Process protection method, device and terminal

A process and target process technology, applied in the security field, can solve the problems of destroying the security protection environment of the terminal system, unable to protect the terminal normally, and achieve the effect of improving the defense capability

Inactive Publication Date: 2016-12-07
ZHUHAI BAOQU TECH CO LTD
View PDF7 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Some malicious programs will use special codes to attack the security software in the terminal system. For example, if the process corresponding to the security software is terminated, the terminal cannot be protected normally after the process corresponding to the security software is terminated, destroying the security of the terminal system. protect environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Process protection method, device and terminal
  • Process protection method, device and terminal
  • Process protection method, device and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] Embodiments of the present invention are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals designate the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary and are intended to explain the present invention and should not be construed as limiting the present invention.

[0039] With the rapid development of Internet technology, malicious program technologies such as viruses and Trojan horses emerge in an endless stream. Some malicious programs will use special codes to attack the security software (such as Duba security software, etc.) in the terminal system. If the process corresponding to the security software is terminated, the core process corresponding to the security software will not be protected normally terminal, destroying the security protection environment of the terminal system.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a process protection method, device and terminal, wherein the method comprises the following steps of: creating a hook function, wherein the hook function includes a first parameter and a second parameter; the first parameter is used for storing a process handle of a process; and the second parameter is used for storing data information for setting process attribute; replacing a function address of the hook function by an original function address used for setting a kernel function of the process attribute in a system service descriptor table SSDT; judging whether the current system satisfies a process protection condition or not according to the first parameter and the second parameter; and, if the current system satisfies the process protection condition, intercepting attribute setting of a target process through the hook function. The purpose of protecting the process by intercept a process attribute setting function is achieved; therefore, the target process, such as a process of a safety element in a terminal system, is protected easily; the defence capability of the target process is improved; and safety protection to a user terminal and the system can be carried out easily.

Description

technical field [0001] The present invention relates to the field of security technology, in particular to a process protection method, device and terminal. Background technique [0002] With the rapid development of Internet technology, malicious program technologies such as viruses and Trojan horses emerge in an endless stream. Some malicious programs will use special codes to attack the security software in the terminal system. For example, if the process corresponding to the security software is terminated, the terminal cannot be protected normally after the process corresponding to the security software is terminated, destroying the security of the terminal system. protect environment. Therefore, how to effectively intercept actions of malicious programs to maliciously terminate the target process so as to protect the target process has become an urgent problem to be solved. Contents of the invention [0003] The object of the present invention is to solve one of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/554G06F21/566G06F2221/034
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products