Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and apparatus for intercepting installation of malicious program and electronic device

A malicious program and program technology, applied in computer security devices, electrical digital data processing, instruments, etc., can solve the problems of incomplete interception, inability to intercept malicious programs, and inability to realize malicious program installation and interception, and achieve the effect of convenient maintenance

Inactive Publication Date: 2016-10-12
ZHUHAI BAOQU TECH CO LTD
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the development of Internet technology, the number of software is also increasing massively. Users download and install software on their computers through various channels. Although some are legitimate software, legitimate software may also promote the installation of some malicious programs. If malicious programs are installed on the user's computer On the contrary, the consequences are immeasurable. Therefore, it is necessary to identify the malicious programs in the software and prevent its installation when installing the software.
[0003] The existing malicious program interception scheme is to use a hook function to intercept the running of the malicious program process when the process creates the software. The principle is to intercept the malicious program according to the name of the installation package of the malicious program. Unable to block the installation of malicious programs
Although the installation package name of the malicious program that needs to be intercepted can be configured in the existing scheme, the configurable installation package name is also a known limited number of fixed names, and it is still impossible to intercept malicious programs with random installation package names. Therefore, existing malicious The program interception scheme will have the problem that it is easy to miss and block malicious programs, and the interception is not comprehensive

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for intercepting installation of malicious program and electronic device
  • Method and apparatus for intercepting installation of malicious program and electronic device
  • Method and apparatus for intercepting installation of malicious program and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] A scheme for intercepting malicious program installation according to an embodiment of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0058] It should be clear that the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0059] figure 1 It is a schematic flow diagram of Embodiment 1 of the method for intercepting malicious program installation of the present invention, as figure 1 As shown, the method of this embodiment may include:

[0060] Step 101 , monitor the event message of the directory and / or registry entry to be created by the program installation process in the system; wherein, the event message includes the directory path and / or registry entry to be ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a method and an apparatus for intercepting installation of a malicious program and an electronic device, which relate to the technical field of computer security and can solve the problem of non-comprehensive interception of the malicious program in the prior art by preventing the malicious program from creating a directory and / or a registry entry. The method comprises the steps of monitoring an event message that a program installation process is to create the directory and / or the registry entry in a system, wherein the event message comprises to-be-created directory path and / or registry entry; judging whether the to-be-created directory path and / or registry entry is recorded in a preset configurable file or not; and if the to-be-created directory path and / or registry entry is recorded in the configurable file, preventing the program installation process from creating the directory and / or the registry entry. The method and the apparatus are suitable for preventing the installation of the malicious program.

Description

technical field [0001] The invention relates to the technical field of computer security, in particular to a method, device and electronic equipment for intercepting malicious program installation. Background technique [0002] With the development of Internet technology, the number of software is also increasing massively. Users download and install software on their computers through various channels. Although some are regular software, regular software may also promote the installation of some malicious programs. If malicious programs are installed on the user's computer In fact, the consequences are immeasurable. Therefore, it is necessary to identify malicious programs in the software and prevent its installation when installing the software. [0003] The existing malicious program interception scheme is to use a hook function to intercept the running of the malicious program process when the process creates the software. The principle is to intercept the malicious prog...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/55
CPCG06F21/51G06F21/552
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD