Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for acquiring control power of operating system

A technology of operating system and control rights, applied in the security field, can solve the problems of mobile terminal harm, obtain control rights of operating system, etc., to achieve the effect of protecting security

Active Publication Date: 2015-03-25
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the existing technology, many active defense software cannot obtain the control right of the operating system in the first time, giving the virus an opportunity to operate and even cause harm to mobile terminals (such as mobile phones, personal computers, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for acquiring control power of operating system
  • Method and device for acquiring control power of operating system
  • Method and device for acquiring control power of operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings.

[0020] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary only for explaining the present invention and should not be construed as limiting the present invention. On the contrary, the embodiments of the present invention include all changes, modifications and equivalents coming within the spirit and scope of the appended claims.

[0021] In the description of the present invention, it should be understood that the terms "first", "second" and so on are used for descriptive purpo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for acquiring the control power of an operating system. The system includes the steps that a first drive receives a mapping notification of the operating system, and the mapping notification is sent when the operating system enables a new technology dynamic link library (NTDLL) to be mapped into a first program in the starting process of the first program; the first drive enables a first dynamic link library to be mapped into the process memory space of the first program; the first drive hooks a sensitive function in the NTDLL, so that the first program is skipped to the first dynamic link library when calling the sensitive function. The device comprises the first drive and the first dynamic link library. According to the scheme, more effective protection is provided for a mobile terminal, and damage to the mobile terminal by virus files is effectively prevented.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a method and device for obtaining control rights of an operating system. Background technique [0002] Active defense is a real-time protection technology based on independent analysis and judgment of program behavior. This technology does not use the signature code of the virus as the basis for judging the virus, but starts from the most original virus definition, and directly uses the behavior of the program as the basis for judging the virus. Active defense is to use software to automatically realize the process of anti-virus engineers analyzing and judging viruses, which solves the disadvantage that traditional security software cannot defend against unknown malware, and technically realizes active defense against Trojan horses and viruses. [0003] However, in the prior art, many active defense software cannot obtain the control right of the operating system at th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F9/445
CPCG06F21/566
Inventor 段然
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD