Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Program protection method and device

A program protection and program technology, applied in the field of program protection methods and devices, can solve problems such as inability to effectively prevent hooks, fail to identify hook types, and hidden safety hazards, and achieve the effects of reducing computational complexity, reducing waste, and improving operating speed

Active Publication Date: 2018-08-17
北京顶象技术有限公司
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The common "hook" system mechanism is HOOK, which is often used to replace program code to make it jump to malicious programs. The existing methods of fighting against HOOK cannot recognize the type of HOOK or cannot effectively prevent HOOK when fighting against certain HOOKs. big security risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Program protection method and device
  • Program protection method and device
  • Program protection method and device

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0027]The applicant's research has found that with the development and popularization of computer and network technologies, more and more malicious programs make the normal programs jump to the malicious programs by hooking the normal programs that are running normally, and serious Threat to data security and network security. Among them, HOOK is a system mechanism provided in Windows to replace the "interrupt" under DOS, which is translated into "hook" or "hook" in Chinese. After hooking a specific system event, once a Hooked event occurs, the program that hooks the event will receive a notification from the system, and the program can respond to the event at the first time; use another In this way, HOOK is actually a program segment for processing messages, which is hooked into the system through system calls. Whenever a specific message is sent, before reaching the destination window, the hook program first captures the message, that is, the hook function first obtains con...

no. 2 example

[0037] In order to better implement the above program protection method, the second embodiment of the present invention provides a program protection device 100, please refer to image 3 , image 3 A block diagram of a program protection device provided in this embodiment.

[0038] The program protection device 100 includes a program identification unit 101 and a jump unit 102 . The program identification unit 101 is configured to determine whether the program corresponding to the process execution instruction is a protected program when the operating system receives the process execution instruction. The jump unit 102 is configured to control the program to jump through a preset non-system application programming interface when the program is a protected program and the program jumps from the user state to the kernel state.

[0039] The program protection device 100 also includes a list adding unit 103 and a list judging unit 104 . The list adding unit 103 is used for addi...

no. 3 example

[0043] Please refer to Figure 4 , Figure 4 A structural block diagram of an electronic device 200 applicable to the embodiment of the present application is shown. The electronic device 200 may include a program protection device 100 , a memory 201 , a storage controller 202 , a processor 203 , a peripheral interface 204 , an input and output unit 205 , an audio unit 206 , and a display unit 207 .

[0044] The memory 201, storage controller 202, processor 203, peripheral interface 204, input and output unit 205, audio unit 206, and display unit 207 are electrically connected to each other directly or indirectly to realize data transmission or interact. For example, these components can be electrically connected to each other through one or more communication buses or signal lines. The program protection device 100 includes at least one software function module that can be stored in the memory 201 in the form of software or firmware (firmware) or solidified in an operating...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a program protection method and device, and relates to the technical field of program security protection. The program protection method determines whether or not a program corresponding to a process execution instruction is a protected program when an operating system receives the process execution instruction, if yes, the program is redirected from a user state to a kernelstate, and the program is controlled to be redirected through a preset non-system application programming interface. The program protection method bypasses the system application programming interface, and achieves the redirection from the user state to the kernel state by using the non-system application programming interface, and it is avoided that the program is redirected to a malicious program when the program is HOOK.

Description

technical field [0001] The present invention relates to the technical field of program security protection, in particular to a program protection method and device. Background technique [0002] With the rapid development of computer technology and network communication technology, people can no longer live without mobile phones, personal computers and other electronic devices with computing and communication functions. More and more personal data, enterprise data and other important data are stored in various electronic devices, and people need to rely on more and more applications to complete various production and life, and the above-mentioned types of applications often require Call personal data, corporate data, and other important data. In the era of big data, the event that applications or databases are hacked will cause huge economic or other losses to related companies and users. Therefore, in order to prevent malicious programs from invading normal application pr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/52
CPCG06F21/52
Inventor 卜兰
Owner 北京顶象技术有限公司
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More