System process authority control method and device, storage medium, computer equipment
A system process and permission control technology, applied in the field of system security, can solve the problem of system process security reduction and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0025] In this embodiment, a permission control method of a system process is provided, such as figure 1 As shown, the method includes:
[0026] Step 101, obtain a system service request.
[0027] In order to ensure that the system process can perform safe operations and not be used by viruses, Trojan horses, etc., it becomes a puppet process and monitors the system process in real time. When the system process receives a system service request and needs to perform a certain task, it uses HOOK technology to monitor the system process. The corresponding system API is hooked up, or the task to be performed is filtered by a function filter driver, and the system service request is obtained in rea...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



