Method for intercepting application program behavior, and terminal

A technology of applications and malicious applications, which is applied in the field of intercepting application behaviors, can solve problems such as damage and affecting users' normal use of terminals, and achieve the effect of improving security

Active Publication Date: 2016-11-16
ZHUHAI BAOQU TECH CO LTD
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, in order to prevent malicious programs from being detected and killed, malicious programs can register a global hook through the RegisterUserApiHook function to prevent det

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for intercepting application program behavior, and terminal
  • Method for intercepting application program behavior, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0043] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0044] The execution subject in the embodiment of the present invention may be a terminal, and the described terminal may include: a computer, a tablet computer, a notebook, and other intelligent terminals. The above-mentioned terminal is only an example, not an exhaustive list, including but not limited to the above-mentioned terminal.

[0045] See figure 1 , Is a schematic flowchart of the first embodiment of a method for intercepting app...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a method for intercepting application program behaviors. The method comprises: monitoring whether an application program registers a global hook; when the application program registers the global hook is monitored, determining whether the behavior of registering the global hook by the application program is a malicious behavior; when the behavior of registering the global hook by the application program is determined to be a malicious behavior, intercepting the behavior of the application program registering the global hook. An embodiment of the invention also discloses a terminal. Using the method can prevent a malicious program from registering hook, and prevent damages on a terminal system, so as to improve security of the terminal.

Description

technical field [0001] The invention relates to the field of electronic technology, in particular to a method and terminal for intercepting application program behavior. Background technique [0002] When a thread in the process creates or closes a window, it will check whether the thread has a hook function, and if there is a hook function, then call the hook function and execute it. [0003] Currently, the system provides the RegisterUserApiHook function. The terminal can register a global hook in the system through the RegisterUserApiHook function. When some specified messages are processed by any application in the system, the hook will be called. Therefore, in order to avoid being detected and killed by the malicious program, the malicious program can register a global hook through the RegisterUserApiHook function to prevent the detection of the security software, so that the malicious program can pass the detection of the security software and destroy any process of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/51G06F21/56
CPCG06F21/51G06F21/566
Inventor 杨峰
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products