Registry redirecting method and device

A registry and redirection technology, applied in program control devices, digital transmission systems, data exchange networks, etc., can solve problems such as not finding and shielding LSPDLL, and achieve the effect of improving stability and security

Active Publication Date: 2013-04-03
BEIJING QIHOO TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, there is currently no effective measure to detect and shield some problematic LSPDLLs in time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Registry redirecting method and device
  • Registry redirecting method and device
  • Registry redirecting method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0021] figure 1 For the schematic diagram of the WinSock framework, refer to figure 1 , the transport provider has two chains: TCP chain, UDP chain. There may also be other types of LSP chains.

[0022] In the TCP chain, there are 4 layers from top to bottom (the underlying mswsock.dll is a function of the operating system itself). The UDP chain consists of 3 layers.

[0023] The three on the right are namespace providers, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a registry redirecting method and device. The method comprises the following steps of: loading configuration information of an application program; judging whether layered service provider (LSP) configuration registry data comprises LSP dynamic link library (DLL) which needs to be shielded or not according to the loaded configuration information; if the LSP configuration registry data comprises the LSP DLL which needs to be shielded, deleting the information of the LSP DLL from the LSP configuration registry data to construct new LSP configuration registry data; and redirecting the operation of the LSP configuration registry data onto the newly constructed LSP configuration registry data. According to the method disclosed by the invention, through utilizing a registry redirecting mechanism, specific or all LSP DLLs are shielded by aiming at specific or all processes in a Windows system, and therefore, the LSP DLLs are prevented from being loaded into the processes, and the stability and the safety of the application program are improved.

Description

technical field [0001] The invention relates to application program monitoring technology, in particular to a registry redirection method and device. Background technique [0002] LSP (Layered Service Provider) is a unique mechanism in WinSock (WinSock (Windows Sockets) is the abbreviation of the network communication architecture and specification of the Windows operating system application layer provided by the operating system) in the communication architecture of the Windows platform. Through the extensible LSP mechanism, third-party software developers can insert DLL in the application program to monitor and modify TCP / IP data packets, so as to develop rich network applications, such as chat software communication encryption tools, network agent software, Online game accelerator, etc. [0003] LSP can be used to develop regular applications, and virus and Trojan horse authors can also use LSP to insert malicious code into the user's system and steal user information. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/44H04L12/70
Inventor 张波
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products