Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for intercepting application program behavior, and terminal

A technology of applications and malicious applications, which is applied in the field of intercepting application behaviors, can solve problems such as damage and affecting users' normal use of terminals, and achieve the effect of improving security

Active Publication Date: 2016-11-16
ZHUHAI BAOQU TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in order to prevent malicious programs from being detected and killed, malicious programs can register a global hook through the RegisterUserApiHook function to prevent detection by security software, so that malicious programs can be detected by security software and destroy any process of the terminal, affecting the normal use of the terminal by users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for intercepting application program behavior, and terminal
  • Method for intercepting application program behavior, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0044] The execution subject in the embodiment of the present invention may be a terminal, and the described terminals may include: smart terminals such as computers, tablet computers, and notebooks. The above-mentioned terminals are only examples, not exhaustive, including but not limited to the above-mentioned terminals.

[0045] see figure 1 , is a schematic flow chart of the first embodiment of the method for intercepting application program behavior provided b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the invention discloses a method for intercepting application program behaviors. The method comprises: monitoring whether an application program registers a global hook; when the application program registers the global hook is monitored, determining whether the behavior of registering the global hook by the application program is a malicious behavior; when the behavior of registering the global hook by the application program is determined to be a malicious behavior, intercepting the behavior of the application program registering the global hook. An embodiment of the invention also discloses a terminal. Using the method can prevent a malicious program from registering hook, and prevent damages on a terminal system, so as to improve security of the terminal.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and terminal for intercepting application program behavior. Background technique [0002] When a thread in the process creates or closes a window, it will check whether the thread has a hook function, and if there is a hook function, then call the hook function and execute it. [0003] Currently, the system provides the RegisterUserApiHook function. The terminal can register a global hook in the system through the RegisterUserApiHook function. When some specified messages are processed by any application in the system, the hook will be called. Therefore, in order to avoid being detected and killed by the malicious program, the malicious program can register a global hook through the RegisterUserApiHook function to prevent the detection of the security software, so that the malicious program can pass the detection of the security software and destroy any process of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/51G06F21/56
CPCG06F21/51G06F21/566
Inventor 杨峰
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products