Software self-protection method

A software and protected technology, applied in the field of all-round software self-protection, can solve problems such as difficult to protect safe software damage

Active Publication Date: 2009-04-22
BEIJING RISING NETWORK SECURITY TECH CO LTD
View PDF5 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In terms of self-protection of various security software, the usual means of protection is to prevent viruses from deleting and modifying files throu...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software self-protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0011] Combine below figure 1 A specific embodiment of realizing software protection according to the comprehensive software self-protection strategy of the present invention is described.

[0012] figure 1 A flow chart of protecting software by monitoring operation requests applicable to the protected software is exemplarily shown. In step S1, a hook processing routine hooked to a certain operation request is created to intercept the associated operation request. The operation request can be implemented, for example, by calling an API, so that the corresponding hook processing routine is monitored by hooking this API. For the set of operation requests to be monitored in the present invention, an associated hook processing routine can be created for each operation request for monitoring. In step S2, when the operation request is intercepted, for example, when the hook processing routine intercepts that the associated API is called, before processing the operation request, f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an omnibearing software self-protection method which comprises: a plurality of hooks are built to monitor a plurality of operation requests which can be applied to the protected software; when at least one of the hooks intercepts the related operation requests, the intercepted operation requests are judged whether to be related with the protected software or not, if yes, then the intercepted operation requests are rejected; if not, then intercepted operation requests are allowed; wherein, a plurality of operation requests which can be applied to the protected software comprise: an operation request which can be used for tampering with a document; an operation request which can be used for tampering with registry keys; an operation request which can be used for modifying, reading and locking a memory and modifying the memory attribute; an operation request which can be used for an operation progress; an operation request which can be used for stopping and hanging up a thread; an operation request which can be used to inject the code; an operation request which can be used to inject a dynamic library; an operation request which can be used to queue APC and an operation request which can be used to simulate information.

Description

technical field [0001] The present invention relates to software safety, in particular to an all-round software self-protection method. technical background [0002] The rapid development of computer and network technology has greatly promoted information exchange. However, at the same time, computer viruses are constantly evolving and updating along with the development of technology. Today, computer viruses have seriously threatened people's normal use of computers. Thus, how to prevent virus attack has become a focus of attention. [0003] With the development of anti-virus technology, the means of viruses are also constantly changing, and the confrontation between the two is also intensified. The way viruses fight against security software has also changed from deformation and hiding to more direct destruction, trying to achieve the purpose of confrontation by destroying some or all functions of security software. [0004] In terms of self-protection, current security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/22G06F9/44G06F21/50
Inventor 周军
Owner BEIJING RISING NETWORK SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products