Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Process protection method

A process and process list technology, applied in the field of computer security, can solve problems such as increasing complexity and increasing system resource consumption

Inactive Publication Date: 2011-09-21
北京思创银联科技股份有限公司
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can effectively protect process A, but process A needs to do extra work (creating process B and protecting process B), and when the number of processes to be protected increases, the number of processes in the system will also increase linearly, which increases The consumption of system resources also increases the complexity of several processes that need to be protected. These processes have repeated additional work, that is, create their own protection process and protect this process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process protection method
  • Process protection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The specific implementation manners of the present invention will be described in further detail below in conjunction with the accompanying drawings and examples. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0018] Such as figure 1 Shown, method of the present invention comprises the following steps:

[0019] S0, create the list of user processes (comprising ordinary processes and service processes) that need to be protected, this list can be freely configured by the user; service process refers to the process of running in Windows service form, such as Windows firewall service, its process name is svchost.exe ; A process that does not run as a Windows service is a normal process, such as notepad.exe.

[0020] S1. Read the data of the process list;

[0021] S2. Injecting a remote thread into a key process of the Windows operating system.

[0022] S3. Start three threads, whic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a process protection method and belongs to the computer security field. The process protection method comprises the following steps of: 1, acquiring a process list to be protected, wherein the process list comprises a service process list and a common process list; 2, injecting a remote thread into a key process of the system; and 3, starting the other three threads A, B and C, wherein when the present common process is killed, the thread A restarts the common process; when the present service process is killed; the thread B restarts the service thread; when the remote thread is terminated, the thread C re-injects a new remote thread into the key process of the system; and when one of the three threads A, B and C is killed, the current remote thread restarts the three threads A, B and C. By the process protection method, flexible protection of an appointed process is realized with fewer system resources; and the method is safe and efficient.

Description

technical field [0001] The invention relates to the field of computer security, in particular to a process protection method. Background technique [0002] Process protection is to protect the user's process from being illegally killed. If the user's process is terminated unexpectedly, it may cause the computer system to run unstable, especially when the computer is invaded by malicious programs such as viruses. Users bring very large economic losses. Important processes in the system also need to have self-protection capabilities, so that the situation that the process is killed without the user's knowledge can be avoided. [0003] One of the traditional process protection methods is to hide the process. In the Windows system, the user cannot detect the existence of the process, and the process will not be displayed in the process list of the task manager. Generally, the user cannot kill the process. However, the self-protection ability of the process protected by this me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/46
Inventor 于晓军万雪松赵辰清
Owner 北京思创银联科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products