Program protection method and device

A program protection and program technology, applied in the field of program protection methods and devices, can solve problems such as inability to effectively prevent hooks, fail to identify hook types, and hidden safety hazards, and achieve the effects of reducing computational complexity, reducing waste, and improving operating speed

Active Publication Date: 2018-08-17
北京顶象技术有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The common "hook" system mechanism is HOOK, which is often used to replace program code to make it jump to malicious programs. The existing metho

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program protection method and device
  • Program protection method and device
  • Program protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Example

[0026] First embodiment

[0027] The applicant’s research found that with the development and popularization of computer and network technologies, more and more malicious programs make the normal program jump to the malicious program by hooking the normal program that is running normally, and then serious Threat to data security and network security. Among them, HOOK is a system mechanism provided in Windows to replace "interrupt" under DOS, which is translated as "hook" or "hook" in Chinese. After Hooking a specific system event, once the Hooked event occurs, the program that Hooked the event will receive the notification from the system, and then the program can respond to the event as soon as possible; use another In this way, HOOK is actually a program segment for processing messages, which is hooked into the system through system calls. Whenever a specific message is sent, the hook program first captures the message before it reaches the destination window, that is, the ho...

Example

[0036] Second embodiment

[0037] In order to better implement the above-mentioned program protection method, the second embodiment of the present invention provides a program protection device 100. For the specific structure, please refer to image 3 , image 3 This embodiment provides a block diagram of a program protection device.

[0038] The program protection device 100 includes a program recognition unit 101 and a jump unit 102. The program identification unit 101 is used for determining whether the program corresponding to the process execution instruction is a protected program when the operating system receives a process execution instruction. The jump unit 102 is used to control the program to jump through a preset non-system application programming interface when the program is a protected program and the program jumps from the user mode to the kernel mode.

[0039] The program protection device 100 also includes a list adding unit 103 and a list judging unit 104. The l...

Example

[0042] The third embodiment

[0043] Please refer to Figure 4 , Figure 4 It shows a structural block diagram of an electronic device 200 that can be applied to the embodiments of the present application. The electronic device 200 may include a program protection device 100, a memory 201, a storage controller 202, a processor 203, a peripheral interface 204, an input and output unit 205, an audio unit 206, and a display unit 207.

[0044] The components of the memory 201, the storage controller 202, the processor 203, the peripheral interface 204, the input output unit 205, the audio unit 206, and the display unit 207 are directly or indirectly electrically connected to each other to realize data transmission or Interactive. For example, these components can be electrically connected to each other through one or more communication buses or signal lines. The program protection device 100 includes at least one software function module that can be stored in the memory 201 in the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a program protection method and device, and relates to the technical field of program security protection. The program protection method determines whether or not a program corresponding to a process execution instruction is a protected program when an operating system receives the process execution instruction, if yes, the program is redirected from a user state to a kernelstate, and the program is controlled to be redirected through a preset non-system application programming interface. The program protection method bypasses the system application programming interface, and achieves the redirection from the user state to the kernel state by using the non-system application programming interface, and it is avoided that the program is redirected to a malicious program when the program is HOOK.

Description

technical field [0001] The present invention relates to the technical field of program security protection, in particular to a program protection method and device. Background technique [0002] With the rapid development of computer technology and network communication technology, people can no longer live without mobile phones, personal computers and other electronic devices with computing and communication functions. More and more personal data, enterprise data and other important data are stored in various electronic devices, and people need to rely on more and more applications to complete various production and life, and the above-mentioned types of applications often require Call personal data, corporate data, and other important data. In the era of big data, the event that applications or databases are hacked will cause huge economic or other losses to related companies and users. Therefore, in order to prevent malicious programs from invading normal application pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/52
CPCG06F21/52
Inventor 卜兰
Owner 北京顶象技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products