Protection processing method and apparatus of software operation

A technology for protection processing and software, applied in the field of protection processing methods and devices for software operation, can solve the problems of inability to provide software protection processing methods and inconvenience in use, and achieve the effects of safe and convenient use.

Active Publication Date: 2009-11-25
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Existing technology still can't provide a kind of protection processing method to software, not only can avoid the virus and Trojan horse in the running of software from causing direct harm to the operating syste

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection processing method and apparatus of software operation
  • Protection processing method and apparatus of software operation
  • Protection processing method and apparatus of software operation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions of the present invention will be further elaborated below in conjunction with the accompanying drawings and specific embodiments.

[0033] In order to prevent viruses and Trojan horses in software running from causing direct harm to the operating system, and to realize recordable, replayable, and controllable software during use, a method for protecting software running provided by the present invention is as follows: figure 1 As shown, it mainly includes the following steps:

[0034] Step 101, start and run the target software in a specific running environment.

[0035] The target software referred to in the present invention may be any software and application program that can run in the operating system. Before starting and running the target software, it is necessary to configure a specific operating environment for the target software. The present invention can fully encapsulate the application program interface (API, Application Programmin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a protection processing method of software operation, comprising: starting and operating the target software under specific operating environment; monitoring the progress of the target software and storing the operating data and operation record obtained by monitoring the target software; recovering the target software to a designated operating state according to the stored operating data and operation record. The invention also provides a protection processing apparatus of software operation, which can avoid the viruses during the operating of the software and direct damages for operating system caused by cockhorse, can implement the record, playback and control of the during software using, and can be enable the user to be convenient, visual and safe during software using.

Description

technical field [0001] The invention relates to a control technology for software operation, in particular to a method and device for protecting and processing software operation. Background technique [0002] At present, users usually encounter the following problems in the process of using software: viruses, Trojan horses and software crashes. Among them, the harm of viruses will not only force users to be unable to use the software normally, but also cause a devastating blow to the user's operating system, private content, and important data; the harm of Trojan horses is similar to viruses to a large extent, not only can steal The important information of the user can also tamper with the contents of the system files and the registry to achieve the purpose of monitoring the user's operation; software crash is one of the unavoidable problems in the process of using the software. The operating environment is not ideal, and it is usually easy to cause the software to crash ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
Inventor 甄焱鲲
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products