A method and terminal for intercepting driver loading

A terminal and drive file technology, applied in the electronic field, can solve problems such as wasting resources, wasting terminal operating resources, and heavy terminal processing pressure, so as to achieve the effect of improving self-security, improving interception accuracy, and reducing processing pressure

Active Publication Date: 2019-08-23
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, since the terminal is ready to load the driver file, if the terminal determines to intercept and load the driver, this will cause the terminal to waste resources on the preliminary preparations for loading the driver file, thereby wasting the operating resources of the terminal and causing the processing pressure of the terminal too heavy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and terminal for intercepting driver loading
  • A method and terminal for intercepting driver loading

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0047] The execution subject in the embodiment of the present invention may be a terminal, and the described terminals may include: smart terminals such as computers, tablet computers, and notebooks. The above-mentioned terminals are only examples, not exhaustive, including but not limited to the above-mentioned terminals.

[0048] see figure 1 , is a schematic flowchart of the first embodiment of a method for intercepting driver loading provided by an embodiment o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a driver loading interception method. The method comprises the steps of monitoring a message sent to a subsystem by an application through a local process call (LPC), and judging whether the message is a message used for indicating driver loading; when it is monitored that the message is the message used for indicating the driver loading, performing security detection on the application, and judging whether the application is a malicious program or not; and when it is determined that the application is the malicious program, intercepting the message. An embodiment of the invention furthermore discloses a terminal. With the adoption of the method and the terminal, the processing pressure of the terminal in intercepting the driver loading is reduced, running resources of the terminal are saved, the interception accuracy of the terminal is improved, and the terminal security is enhanced.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and terminal for intercepting driver loading. Background technique [0002] With the development of Internet technology, malicious software technologies such as viruses and Trojan horses emerge in an endless stream. Malicious programs can use special malicious codes to carry out malicious behaviors to attack the service system. At present, many malicious programs can load and drive without the user's knowledge, and when the malicious program loads the driver successfully, the malicious program can delete any security application, which brings a major security risk to the terminal. [0003] In order to prevent malicious programs from maliciously loading drivers, the current terminal can scan the obtained loading driver files and related files when loading driver files, and comprehensively judge whether to intercept and load drivers, and when it is determined that int...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/51G06F21/55
CPCG06F21/51G06F21/554
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products