CN107066879A - A kind of method and system hidden for computer application program process - Google Patents

A kind of method and system hidden for computer application program process Download PDF

Info

Publication number
CN107066879A
CN107066879A CN201710174962.2A CN201710174962A CN107066879A CN 107066879 A CN107066879 A CN 107066879A CN 201710174962 A CN201710174962 A CN 201710174962A CN 107066879 A CN107066879 A CN 107066879A
Authority
CN
China
Prior art keywords
identification information
destination application
destination
chained list
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710174962.2A
Other languages
Chinese (zh)
Inventor
孔凤囡
高隆林
王立建
陈森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CVIC Software Engineering Co Ltd
Original Assignee
CVIC Software Engineering Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CVIC Software Engineering Co Ltd filed Critical CVIC Software Engineering Co Ltd
Priority to CN201710174962.2A priority Critical patent/CN107066879A/en
Publication of CN107066879A publication Critical patent/CN107066879A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of method and system hidden for computer application program process, this method includes:Obtain the identification information of destination application;The corresponding destination node of process of destination application is obtained in Process Movement chained list according to identification information;Delete target node, with the process of vanishing target application program.Node of the process of destination application on the chained list is looked for out in Process Movement list by the corresponding identification information of program process for needing to be hidden, the process can be hidden by deleting the destination node, and not interfere with running state of a process.So after progress target process is hidden, the process of destination application will be invisible in task manager, even if when restarting the destination application, its process still remains hidden invisible, the security of privacy of user is substantially increased, and implementation process is simple and convenient.

