Unlock instant, AI-driven research and patent intelligence for your innovation.

A process path acquisition method, device and electronic equipment

A technology of electronic equipment and acquisition method, which is applied in the field of security protection, can solve problems such as attack, loss of malicious program defense ability, and inability to obtain the process path of malicious programs, so as to achieve the effect of improving security and reliability

Active Publication Date: 2019-02-12
ZHUHAI BAOQU TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the malicious program erases the malicious program handle information in the process handle table, then the security program cannot obtain the process path of the malicious program, and then loses the defense capability against the malicious program, so that the malicious program can attack the system. to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A process path acquisition method, device and electronic equipment
  • A process path acquisition method, device and electronic equipment
  • A process path acquisition method, device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following describes in detail the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are exemplary, and are intended to be used to explain the present application, but should not be construed as a limitation to the present application.

[0052] The method, apparatus, and electronic device for obtaining a process path according to the embodiments of the present application are described below with reference to the accompanying drawings.

[0053] figure 1 This is a flowchart of a method for obtaining a process path according to an embodiment of the present application.

[0054] like figure 1 As shown, the process path acquisition method includes:

[0055] Step 101: Obtain a process identifier co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a process path acquiring method and device as well as electronic equipment. The method comprises: acquiring a process marker corresponding to an operation being executed in the electronic equipment; according to the process marker, acquiring process environment block data corresponding to the operation being executed; according to the process environment block data, determining process path information corresponding to the operation being executed. According to the process path acquiring method and device as well as the electronic equipment, provided by the invention, a security program can accurately acquire the process path information of a malicious program, so that the malicious program is intercepted and the security and reliability of the electronic equipment are improved.

Description

technical field [0001] The present application relates to the technical field of security protection, and in particular, to a process path acquisition method, apparatus and electronic device. Background technique [0002] With the development of Internet technology, malicious programs such as Trojan horses and viruses emerge in an endless stream. At present, security programs mainly prevent malicious programs from attacking electronic devices by checking and killing the process of malicious programs, thereby protecting the security of electronic devices and user information. [0003] Usually, by calling the kernel function ZwQueryInformationProcess of the system, the process path information in the system can be obtained through the process handle table in the system, so that the malicious program can be detected and killed according to the process path information of the malicious program. However, if the malicious program erases the malicious program handle information in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/52G06F21/56
CPCG06F21/52G06F21/56
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD