Method and device for identifying and processing application programs

An application program and identification processing technology, applied in the computer field, can solve the problem that the system security of user equipment cannot be guaranteed, and achieve the effect of system security guarantee

Active Publication Date: 2016-12-07
ZHUHAI BAOQU TECH CO LTD
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present invention provide a method and device for identifying and processing application programs, which can solve the technical problem that the system security of user equipment cannot be guaranteed due to the inability to intercept and kill malicious programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying and processing application programs
  • Method and device for identifying and processing application programs
  • Method and device for identifying and processing application programs

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0020] See figure 1 , is a schematic flowchart of an application identification processing method provided by an embodiment of the present invention, and the method may include:

[0021] S101, when it is detected that the system power state is set, acquire a power state parameter;

[0022] Specifically, the computer device can find out the function address of the kernel function used to set the system power state (such as the NtSetSystemPowerState function address...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention discloses a method and a device for identifying and processing application programs. The method includes acquiring power state parameters when system power state setting is detected; searching process paths corresponding to the application programs currently in power setting states when preset parameter matching conditions are met by the power state parameters; determining that the application programs are illegal application programs if the process paths contain illegal process names, and intercepting system power state setting operation of the application programs. The power setting states refer to states in which system power states are set. The method and the device have the advantage that technical problems of incapability of guaranteeing the system safety of user equipment due to the fact that malicious programs cannot be intercepted, searched and killed can be solved by the aid of the method and the device.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for identifying and processing application programs. Background technique [0002] With the development of Internet technology, malicious program technologies such as viruses and Trojan horses emerge in an endless stream. For example, a Trojan horse program will cause files in the user device to be arbitrarily destroyed and stolen. Therefore, in order to ensure the system security of the user equipment, it is necessary to intercept and kill these malicious programs in time. [0003] At present, in order not to be intercepted and killed by anti-virus software, these malicious programs will set the system power state at critical moments, so that the anti-virus software will not be intercepted. At this time, these malicious programs will start arbitrarily in the system And dissemination, resulting in the system security of the user equipment cannot be...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55
CPCG06F21/554
Inventor 李文靖
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products