Supercharge Your Innovation With Domain-Expert AI Agents!

Method and apparatus for protecting files

A technology for protecting files and files, applied in digital data protection, computer security devices, program/content distribution protection, etc., can solve problems such as platform incompatibility, complex implementation methods, poor stability, etc., to protect legitimate rights and interests, and solve platform problems Effects of incompatibility and prevention of illegal access

Active Publication Date: 2021-08-27
爱信诺征信有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The current DLL protection method generally encrypts the DLL file itself and hijacks the calls of LoadLibrary and LoadLibraryEx. The implementation method is relatively complicated, and it will also cause platform incompatibility and poor stability.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for protecting files
  • Method and apparatus for protecting files
  • Method and apparatus for protecting files

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Implementing any technical solution of the embodiments of the present application does not necessarily need to achieve all the above advantages at the same time.

[0031] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present application, the following will clearly and completely describe the technical solutions in the embodiments of the present application in conjunction with the drawings in the embodiments of the present application. Obviously, the described The embodiments are only some of the embodiments of the present application, but not all of them. All other embodiments obtained by persons of ordinary skill in the art based on the embodiments in the embodiments of the present application shall fall within the protection scope of the embodiments of the present application.

[0032] The specific implementation of the embodiment of the present application will be further described below in conjunct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides a method and device for protecting files, wherein the method includes: obtaining the stack information of the calling DLL file, obtaining the attribute information of the calling subject from the stack information; checking the calling subject obtained from the stack information Whether the attribute information of the DLL file is legal, if the inspection result shows that the attribute information of the call subject obtained from the stack information is illegal, the result of prohibiting the call of the DLL file will be returned; Illegal access to files protects the legitimate rights and interests of users, and solves the problems of platform incompatibility and poor stability after encrypting files.

Description

technical field [0001] The present application relates to the field of software, in particular to a method and device for protecting files. Background technique [0002] In Windows, many application programs are not a complete executable file, and they are divided into some relatively independent dynamic link libraries (Dynamic Link Library, DLL for short). [0003] The DLL file conforms to the PE file structure. Generally, if you know the definition of the exported function, you can use the DLL file to execute the function code in it. Although the DLL file may not be decompiled into source code, resulting in the leakage of its contents; but if the logic in it can be executed, the related functions of the DLL file can also be completed. If the core knowledge logic is encapsulated in the DLL file and is illegally used by others, it will cause huge losses. [0004] Therefore, due to the requirement of confidentiality protection, it is necessary to prevent such confidential D...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/12G06F21/60G06F21/62
CPCG06F21/125G06F21/602G06F21/6209G06F2221/2107
Inventor 郭向国付伟琦金端峰
Owner 爱信诺征信有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More