroring and linking processing for an object file obtained by compilation, thereby reducing a development cost and a maintenance cost of software source code.
Abstract:
A security assessment apparatus and method for a processor are disclosed, and relate to the field of electronic technologies, to improve security during running of the processor. The security assessment apparatus includes: a processor (101), configured to run instructions in a memory (105); an access controller (103), configured to control a processor tracker (102) to access a first storage area in the memory (105), where the processor (101) is prohibited from accessing the first storage area; the processor tracker (102), configured to obtain first address information of a first instruction in the instructions in the memory (105), and store the first address information in the first storage area; and a security protection system (104), configured to obtain the first address information from the first storage area, and assess security of the first instruction based on the first address information.
Abstract:
Embodiments of the present application disclose a near field communication method and a mobile terminal. After receiving an AID selection command that is used for initiating an NFC service and that is sent by an NFC controller, the AP parses the AID selection command to obtain a target AID. Then, the AP searches the AID routing table to obtain a first destination address corresponding to the target AID. If an object corresponding to the first destination address is an SE, the AP establishes a first link between the AP and the SE. The AP sends, to the SE, all subsequently received service data that belongs to the same NFC service as the AID selection command, until the AP receives a new AID selection command.
Abstract:
A secure data transfer apparatus, where a processor in the apparatus is configured to execute a driver software to generate cryptography information, a cryptography device in the apparatus is configured to obtain a current cryptography parameter based on the cryptography information, and perform a cryptography operation using the current cryptography parameter, a Peripheral Component Interconnect Express (PCIe) interface in the apparatus configured to perform a ciphertext data exchange with a memory controller in a memory located external to the apparatus, where the ciphertext data exchange includes sending the ciphertext data from the cryptography device to the memory controller when the memory is to be written, and sending the ciphertext data from the memory controller to the cryptography device when the memory is to be read.
Abstract:
An apparatus for controlling running of multiple security software applications, including: a secure element and at least one central processing unit coupled to the secure element, where the secure element includes a processor and a first random access memory; the processor is configured to: run secure operating system software and at least one security software application based on the secure operating system software; when it is required to run a second security software application, suspend running of a first security software application in the at least one security software application, control migrating first temporary data generated during running of the first security software application from the first random access memory to a storage device disposed outside the secure element, and based on the secure operating system software, run the second security software application.
Abstract:
The present invention discloses a low-power startup method and a user equipment. The method includes: running, by a user equipment UE, a first subprogram in a boot load program bootloader, so as to determine whether the UE is charged through a universal serial bus interface USB; if the UE is charged through the USB and battery power is lower than a starting threshold, initializing, by the UE, the USB; when the USB successfully enumerates the UE, running, by the UE, a second subprogram in the bootloader to initialize an off-chip random memory in the UE; running, by the UE, a third subprogram in the bootloader to read a system mirror from an off-chip flash memory in the UE and load the system mirror to the off-chip random memory; and running, by the UE, the system mirror to complete a startup.
Abstract:
The present invention discloses a low-power startup method and a user equipment. The method includes: running, by a user equipment UE, a first subprogram in a boot load program bootloader, so as to determine whether the UE is charged through a universal serial bus interface USB; if the UE is charged through the USB and battery power is lower than a starting threshold, initializing, by the UE, the USB; when the USB successfully enumerates the UE, running, by the UE, a second subprogram in the bootloader to initialize an off-chip random memory in the UE; running, by the UE, a third subprogram in the bootloader to read a system mirror from an off-chip flash memory in the UE and load the system mirror to the off-chip random memory; and running, by the UE, the system mirror to complete a startup.
Abstract:
Embodiments of the present invention disclose a network switching method, a version upgrade method, and a terminal device, which relate to the field of communications technologies. A terminal receives a user instruction that instructs the terminal to access a network of a target operator. If an operator of a network currently accessed by the terminal is different from the target operator, a preset file is read to obtain image information corresponding to the target operator. A target image file corresponding to the target operator is obtained according to the image information and version switching is performed according to the target image file. The preset file includes image information that corresponds to all image files of operators stored in the terminal in one-to-one correspondence.
Abstract:
An insecure software detection apparatus is provided, including: a dedicated processor (101), configured to: when a first analysis result indicates that to-be-detected software is not secure, analyze the to-be-detected software by using a first neural network model, to obtain a second analysis result, where the first analysis result is obtained by analyzing the to-be-detected software by using a second neural network model; and a general-purpose processor (102), configured to: obtain the second analysis result from the dedicated processor, and perform security processing on the to-be-detected software based on the second analysis result. The apparatus first analyzes the to-be-detected software by using the second neural network model with low power consumption. When an analysis result indicates that the to-be-detected software is not secure, the dedicated processor analyzes the to-be-detected software by using the first neural network model with a high computing capability.
Abstract:
A secure data transfer apparatus, where a processor in the apparatus is configured to execute a driver software to generate cryptography information, a cryptography device in the apparatus is configured to obtain a current cryptography parameter based on the cryptography information, and perform a cryptography operation using the current cryptography parameter, a Peripheral Component Interconnect Express (PCIe) interface in the apparatus configured to perform a ciphertext data exchange with a memory controller in a memory located external to the apparatus, where the ciphertext data exchange includes sending the ciphertext data from the cryptography device to the memory controller when the memory is to be written, and sending the ciphertext data from the memory controller to the cryptography device when the memory is to be read.