Description

A kind of method and system hidden for computer application program process
Technical field
It is more particularly to a kind of to be used for what computer application program process was hidden the present invention relates to field of computer technology Method and system.
Background technology
With science and technology and expanding economy, computer has become work indispensable in people's live and work Tool.
The server of home computer or company's unit etc. can be provided with a variety of application programs, wherein in many application programs It is related to individual privacy information or secret and safe of user etc..For example, the application program such as webpage is anti-tamper, although can pass through Service starts, but program process still can be shown in task manager.For security consideration, many users are not intended to these Application program is discovered by other people to be in running status.
Therefore, hiding for application program in computer how is realized, is this to improve user privacy and secret and safe The current technical issues that need to address of art personnel.
The content of the invention
It is an object of the invention to provide a kind of method and system hidden for computer application program process, Ke Yishi Application program is hiding in existing computer, to improve user privacy and secret and safe.
In order to solve the above technical problems, the invention provides following technical scheme:
A kind of method hidden for computer application program process, including:
Obtain the identification information of destination application;
The corresponding target of process that the destination application is obtained in Process Movement chained list according to the identification information Node;
The destination node is deleted, to hide the process of the destination application.
Preferably, the identification information for obtaining destination application, including:
The operation of user is responded by the input equipment of computer, the literary information of symbol of user's input is obtained;
The literary information of the symbol is identified, the identification information of corresponding destination application is parsed.
Preferably, it is described that the literary information of the symbol is identified, the identification information of corresponding destination application is parsed, Including:
The literary information of the symbol is identified, corresponding process name is parsed;
The process name and destination application are matched.
Preferably, the process for obtaining the destination application in Process Movement chained list according to the identification information Corresponding destination node, including:
Travel through the Process Movement chained list;
The corresponding target of process of destination application is obtained in the Process Movement chained list according to the identification information Node.
Preferably, in addition to:
Obtain the operation system information of computer;
According to offset of the corresponding identification information of the operating system system matches in EPROCESS structures.
A kind of system hidden for computer application program process, including:
First acquisition module, the identification information for obtaining destination application;
Second acquisition module, for obtaining the destination application in Process Movement chained list according to the identification information The corresponding destination node of process;
Processing module, for deleting the destination node, to hide the process of the destination application.
Preferably, first acquisition module includes:
Man-machine interaction unit, the operation of user is responded for the input equipment by computer, the symbol of user's input is obtained Literary information;
Resolution unit, for the literary information of the symbol to be identified, parses the mark letter of corresponding destination application Breath.
Preferably, the resolution unit includes:
Subelement is recognized, for the literary information of the symbol to be identified, corresponding process name is parsed;
Coupling subelement, for the process name and destination application to be matched.
Preferably, second acquisition module includes:
Traversal Unit, for traveling through the Process Movement chained list;
Node acquiring unit, for obtaining destination application in the Process Movement chained list according to the identification information The corresponding destination node of process.
Preferably, in addition to:
3rd acquisition module, the operation system information for obtaining computer;
Offset processing module, for being tied according to the corresponding identification information of the operating system system matches in EPROCESS Offset in structure body.
Compared with prior art, above-mentioned technical proposal has advantages below:
A kind of method hidden for computer application program process provided by the present invention, including:Obtaining target should With the identification information of program;The corresponding target of process of destination application is obtained in Process Movement chained list according to identification information Node;Delete target node, with the process of vanishing target application program.Pass through the program process correspondence for needing to be hidden Identification information node of the process of destination application on the chained list is looked for out in Process Movement list, delete the target Node can hide the process, and not interfere with running state of a process.So after progress target process is hidden, intended application The process of program will be invisible in task manager, even if when restarting the destination application, its process is still protected Hold and be hidden, substantially increase the security of privacy of user, and implementation process is simple and convenient.
Brief description of the drawings
In order to illustrate more clearly about the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing There is the accompanying drawing used required in technology description to be briefly described, it should be apparent that, drawings in the following description are the present invention Some embodiments, for those of ordinary skill in the art, on the premise of not paying creative work, can also basis These accompanying drawings obtain other accompanying drawings.
Fig. 1 is used for the method that computer application program process is hidden by what a kind of embodiment of the invention was provided Flow chart;
Fig. 2 is used for the system that computer application program process is hidden by what a kind of embodiment of the invention was provided Structural representation.
Embodiment
The core of the present invention is to provide a kind of method and system hidden for computer application program process, Ke Yishi Application program is hiding in existing computer, to improve user privacy and secret and safe.
In order that the above objects, features and advantages of the present invention can become apparent it is understandable, below in conjunction with the accompanying drawings to this hair Bright embodiment is described in detail.
Detail is elaborated in the following description to fully understand the present invention.But the present invention can with it is a variety of not It is same as other manner described here to implement, those skilled in the art can do class in the case of without prejudice to intension of the present invention Like popularization.Therefore the present invention is not limited by following public embodiment.
Fig. 1 is refer to, Fig. 1 is used for computer application program process by what a kind of embodiment of the invention was provided Hiding method flow diagram.
A kind of embodiment of the present invention provides a kind of method hidden for computer application program process, Including:
S11:Obtain the identification information of destination application.
In one embodiment of the invention, the identification information of destination application is obtained, including:Pass through computer Input equipment responds the operation of user, obtains the literary information of symbol of user's input;The literary information of symbol is identified, parsed corresponding The identification information of destination application.
Further, the literary information of symbol is identified, parses the identification information of corresponding destination application, including: The literary information of symbol is identified, corresponding process name is parsed;Process name and destination application are matched.Such as to user The symbol and word of input are identified, to obtain destination application process name.
In the present embodiment, when needing the process of hide application program, it is necessary to know the mark of concrete application program Information, preferably needs to know the process name of application program in the present embodiment., can be in task after application program is by startup The process name and process PID of itself are shown in manager.
S12:The corresponding destination node of process of destination application is obtained in Process Movement chained list according to identification information.
In one embodiment of the invention, destination application is obtained in Process Movement chained list according to identification information The corresponding destination node of process, including:Travel through Process Movement chained list;Mesh is obtained in Process Movement chained list according to identification information Mark the corresponding destination node of process of application program.
In kernel mode, computer system is that each process maintains an EPROCESS structure, computer system In all process be that the both-end chained list pointed to by an ActiveProcessLinks in EPROCESS structures is connected Get up, ActiveProcessLinks is Process Movement chained list, in this chained list, one process of each node Comprehensive information, such as creation time, process title and process number.Purpose process is found by traveling through the chained list.I.e. such as by entering Journey name looks for corresponding node in Process Movement list.
S13:Delete target node, with the process of vanishing target application program.
In the present embodiment, after destination node is found, the target process can be hidden by deleting the destination node, and not The running status of target process can be influenceed.
In the present embodiment, when user operates computer, the hide application program into terminal sets boundary Face, adds needs in the setting interface of hide application program process by input equipments such as operation keyboard or touch-screens and hides The process name of application program, then finds the corresponding node of target process, and delete target node realizes hiding for process.
The process name to be hidden such as by computer input:Notepad.exe, then carries out process according to above-mentioned steps Hide and set,, can entering notepad when starting task manager in process is shown when starting notepad application Journey is hidden.
In one embodiment of the invention, this method also includes:Obtain the operation system information of computer;According to behaviour Make service system and match offset of the corresponding identification information in EPROCESS structures.
Because the structure in Process Movement chained list node in each operating system is different, process name is in structure Offset is also different, so in the present embodiment, corresponding offset is configured according to specific operating system, to ensure mesh Looking for for node is marked, so that delete target node carries out hiding for process.
Fig. 2 is refer to, Fig. 2 is used for computer application program process by what a kind of embodiment of the invention was provided Hiding system structure diagram.
Correspondingly, one embodiment of the present invention additionally provide it is a kind of for computer application program process hide be System, including:First acquisition module 21, the identification information for obtaining destination application;Second acquisition module 22, for basis Identification information obtains the corresponding destination node of process of destination application in Process Movement chained list;Processing module 23, is used for Delete target node, with the process of vanishing target application program.
Further, the first acquisition module includes:Man-machine interaction unit, responds for the input equipment by computer and uses The operation at family, obtains the literary information of symbol of user's input;Resolution unit, for the literary information of symbol to be identified, is parsed corresponding The identification information of destination application.
Resolution unit includes:Subelement is recognized, for the literary information of symbol to be identified, corresponding process name is parsed; With subelement, for process name and destination application to be matched.
In one embodiment of the invention, the second acquisition module includes:Traversal Unit, for traveling through Process Movement chain Table;Node acquiring unit, the process for obtaining destination application in Process Movement chained list according to identification information is corresponding Destination node.
In the present embodiment, when needing the process of hide application program, it is necessary to know the mark of concrete application program Information, preferably needs to know the process name of application program in the present embodiment., can be in task after application program is by startup The process name and process PID of itself are shown in manager.
In kernel mode, computer system is that each process maintains an EPROCESS structure, computer system In all process be that the both-end chained list pointed to by an ActiveProcessLinks in EPROCESS structures is connected Get up, ActiveProcessLinks is Process Movement chained list, in this chained list, one process of each node Comprehensive information, such as creation time, process title and process number.Purpose process is found by traveling through the chained list.I.e. such as by entering Journey name looks for corresponding node in Process Movement list.
After destination node is found, the target process can be hidden by deleting the destination node, and not interfere with target process Running status.
In the present embodiment, when user operates computer, the hide application program into terminal sets boundary Face, adds needs in the setting interface of hide application program process by input equipments such as operation keyboard or touch-screens and hides The process name of application program, then finds the corresponding node of target process, and delete target node realizes hiding for process. The process name to be hidden such as by computer input:Notepad.exe, then carries out the hiding of process according to above-mentioned steps and sets Put, when starting notepad application, when starting task manager in process is shown, the process of notepad can be carried out Hide.
In one embodiment of the invention, the system also includes:3rd acquisition module, the behaviour for obtaining computer Make system information;Offset processing module, for being tied according to the corresponding identification information of operating system system matches in EPROCESS Offset in structure body.
In summary, the method and system provided by the present invention hidden for computer application program process, passes through The corresponding identification information of the program process being hidden is needed to look for out destination application in Process Movement list Node of the process on the chained list, the process can be hidden by deleting the destination node, and not interfere with running state of a process.This Sample is after progress target process is hidden, and the process of destination application will be invisible in task manager, even if again When starting the destination application, its process still remains hidden invisible, substantially increases the security of privacy of user, and realize Process is simple and convenient.
A kind of method and system hidden for computer application program process provided by the present invention is carried out above It is discussed in detail.Specific case used herein is set forth to the principle and embodiment of the present invention, above example Illustrate that being only intended to help understands the present invention and its core concept.It should be pointed out that for those skilled in the art For, under the premise without departing from the principles of the invention, some improvement and modification can also be carried out to the present invention, these improve and repaiied Decorations are also fallen into the protection domain of the claims in the present invention.

Claims (10)

1. a kind of method hidden for computer application program process, it is characterised in that including:
Obtain the identification information of destination application;
The corresponding destination node of process that the destination application is obtained in Process Movement chained list according to the identification information;
The destination node is deleted, to hide the process of the destination application.
2. according to the method described in claim 1, it is characterised in that the identification information for obtaining destination application, including:
The operation of user is responded by the input equipment of computer, the literary information of symbol of user's input is obtained;
The literary information of the symbol is identified, the identification information of corresponding destination application is parsed.
3. method according to claim 2, it is characterised in that described that the literary information of the symbol is identified, parse pair The identification information for the destination application answered, including:
The literary information of the symbol is identified, corresponding process name is parsed;
The process name and destination application are matched.
4. the method according to any one of claims 1 to 3, it is characterised in that it is described according to the identification information in process The corresponding destination node of process of the destination application is obtained in movable chained list, including:
Travel through the Process Movement chained list;
The corresponding destination node of process of destination application is obtained in the Process Movement chained list according to the identification information.
5. method according to claim 4, it is characterised in that also include:
Obtain the operation system information of computer;
According to offset of the corresponding identification information of the operating system system matches in EPROCESS structures.
6. a kind of system hidden for computer application program process, it is characterised in that including:
First acquisition module, the identification information for obtaining destination application;
Second acquisition module, for obtaining entering for the destination application in Process Movement chained list according to the identification information The corresponding destination node of journey;
Processing module, for deleting the destination node, to hide the process of the destination application.
7. system according to claim 6, it is characterised in that first acquisition module includes:
Man-machine interaction unit, the operation of user is responded for the input equipment by computer, the Fu Wenxin of user's input is obtained Breath;
Resolution unit, for the literary information of the symbol to be identified, parses the identification information of corresponding destination application.
8. system according to claim 7, it is characterised in that the resolution unit includes:
Subelement is recognized, for the literary information of the symbol to be identified, corresponding process name is parsed;
Coupling subelement, for the process name and destination application to be matched.
9. the system according to any one of claim 6 to 8, it is characterised in that second acquisition module includes:
Traversal Unit, for traveling through the Process Movement chained list;
Node acquiring unit, for obtaining entering for destination application in the Process Movement chained list according to the identification information The corresponding destination node of journey.
10. system according to claim 9, it is characterised in that also include:
3rd acquisition module, the operation system information for obtaining computer;
Offset processing module, for according to the corresponding identification information of the operating system system matches in EPROCESS structures In offset.
CN201710174962.2A 2017-03-22 2017-03-22 A kind of method and system hidden for computer application program process Pending CN107066879A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710174962.2A CN107066879A (en) 2017-03-22 2017-03-22 A kind of method and system hidden for computer application program process

