Application program protection method and device, electronic equipment and storage medium

A technology of application programs and electronic equipment, applied in the computer field, can solve problems such as complex implementation process and poor applicability

Pending Publication Date: 2021-12-03
AEROSPACE INFORMATION
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the above method can only be applied to the Linux system to solve the intrusion event of the L...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application program protection method and device, electronic equipment and storage medium
  • Application program protection method and device, electronic equipment and storage medium
  • Application program protection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] In order to make the purpose, technical solutions and advantages of the embodiments of the application clearer, the technical solutions of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the application. Obviously, the described embodiments are the Some embodiments of the technical solution, but not all embodiments. Based on the embodiments described in the application documents, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the technical solutions of the present application.

[0058] Some concepts involved in the embodiments of the present application are introduced below.

[0059] 1. The term "and / or" in the embodiments of this application describes the relationship between related objects, indicating that there may be three relationships, for example, A and / or B, which can mean: A exists alone, A and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computers, in particular relates to an application program protection method and device, electronic equipment and a storage medium, and aims to easily and efficiently improve program security. The method comprises the steps of when a target application program calls a target function, encrypting file information corresponding to the target application program, and obtaining file encryption information; sending the file encryption information to the target function, and comparing the file encryption information with pre-stored encryption information corresponding to the target function through the target function; and determining whether to load the target function or not according to a comparison result. The file encryption information is compared with the pre-stored encryption information corresponding to the target function through the target function, and whether the target function is loaded or not is determined according to the comparison result, so that illegal calling of a program can be easily and quickly prevented, intrusion events can be prevented, comprehensive protection of a system is realized, the reliability of the system is improved, and the practicability is higher.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to an application program protection method, device, electronic equipment and storage medium. Background technique [0002] With the continuous advancement of science and technology, there are many malicious calls of malicious software in C++ functions, which destroy the source program and cause serious impact on society. [0003] In the related technology, for the malicious call of C++ function, the system call entry is mainly obtained through assembly instructions, the system call linked list pointer is obtained through the system call entry, and the system call pointer is processed with a fingerprint algorithm. However, the above method can only be applied to the Linux system to solve the intrusion event of the kernel state of the Linux system, the applicability is poor, and the implementation process is relatively complicated. Contents of the invention [0004...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/12G06F21/60G06F21/62
CPCG06F21/123G06F21/602G06F21/6218
Inventor 魏贺生范丽单国军周晚晴谢宇
Owner AEROSPACE INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products