Method, device and electronic equipment for protecting target application

An application and target protection technology, applied in the field of information security, can solve problems such as low security and vulnerable applications, and achieve the effect of improving security, solving vulnerability to attacks, and reducing the probability of being attacked.

Inactive Publication Date: 2016-08-24
ZHUHAI BAOQU TECH CO LTD
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiments of the present invention provide a method, device and electronic device for protecting a target application, which can reduce the probability of the target application being attacked and improve the security of the target application, so as to solve the existing problem of protecting the target application. In the method, the application program is vulnerable to attack and the security is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and electronic equipment for protecting target application
  • Method, device and electronic equipment for protecting target application
  • Method, device and electronic equipment for protecting target application

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] figure 1 It is a schematic flowchart of a method for protecting a target application program according to an embodiment of the present invention, such as figure 1 As shown, the method of this embodiment may include:

[0051] Step 101, when the pre-injected hook function detects that the file system opening routine function is called, use the hook function to hook the file system opening routine function;

[0052] In this embodiment, when the non-target application program debugs some target application programs, it needs to open the relevant files of the target application program. When the non-target application program opens each file, the non-target application program will request the debugger to call the file. The system opens the routine function for processing, and the file system opens the routine function to read the relevant information of the file to the physical hard disk, thereby realizing the opening of the file.

[0053] In this embodiment, when debuggi...

Embodiment 2

[0074] figure 2 It is a schematic flowchart of a method for protecting a target application program in Embodiment 2 of the present invention, as shown in figure 2 As shown, the method of this embodiment may include:

[0075] Step 201, when the pre-injected hook function detects that the file system opening routine function is called, use the hook function to hook the file system opening routine function;

[0076] Step 202, calling the process path obtaining function to obtain the path name of the operation process that calls the file system opening routine function;

[0077] In this embodiment, the processes from step 201 to step 202 are respectively similar to steps 101 to 102 in the first method embodiment, and will not be repeated here.

[0078] Step 203, if the obtained operation process path name is the same as any debugger process path name in the preset debugger process path name library, extract the file name under the operation process path name;

[0079] Step 20...

Embodiment 3

[0088] image 3 It is a schematic structural diagram of a device for protecting a target application program in Embodiment 3 of the present invention, as shown in image 3 As shown, the device of this embodiment may include: a hook function monitoring module 31, a path name obtaining module 32, and a matching processing module 33, wherein,

[0089] A hook function monitoring module 31, configured to use the hook function to hook the file system opening routine function when the pre-injected hook function detects that the file system opening routine function is called;

[0090] In this embodiment, the routine function is a collection of functional interfaces or services provided by the operating system, including but not limited to: API functions, service functions, standard functions provided by Delphi or C++Builder, library functions, and the like.

[0091] In this embodiment, the hook function can be obtained by programming in any language that can realize the corresponding...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method, device and electronic equipment for protecting target application, and relates to the information security technology, wherein the probability of application attack can be reduced, and the application security is improved. The method comprises the following steps: when the pre-input hook function monitors that a file system opening routine function is called, hooking the file system opening routine function using the hook function; calling a progress path acquisition function, and acquiring the operation progress path name calling the file system opening routine function; and if the acquired operation progress path name is the same as any debugger progress path name in a preset debugger progress path name library, rejecting the calling of the file system opening routine function. The method, device and electronic equipment are applicable to the anti-debugging protection of application.

Description

technical field [0001] The present invention relates to information security technology, in particular to a method, device and electronic equipment for protecting target application programs. Background technique [0002] With the continuous development of computer communication and Internet technology, the application of electronic devices is becoming more and more common. For example, smart mobile phones, personal digital assistants, palmtop computers, and notebook computers are more and more widely used. There are also more and more application programs (APP, Application) installed on electronic devices, and the application functions provided by the application programs are also becoming more and more abundant. However, as the application functions provided by applications continue to increase, some malicious applications can debug the target application that needs to be attacked through the viruses or Trojans bundled in the malicious application. For example, using a deb...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/56
CPCG06F21/562
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products