Program protection method and device
A program protection and program technology, applied in the field of program protection methods and devices, can solve problems such as inability to effectively prevent hooks, fail to identify hook types, and hidden safety hazards, and achieve the effects of reducing computational complexity, reducing waste, and improving operating speed
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0026] First embodiment
[0027] The applicant’s research found that with the development and popularization of computer and network technologies, more and more malicious programs make the normal program jump to the malicious program by hooking the normal program that is running normally, and then serious Threat to data security and network security. Among them, HOOK is a system mechanism provided in Windows to replace "interrupt" under DOS, which is translated as "hook" or "hook" in Chinese. After Hooking a specific system event, once the Hooked event occurs, the program that Hooked the event will receive the notification from the system, and then the program can respond to the event as soon as possible; use another In this way, HOOK is actually a program segment for processing messages, which is hooked into the system through system calls. Whenever a specific message is sent, the hook program first captures the message before it reaches the destination window, that is, the ho...
Example
[0036] Second embodiment
[0037] In order to better implement the above-mentioned program protection method, the second embodiment of the present invention provides a program protection device 100. For the specific structure, please refer to image 3 , image 3 This embodiment provides a block diagram of a program protection device.
[0038] The program protection device 100 includes a program recognition unit 101 and a jump unit 102. The program identification unit 101 is used for determining whether the program corresponding to the process execution instruction is a protected program when the operating system receives a process execution instruction. The jump unit 102 is used to control the program to jump through a preset non-system application programming interface when the program is a protected program and the program jumps from the user mode to the kernel mode.
[0039] The program protection device 100 also includes a list adding unit 103 and a list judging unit 104. The l...
Example
[0042] The third embodiment
[0043] Please refer to Figure 4 , Figure 4 It shows a structural block diagram of an electronic device 200 that can be applied to the embodiments of the present application. The electronic device 200 may include a program protection device 100, a memory 201, a storage controller 202, a processor 203, a peripheral interface 204, an input and output unit 205, an audio unit 206, and a display unit 207.
[0044] The components of the memory 201, the storage controller 202, the processor 203, the peripheral interface 204, the input output unit 205, the audio unit 206, and the display unit 207 are directly or indirectly electrically connected to each other to realize data transmission or Interactive. For example, these components can be electrically connected to each other through one or more communication buses or signal lines. The program protection device 100 includes at least one software function module that can be stored in the memory 201 in the ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2023 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap