CN107066879A - A kind of method and system hidden for computer application program process - Google Patents
A kind of method and system hidden for computer application program process Download PDFInfo
- Publication number
- CN107066879A CN107066879A CN201710174962.2A CN201710174962A CN107066879A CN 107066879 A CN107066879 A CN 107066879A CN 201710174962 A CN201710174962 A CN 201710174962A CN 107066879 A CN107066879 A CN 107066879A
- Authority
- CN
- China
- Prior art keywords
- identification information
- destination application
- destination
- chained list
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of method and system hidden for computer application program process, this method includes:Obtain the identification information of destination application;The corresponding destination node of process of destination application is obtained in Process Movement chained list according to identification information;Delete target node, with the process of vanishing target application program.Node of the process of destination application on the chained list is looked for out in Process Movement list by the corresponding identification information of program process for needing to be hidden, the process can be hidden by deleting the destination node, and not interfere with running state of a process.So after progress target process is hidden, the process of destination application will be invisible in task manager, even if when restarting the destination application, its process still remains hidden invisible, the security of privacy of user is substantially increased, and implementation process is simple and convenient.
Description
Technical field
It is more particularly to a kind of to be used for what computer application program process was hidden the present invention relates to field of computer technology
Method and system.
Background technology
With science and technology and expanding economy, computer has become work indispensable in people's live and work
Tool.
The server of home computer or company's unit etc. can be provided with a variety of application programs, wherein in many application programs
It is related to individual privacy information or secret and safe of user etc..For example, the application program such as webpage is anti-tamper, although can pass through
Service starts, but program process still can be shown in task manager.For security consideration, many users are not intended to these
Application program is discovered by other people to be in running status.
Therefore, hiding for application program in computer how is realized, is this to improve user privacy and secret and safe
The current technical issues that need to address of art personnel.
The content of the invention
It is an object of the invention to provide a kind of method and system hidden for computer application program process, Ke Yishi
Application program is hiding in existing computer, to improve user privacy and secret and safe.
In order to solve the above technical problems, the invention provides following technical scheme:
A kind of method hidden for computer application program process, including:
Obtain the identification information of destination application;
The corresponding target of process that the destination application is obtained in Process Movement chained list according to the identification information
Node;
The destination node is deleted, to hide the process of the destination application.
Preferably, the identification information for obtaining destination application, including:
The operation of user is responded by the input equipment of computer, the literary information of symbol of user's input is obtained;
The literary information of the symbol is identified, the identification information of corresponding destination application is parsed.
Preferably, it is described that the literary information of the symbol is identified, the identification information of corresponding destination application is parsed,
Including:
The literary information of the symbol is identified, corresponding process name is parsed;
The process name and destination application are matched.
Preferably, the process for obtaining the destination application in Process Movement chained list according to the identification information
Corresponding destination node, including:
Travel through the Process Movement chained list;
The corresponding target of process of destination application is obtained in the Process Movement chained list according to the identification information
Node.
Preferably, in addition to:
Obtain the operation system information of computer;
According to offset of the corresponding identification information of the operating system system matches in EPROCESS structures.
A kind of system hidden for computer application program process, including:
First acquisition module, the identification information for obtaining destination application;
Second acquisition module, for obtaining the destination application in Process Movement chained list according to the identification information
The corresponding destination node of process;
Processing module, for deleting the destination node, to hide the process of the destination application.
Preferably, first acquisition module includes:
Man-machine interaction unit, the operation of user is responded for the input equipment by computer, the symbol of user's input is obtained
Literary information;
Resolution unit, for the literary information of the symbol to be identified, parses the mark letter of corresponding destination application
Breath.
Preferably, the resolution unit includes:
Subelement is recognized, for the literary information of the symbol to be identified, corresponding process name is parsed;
Coupling subelement, for the process name and destination application to be matched.
Preferably, second acquisition module includes:
Traversal Unit, for traveling through the Process Movement chained list;
Node acquiring unit, for obtaining destination application in the Process Movement chained list according to the identification information
The corresponding destination node of process.
Preferably, in addition to:
3rd acquisition module, the operation system information for obtaining computer;
Offset processing module, for being tied according to the corresponding identification information of the operating system system matches in EPROCESS
Offset in structure body.
Compared with prior art, above-mentioned technical proposal has advantages below:
A kind of method hidden for computer application program process provided by the present invention, including:Obtaining target should
With the identification information of program;The corresponding target of process of destination application is obtained in Process Movement chained list according to identification information
Node;Delete target node, with the process of vanishing target application program.Pass through the program process correspondence for needing to be hidden
Identification information node of the process of destination application on the chained list is looked for out in Process Movement list, delete the target
Node can hide the process, and not interfere with running state of a process.So after progress target process is hidden, intended application
The process of program will be invisible in task manager, even if when restarting the destination application, its process is still protected
Hold and be hidden, substantially increase the security of privacy of user, and implementation process is simple and convenient.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention
Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis
These accompanying drawings obtain other accompanying drawings.
Fig. 1 is used for the method that computer application program process is hidden by what a kind of embodiment of the invention was provided
Flow chart;
Fig. 2 is used for the system that computer application program process is hidden by what a kind of embodiment of the invention was provided
Structural representation.
Embodiment
The core of the present invention is to provide a kind of method and system hidden for computer application program process, Ke Yishi
Application program is hiding in existing computer, to improve user privacy and secret and safe.
In order that the above objects, features and advantages of the present invention can become apparent it is understandable, below in conjunction with the accompanying drawings to this hair
Bright embodiment is described in detail.
Detail is elaborated in the following description to fully understand the present invention.But the present invention can with it is a variety of not
It is same as other manner described here to implement, those skilled in the art can do class in the case of without prejudice to intension of the present invention
Like popularization.Therefore the present invention is not limited by following public embodiment.
Fig. 1 is refer to, Fig. 1 is used for computer application program process by what a kind of embodiment of the invention was provided
Hiding method flow diagram.
A kind of embodiment of the present invention provides a kind of method hidden for computer application program process,
Including:
S11:Obtain the identification information of destination application.
In one embodiment of the invention, the identification information of destination application is obtained, including:Pass through computer
Input equipment responds the operation of user, obtains the literary information of symbol of user's input;The literary information of symbol is identified, parsed corresponding
The identification information of destination application.
Further, the literary information of symbol is identified, parses the identification information of corresponding destination application, including:
The literary information of symbol is identified, corresponding process name is parsed;Process name and destination application are matched.Such as to user
The symbol and word of input are identified, to obtain destination application process name.
In the present embodiment, when needing the process of hide application program, it is necessary to know the mark of concrete application program
Information, preferably needs to know the process name of application program in the present embodiment., can be in task after application program is by startup
The process name and process PID of itself are shown in manager.
S12:The corresponding destination node of process of destination application is obtained in Process Movement chained list according to identification information.
In one embodiment of the invention, destination application is obtained in Process Movement chained list according to identification information
The corresponding destination node of process, including:Travel through Process Movement chained list;Mesh is obtained in Process Movement chained list according to identification information
Mark the corresponding destination node of process of application program.
In kernel mode, computer system is that each process maintains an EPROCESS structure, computer system
In all process be that the both-end chained list pointed to by an ActiveProcessLinks in EPROCESS structures is connected
Get up, ActiveProcessLinks is Process Movement chained list, in this chained list, one process of each node
Comprehensive information, such as creation time, process title and process number.Purpose process is found by traveling through the chained list.I.e. such as by entering
Journey name looks for corresponding node in Process Movement list.
S13:Delete target node, with the process of vanishing target application program.
In the present embodiment, after destination node is found, the target process can be hidden by deleting the destination node, and not
The running status of target process can be influenceed.
In the present embodiment, when user operates computer, the hide application program into terminal sets boundary
Face, adds needs in the setting interface of hide application program process by input equipments such as operation keyboard or touch-screens and hides
The process name of application program, then finds the corresponding node of target process, and delete target node realizes hiding for process.
The process name to be hidden such as by computer input:Notepad.exe, then carries out process according to above-mentioned steps
Hide and set,, can entering notepad when starting task manager in process is shown when starting notepad application
Journey is hidden.
In one embodiment of the invention, this method also includes:Obtain the operation system information of computer;According to behaviour
Make service system and match offset of the corresponding identification information in EPROCESS structures.
Because the structure in Process Movement chained list node in each operating system is different, process name is in structure
Offset is also different, so in the present embodiment, corresponding offset is configured according to specific operating system, to ensure mesh
Looking for for node is marked, so that delete target node carries out hiding for process.
Fig. 2 is refer to, Fig. 2 is used for computer application program process by what a kind of embodiment of the invention was provided
Hiding system structure diagram.
Correspondingly, one embodiment of the present invention additionally provide it is a kind of for computer application program process hide be
System, including:First acquisition module 21, the identification information for obtaining destination application;Second acquisition module 22, for basis
Identification information obtains the corresponding destination node of process of destination application in Process Movement chained list;Processing module 23, is used for
Delete target node, with the process of vanishing target application program.
Further, the first acquisition module includes:Man-machine interaction unit, responds for the input equipment by computer and uses
The operation at family, obtains the literary information of symbol of user's input;Resolution unit, for the literary information of symbol to be identified, is parsed corresponding
The identification information of destination application.
Resolution unit includes:Subelement is recognized, for the literary information of symbol to be identified, corresponding process name is parsed;
With subelement, for process name and destination application to be matched.
In one embodiment of the invention, the second acquisition module includes:Traversal Unit, for traveling through Process Movement chain
Table;Node acquiring unit, the process for obtaining destination application in Process Movement chained list according to identification information is corresponding
Destination node.
In the present embodiment, when needing the process of hide application program, it is necessary to know the mark of concrete application program
Information, preferably needs to know the process name of application program in the present embodiment., can be in task after application program is by startup
The process name and process PID of itself are shown in manager.
In kernel mode, computer system is that each process maintains an EPROCESS structure, computer system
In all process be that the both-end chained list pointed to by an ActiveProcessLinks in EPROCESS structures is connected
Get up, ActiveProcessLinks is Process Movement chained list, in this chained list, one process of each node
Comprehensive information, such as creation time, process title and process number.Purpose process is found by traveling through the chained list.I.e. such as by entering
Journey name looks for corresponding node in Process Movement list.
After destination node is found, the target process can be hidden by deleting the destination node, and not interfere with target process
Running status.
In the present embodiment, when user operates computer, the hide application program into terminal sets boundary
Face, adds needs in the setting interface of hide application program process by input equipments such as operation keyboard or touch-screens and hides
The process name of application program, then finds the corresponding node of target process, and delete target node realizes hiding for process.
The process name to be hidden such as by computer input:Notepad.exe, then carries out the hiding of process according to above-mentioned steps and sets
Put, when starting notepad application, when starting task manager in process is shown, the process of notepad can be carried out
Hide.
In one embodiment of the invention, the system also includes:3rd acquisition module, the behaviour for obtaining computer
Make system information;Offset processing module, for being tied according to the corresponding identification information of operating system system matches in EPROCESS
Offset in structure body.
In summary, the method and system provided by the present invention hidden for computer application program process, passes through
The corresponding identification information of the program process being hidden is needed to look for out destination application in Process Movement list
Node of the process on the chained list, the process can be hidden by deleting the destination node, and not interfere with running state of a process.This
Sample is after progress target process is hidden, and the process of destination application will be invisible in task manager, even if again
When starting the destination application, its process still remains hidden invisible, substantially increases the security of privacy of user, and realize
Process is simple and convenient.
A kind of method and system hidden for computer application program process provided by the present invention is carried out above
It is discussed in detail.Specific case used herein is set forth to the principle and embodiment of the present invention, above example
Illustrate that being only intended to help understands the present invention and its core concept.It should be pointed out that for those skilled in the art
For, under the premise without departing from the principles of the invention, some improvement and modification can also be carried out to the present invention, these improve and repaiied
Decorations are also fallen into the protection domain of the claims in the present invention.
Claims (10)
1. a kind of method hidden for computer application program process, it is characterised in that including:
Obtain the identification information of destination application;
The corresponding destination node of process that the destination application is obtained in Process Movement chained list according to the identification information;
The destination node is deleted, to hide the process of the destination application.
2. according to the method described in claim 1, it is characterised in that the identification information for obtaining destination application, including:
The operation of user is responded by the input equipment of computer, the literary information of symbol of user's input is obtained;
The literary information of the symbol is identified, the identification information of corresponding destination application is parsed.
3. method according to claim 2, it is characterised in that described that the literary information of the symbol is identified, parse pair
The identification information for the destination application answered, including:
The literary information of the symbol is identified, corresponding process name is parsed;
The process name and destination application are matched.
4. the method according to any one of claims 1 to 3, it is characterised in that it is described according to the identification information in process
The corresponding destination node of process of the destination application is obtained in movable chained list, including:
Travel through the Process Movement chained list;
The corresponding destination node of process of destination application is obtained in the Process Movement chained list according to the identification information.
5. method according to claim 4, it is characterised in that also include:
Obtain the operation system information of computer;
According to offset of the corresponding identification information of the operating system system matches in EPROCESS structures.
6. a kind of system hidden for computer application program process, it is characterised in that including:
First acquisition module, the identification information for obtaining destination application;
Second acquisition module, for obtaining entering for the destination application in Process Movement chained list according to the identification information
The corresponding destination node of journey;
Processing module, for deleting the destination node, to hide the process of the destination application.
7. system according to claim 6, it is characterised in that first acquisition module includes:
Man-machine interaction unit, the operation of user is responded for the input equipment by computer, the Fu Wenxin of user's input is obtained
Breath;
Resolution unit, for the literary information of the symbol to be identified, parses the identification information of corresponding destination application.
8. system according to claim 7, it is characterised in that the resolution unit includes:
Subelement is recognized, for the literary information of the symbol to be identified, corresponding process name is parsed;
Coupling subelement, for the process name and destination application to be matched.
9. the system according to any one of claim 6 to 8, it is characterised in that second acquisition module includes:
Traversal Unit, for traveling through the Process Movement chained list;
Node acquiring unit, for obtaining entering for destination application in the Process Movement chained list according to the identification information
The corresponding destination node of journey.
10. system according to claim 9, it is characterised in that also include:
3rd acquisition module, the operation system information for obtaining computer;
Offset processing module, for according to the corresponding identification information of the operating system system matches in EPROCESS structures
In offset.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710174962.2A CN107066879A (en) | 2017-03-22 | 2017-03-22 | A kind of method and system hidden for computer application program process |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710174962.2A CN107066879A (en) | 2017-03-22 | 2017-03-22 | A kind of method and system hidden for computer application program process |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107066879A true CN107066879A (en) | 2017-08-18 |
Family
ID=59620111
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710174962.2A Pending CN107066879A (en) | 2017-03-22 | 2017-03-22 | A kind of method and system hidden for computer application program process |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107066879A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107885549A (en) * | 2017-11-16 | 2018-04-06 | 信阳师范学院 | Remove the method and system that process is remained in TORQUE computing cluster calculate nodes |
CN111027055A (en) * | 2019-03-19 | 2020-04-17 | 哈尔滨安天科技集团股份有限公司 | Method and device for hiding android system process and storage device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400074A (en) * | 2013-07-09 | 2013-11-20 | 青岛海信传媒网络技术有限公司 | Method and device for detecting hidden processes |
CN105184177A (en) * | 2015-08-27 | 2015-12-23 | 天脉聚源(北京)传媒科技有限公司 | Process hiding method and apparatus |
CN105207900A (en) * | 2015-10-28 | 2015-12-30 | 上海季诺金融信息服务有限公司 | Secret information transmission method based on instant messaging platform |
-
2017
- 2017-03-22 CN CN201710174962.2A patent/CN107066879A/en active Pending
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103400074A (en) * | 2013-07-09 | 2013-11-20 | 青岛海信传媒网络技术有限公司 | Method and device for detecting hidden processes |
CN105184177A (en) * | 2015-08-27 | 2015-12-23 | 天脉聚源(北京)传媒科技有限公司 | Process hiding method and apparatus |
CN105207900A (en) * | 2015-10-28 | 2015-12-30 | 上海季诺金融信息服务有限公司 | Secret information transmission method based on instant messaging platform |
Non-Patent Citations (1)
Title |
---|
夜枫: "借助双向链表隐藏进程", 《黑客防线》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107885549A (en) * | 2017-11-16 | 2018-04-06 | 信阳师范学院 | Remove the method and system that process is remained in TORQUE computing cluster calculate nodes |
CN107885549B (en) * | 2017-11-16 | 2020-10-23 | 信阳师范学院 | Method and system for clearing residual process in TORQUE computing cluster computing node |
CN111027055A (en) * | 2019-03-19 | 2020-04-17 | 哈尔滨安天科技集团股份有限公司 | Method and device for hiding android system process and storage device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104199723B (en) | Camera mapping method based on virtual equipment | |
CN103838856B (en) | A kind of information processing method and device | |
CN106656748A (en) | Information display method and device, and electronic equipment | |
CN111563015A (en) | Data monitoring method and device, computer readable medium and terminal equipment | |
US20190286672A1 (en) | Portal connected to a social backend | |
CN107066879A (en) | A kind of method and system hidden for computer application program process | |
CN104239559A (en) | Webpage opening method and device | |
CN103838375A (en) | Terminal input method and terminal | |
CN104516954A (en) | Visualized evidence obtaining and analyzing system | |
WO2017121332A1 (en) | Information sharing method and system | |
CN109783589A (en) | The method, apparatus and storage medium of electronic map parsing address | |
CN102932791A (en) | Method for collaboratively processing information through WIFI wireless network between smart phone and computer | |
JP7369229B2 (en) | How to change the skin of the mini program page, devices and electronic devices | |
CN104834848A (en) | Mobile phone fingerprint identification method and apparatus | |
MXPA05006610A (en) | System and method for name resolution. | |
WO2018145589A1 (en) | Method and device for making data carry characteristic information by data naming | |
CN108595957B (en) | Browser homepage tampering detection method, device and storage medium | |
CN105302857A (en) | Method and equipment providing contact person information | |
Chou et al. | A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting | |
CN104160389A (en) | Dynamic user interface aggregation through smart eventing with non-instantiated content | |
CN103793516B (en) | Method and device for obtaining URL icon | |
CN111200645A (en) | Service request processing method, device, equipment and readable storage medium | |
CN101677314B (en) | Method, device and system of identification of synchronous data operation | |
CN107291834A (en) | A kind of data inputting method based on code-reading, equipment and terminal | |
CN102137037A (en) | Webpage block synchronic browsing method based on community platform and system thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20170818 |