Unlock instant, AI-driven research and patent intelligence for your innovation.

Intrusion detection method and device

A technology of intrusion detection and location designation, applied in computer security devices, instruments, computing, etc., to solve problems such as illegal profits

Active Publication Date: 2022-02-18
QILIN HESHENG NETWORK TECH INC
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, other users can still use the debugger to debug the Native program, view the assembly code or pseudo-code, and set a breakpoint and observe the value of the context register at the breakpoint to infer the program execution logic, and then obtain the key logic of the program, thereby Use program code loopholes or forge official application data to make illegal profits

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intrusion detection method and device
  • Intrusion detection method and device
  • Intrusion detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0071] Embodiments of the present application provide an intrusion detection method and device to reliably and effectively detect whether an external process invades an application process.

[0072] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the scope of protection of this application.

[0073] figure 1 is a schematic flowchart of an intrusion detection method according to an embodiment of the present invention, such as figure 1 As...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application discloses an intrusion detection method and device, which are used to reliably and effectively detect whether an external process invades an application process. The method includes: sending out a breakpoint signal for detecting whether there is an external process; obtaining a monitoring result obtained by monitoring the application process within a preset time period, the monitoring result including the specified location of the application process The result of whether the value of the corresponding register changes; according to the monitoring result, it is judged whether the breakpoint signal can be received; if the breakpoint signal cannot be received, it is determined that the application process is blocked by the external process invasion. Compared with the application process in the prior art, which can only be passively invaded by an external process, this technical solution can reliably and effectively determine whether the application process is invaded by an external process by actively sending a breakpoint signal, thereby avoiding the inability to detect external process intrusion When the application process is controlled by an external process.

Description

technical field [0001] The invention relates to the technical field of data protection, in particular to an intrusion detection method and device. Background technique [0002] When developing Android applications, in order to protect important data and code logic from being easily cracked, Native is used to implement key codes, that is, C / C++ language is used to prevent other users from knowing the data and codes in the application through decompilation. logic. However, other users can still use the debugger to debug the Native program, view the assembly code or pseudo-code, and set a breakpoint and observe the value of the context register at the breakpoint to infer the program execution logic, and then obtain the key logic of the program, thereby Use loopholes in program code or forge official application data to make illegal profits. It can be seen that how to prevent the program from being invaded is an urgent problem to be solved. Contents of the invention [0003...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56
CPCG06F21/566
Inventor 赵兵锋李涛
Owner QILIN HESHENG NETWORK TECH INC