Method and apparatus for preventing malevolence program from accessing network
A technology for accessing the network, malicious programs, applied in the field of preventing malicious programs from creating trusted network application objects to access the network
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0009] Hereinafter, the present invention will be described in detail with reference to the accompanying drawings.
[0010] First refer to figure 1 , illustrating a flow chart of a method for preventing malicious programs from accessing a network according to the present invention, wherein:
[0011] In step S10, the monitoring dynamic library is injected into the processes in the system, so as to monitor the actions of each process in real time. It should be noted that it can be injected into all processes in the system, and can also be injected into some processes in the system according to specific requirements, which are all within the protection scope of the present invention.
[0012] In step S20, when it is found that a certain process wants to create an object of an application program capable of accessing the network, the object creation action is intercepted. It should be noted here that the method of the present invention does not intercept the actions of certain p...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com