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710174962.2A CN107066879A (en) 2017-03-22 2017-03-22 A kind of method and system hidden for computer application program process

Publications (1)

Publication Number Publication Date
CN107066879A true CN107066879A (en) 2017-08-18

Family

ID=59620111

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710174962.2A Pending CN107066879A (en) 2017-03-22 2017-03-22 A kind of method and system hidden for computer application program process

Country Status (1)

Country Link
CN (1) CN107066879A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107885549A (en) * 2017-11-16 2018-04-06 信阳师范学院 Remove the method and system that process is remained in TORQUE computing cluster calculate nodes
CN111027055A (en) * 2019-03-19 2020-04-17 哈尔滨安天科技集团股份有限公司 Method and device for hiding android system process and storage device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400074A (en) * 2013-07-09 2013-11-20 青岛海信传媒网络技术有限公司 Method and device for detecting hidden processes
CN105184177A (en) * 2015-08-27 2015-12-23 天脉聚源(北京)传媒科技有限公司 Process hiding method and apparatus
CN105207900A (en) * 2015-10-28 2015-12-30 上海季诺金融信息服务有限公司 Secret information transmission method based on instant messaging platform

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400074A (en) * 2013-07-09 2013-11-20 青岛海信传媒网络技术有限公司 Method and device for detecting hidden processes
CN105184177A (en) * 2015-08-27 2015-12-23 天脉聚源(北京)传媒科技有限公司 Process hiding method and apparatus
CN105207900A (en) * 2015-10-28 2015-12-30 上海季诺金融信息服务有限公司 Secret information transmission method based on instant messaging platform

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
夜枫: "借助双向链表隐藏进程", 《黑客防线》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107885549A (en) * 2017-11-16 2018-04-06 信阳师范学院 Remove the method and system that process is remained in TORQUE computing cluster calculate nodes
CN107885549B (en) * 2017-11-16 2020-10-23 信阳师范学院 Method and system for clearing residual process in TORQUE computing cluster computing node
CN111027055A (en) * 2019-03-19 2020-04-17 哈尔滨安天科技集团股份有限公司 Method and device for hiding android system process and storage device

Similar Documents

Publication Publication Date Title
CN104199723B (en) Camera mapping method based on virtual equipment
CN103838856B (en) A kind of information processing method and device
CN106656748A (en) Information display method and device, and electronic equipment
CN111563015A (en) Data monitoring method and device, computer readable medium and terminal equipment
US20190286672A1 (en) Portal connected to a social backend
CN107066879A (en) A kind of method and system hidden for computer application program process
CN104239559A (en) Webpage opening method and device
CN103838375A (en) Terminal input method and terminal
CN104516954A (en) Visualized evidence obtaining and analyzing system
WO2017121332A1 (en) Information sharing method and system
CN109783589A (en) The method, apparatus and storage medium of electronic map parsing address
CN102932791A (en) Method for collaboratively processing information through WIFI wireless network between smart phone and computer
JP7369229B2 (en) How to change the skin of the mini program page, devices and electronic devices
CN104834848A (en) Mobile phone fingerprint identification method and apparatus
MXPA05006610A (en) System and method for name resolution.
WO2018145589A1 (en) Method and device for making data carry characteristic information by data naming
CN108595957B (en) Browser homepage tampering detection method, device and storage medium
CN105302857A (en) Method and equipment providing contact person information
Chou et al. A Webpage Data Hiding Method by Using Tag and CSS Attribute Setting
CN104160389A (en) Dynamic user interface aggregation through smart eventing with non-instantiated content
CN103793516B (en) Method and device for obtaining URL icon
CN111200645A (en) Service request processing method, device, equipment and readable storage medium
CN101677314B (en) Method, device and system of identification of synchronous data operation
CN107291834A (en) A kind of data inputting method based on code-reading, equipment and terminal
CN102137037A (en) Webpage block synchronic browsing method based on community platform and system thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170818