Unlock instant, AI-driven research and patent intelligence for your innovation.

Software protecting method and device and electronic device

A software and process technology, applied in the field of system security, can solve problems such as failure to protect system security normally, and achieve the effect of enhancing self-defense

Inactive Publication Date: 2016-12-07
ZHUHAI BAOQU TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, a malicious program can find the active window of the anti-virus software, obtain the window handle, and then destroy the window of the anti-virus software. In this way, the process corresponding to the window of the anti-virus software will end, and the anti-virus software cannot normally protect the system security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software protecting method and device and electronic device
  • Software protecting method and device and electronic device
  • Software protecting method and device and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0050] figure 1 It is a flow chart of the method for protecting software in Embodiment 1 of the present invention, such as figure 1 As shown, the method of this embodiment may include:

[0051] Step 101, when capturing the operation of searching the software window, call the user's search window function to obtain the window handle of the target window;

[0052] Step 102, judging whether the target window is a window under the preset directory and the process currently performing the operation of searching the software window belongs to a malicious program process according to the window handle of the target window;

[0053] Step 103, if the target window is a window under the preset directory and the process currently performing the operation of searching for the software window belongs to a malicious program process, then reject the operation of searching for the software window.

[0054] The method for protecting software in the embodiment of the present invention can int...

Embodiment 2

[0056] figure 2 It is a flow chart of the method for protecting software in Embodiment 2 of the present invention, such as figure 2 As shown, the method of this embodiment may include:

[0057] Step 201, using the hook function to hook the user search window function to capture the operation of searching the software window.

[0058] In the present embodiment, the user finds window function is NtUserFindWindowEx kernel function;

[0059] In this embodiment, using the hook function to hook the user to find the window function can be: in SSDT (SystemServices Descriptor Table, system service descriptor table), find the function address of the NtUserFindWindowEx kernel function, use the function address of the hook function to replace SSDT The function address of the NtUserFindWindowEx kernel function, thereby realizing the use of the hook function to hook the NtUserFindWindowEx kernel function, so that the operation of any process to find the software window will enter the ho...

Embodiment 3

[0081] image 3 It is a schematic structural diagram of the device for protecting software according to Embodiment 3 of the present invention, such as image 3 As shown, the device of this embodiment includes: an acquisition module 301, a judgment module 302 and a rejection module 303;

[0082] Obtaining module 301, is used for when catching the operation of searching software window, calls user to search window function and obtains the window handle of target window;

[0083] In this example, if Figure 4 As shown, another device for protecting software in this embodiment further includes: a hook module 304, configured to use a hook function to hook the user search window function to capture the operation of searching the software window.

[0084] In the present embodiment, the user finds window function is NtUserFindWindowEx kernel function;

[0085] In this embodiment, the hook module 304 is specifically used to find the function address of the NtUserFindWindowEx kernel ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a software protecting method and device and an electronic device. The method comprises the steps that when the operation of looking up a software window is caught, a user lookup window function is called to obtain a window handle of a target window; whether the target window is a window in a preset catalog or not and the progress of the current operation of looking up a software window is a rogue program progress or not are judged according to the window handle of the target window; if the target window is the window in the preset catalog and the progress of the current operation of looking up the software window is the rogue program progress, the operation of looking up the software window is refused. By the adoption of the software protecting method, the target window can be protected against destroying by melting or burning, and further software of the target window is protected.

Description

technical field [0001] The invention relates to the technical field of system security, in particular to a method, device and electronic equipment for protecting software. Background technique [0002] With the continuous development of Internet technology, malicious programs such as viruses and Trojan horses emerge in endlessly. For example, the process of a malicious program destroying an anti-virus software window is: the malicious program calls the FindWindow function, and further calls the NtUserFindWindowEx function of the kernel to obtain a window handle. The handle is used as a parameter to call the DestroyWindow function, and further call the kernel's NtUserDestroyWindow to destroy the window. Therefore, a malicious program can find the active window of the anti-virus software, obtain the window handle, and then destroy the window of the anti-virus software. In this way, the process corresponding to the window of the anti-virus software will end, and the anti-virus ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/554G06F21/566G06F2221/033
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD