CN108762826A - Process hiding method and computer readable storage medium - Google Patents

Process hiding method and computer readable storage medium Download PDF

Info

Publication number
CN108762826A
CN108762826A CN201810365246.7A CN201810365246A CN108762826A CN 108762826 A CN108762826 A CN 108762826A CN 201810365246 A CN201810365246 A CN 201810365246A CN 108762826 A CN108762826 A CN 108762826A
Authority
CN
China
Prior art keywords
list
target
program path
preset
hiding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810365246.7A
Other languages
Chinese (zh)
Other versions
CN108762826B (en
Inventor
许全聪
申强
吴少华
黄志炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meiya Pico Information Co Ltd
Original Assignee
Xiamen Meiya Pico Information Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meiya Pico Information Co Ltd filed Critical Xiamen Meiya Pico Information Co Ltd
Priority to CN201810365246.7A priority Critical patent/CN108762826B/en
Publication of CN108762826A publication Critical patent/CN108762826A/en
Application granted granted Critical
Publication of CN108762826B publication Critical patent/CN108762826B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44557Code layout in executable memory
    • G06F9/44563Sharing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files

Abstract

The invention discloses a kind of process hiding methods and computer readable storage medium, method to include:Timing obtains the process that Program path matches with preset Program path from process list, and obtains the process number of the process;When target process query procedure list, according to acquired process number filter course list, and filtered process list is returned into the target process.The present invention can simply and efficiently realize process hiding, and flexibility is high, and stability is strong, versatile.

Description

Process hiding method and computer readable storage medium
Technical field
The present invention relates to technical field of software security more particularly to a kind of process hiding method and computer-readable storage mediums Matter.
Background technology
In some software systems, some crucial processes are forced to terminate or be noticeable in order to prevent, it is necessary to right Critical processes in this software systems or whole processes are hidden protection, that is to say, that these critical processes cannot be It is queried in the tools such as task manager.Existing process hiding method emerges one after another, but these methods cannot accomplish simultaneously Effectively, flexibly and it is stable.Including the process hiding method of inner nuclear layer, such as DKOM (Direct Kernel Object Manipulation directly operates kernel objects) and SSDT HOOK (System Services Descriptor Table are The methods of service descriptor of uniting table).The also process hiding method of client layer, such as long-range DLL injections are in conjunction with API HOOK's The methods of technology and global message hook combination API HOOK.But these methods all underactions are not sufficiently stable, reason is such as Under:
1, the hidden process of the inner nuclear layers such as DKOM and SSDT HOOK is although simple and effective, still, if application layer with If inner nuclear layer does not communicate, all application layer programs can not all be detected in the program that inner nuclear layer is hidden, and can thus be made The process being hidden cannot be all checked at all client layer programs, and it may be desired to certain applications layers in practical applications Program can detect the process being hidden, therefore the hidden process underaction of these inner nuclear layers.
2, the hidden process of inner nuclear layer needs load driver, changes memory system kernel, causes system unstable Problem.It is blue caused by WIN64 systems have the limitation of KPP (protection of Kernel Patch Protection kernel patch) Screen problem.
Although 3, judging whether process needs hiding method effective according to process ID in client layer, process ID is It is generated with process initiation, causes the startup for also needing to accurate judgement process using this method to be closed, therefore this method is not It is enough flexible.
Invention content
The technical problem to be solved by the present invention is to:A kind of process hiding method and computer readable storage medium are provided, Flexibility is strong and versatility is high.
In order to solve the above-mentioned technical problem, the technical solution adopted by the present invention is:A kind of process hiding method, including:
Timing obtains the process that Program path and preset Program path match from process list, and obtain it is described into The process of journey is numbered;
When target process query procedure list, according to acquired process number filter course list, and will be after filtering Process list return to the target process.
The invention further relates to a kind of computer readable storage mediums, are stored thereon with computer program, and described program is located Reason device realizes following steps when executing:
Timing obtains the process that Program path and preset Program path match from process list, and obtain it is described into The process of journey is numbered;
When target process query procedure list, according to acquired process number filter course list, and will be after filtering Process list return to the target process.
The beneficial effects of the present invention are:According to the corresponding Program path of process come obtain needed in process list it is hiding Process, it is more flexible compared to the scheme judged according to process number;By by filtered process list return to target into Journey, it is not comprising the process list for needing hiding process, to realize process to make the process list query result of target process It hides.The present invention have the characteristics that configuration flexibly, stablize effectively, be simple and efficient, and it is versatile, can neatly apply with it is each In kind application system.
Description of the drawings
Fig. 1 is a kind of flow chart of process hiding method of the embodiment of the present invention one;
Fig. 2 is the flow chart of step S1 in the embodiment of the present invention one;
Fig. 3 is the flow chart of step S2 in the embodiment of the present invention one.
Specific implementation mode
To explain the technical content, the achieved purpose and the effect of the present invention in detail, below in conjunction with embodiment and coordinate attached Figure is explained in detail.
The design of most critical of the present invention is:Hiding process is needed to obtain according to Program path, is numbered according to process It filters out and needs hiding process in process list.
Referring to Fig. 1, a kind of process hiding method, including:
Timing obtains the process that Program path and preset Program path match from process list, and obtain it is described into The process of journey is numbered;
When target process query procedure list, according to acquired process number filter course list, and will be after filtering Process list return to the target process.
As can be seen from the above description, the beneficial effects of the present invention are:With configuration flexibly, stablize effectively, be simple and efficient, lead to With the strong feature of property.
Further, the timing obtain that Program path and preset Program path match from process list into Journey, and the process number for obtaining the process is specially:
Determine the corresponding Program path of hidden process;
Host process is serviced according to the preset time cycle, obtains process list;
Obtain the corresponding Program path of each process in the process list;
Traverse the process list;
If the corresponding Program path of process Program path corresponding with the hidden process matches, described one is obtained The process of process is numbered.
Seen from the above description, process list is traversed by using the Windows service processes of higher-rights, guaranteed Obtain the Program path of all processes other than system process.
Further, after the process number for obtaining a process, further comprise:
At the end of process list traverses, acquired process number is stored into shared drive.
Seen from the above description, shared drive relatively simple effective shared data mode between process, by by process Number is preserved to shared drive, these processes number can be obtained by making other processes also.
Further, described when target process query procedure list, it is arranged according to acquired process number filter course Table, and filtered process list is returned into the target process and is specially:
Global message hook is installed;
It, then will be in target process when detecting that the process when front opening is preset target process by global message hook It is revised as the entry address of preset process hiding function in the entry address for obtaining the api function of process list;
When target process query procedure list, by the process hiding function filter course list process number with Acquired process numbers consistent process, and filtered process list is returned to the target process.
Seen from the above description, global message hook and API HOOK are combined, can avoid repairing inner nuclear layer Change, is simple and efficient.
Further, the global message hook includes mouse information hook, Keyboard Message hook and CBT message hooks.
Seen from the above description, by installing global message hook, to monitor window events.
The present invention also proposes a kind of computer readable storage medium, is stored thereon with computer program, and described program is located Reason device realizes following steps when executing:
Timing obtains the process that Program path and preset Program path match from process list, and obtain it is described into The process of journey is numbered;
When target process query procedure list, according to acquired process number filter course list, and will be after filtering Process list return to the target process.
Further, the timing obtain that Program path and preset Program path match from process list into Journey, and the process number for obtaining the process is specially:
Determine the corresponding Program path of hidden process;
Host process is serviced according to the preset time cycle, obtains process list;
Obtain the corresponding Program path of each process in the process list;
Traverse the process list;
If the corresponding Program path of process Program path corresponding with the hidden process matches, described one is obtained The process of process is numbered.
Further, after the process number for obtaining a process, further comprise:
At the end of process list traverses, acquired process number is stored into shared drive.
Further, described when target process query procedure list, it is arranged according to acquired process number filter course Table, and filtered process list is returned into the target process and is specially:
Global message hook is installed;
It, then will be in target process when detecting that the process when front opening is preset target process by global message hook It is revised as the entry address of preset process hiding function in the entry address for obtaining the api function of process list;
When target process query procedure list, by the process hiding function filter course list process number with Acquired process numbers consistent process, and filtered process list is returned to the target process.
Further, the global message hook includes mouse information hook, Keyboard Message hook and CBT message hooks.
Embodiment one
Fig. 1 is please referred to, the embodiment of the present invention one is:A kind of process hiding method, this method are serviced based on Windows, It can apply with sensory system, include the following steps:
S1:Timing obtains the process that Program path matches with preset Program path from process list, and obtains institute State the process number of process;
S2:When target process query procedure list, according to acquired process number filter course list, and will filtering Process list afterwards returns to the target process.
That is, the present embodiment is broadly divided into two parts, first part is that service host process determines that needs are hidden Process Program path or the Program path where it.In addition, timing obtains the Program path of all processes, and road will be met The process ID of the process of diameter is preserved, and is used for process hiding in second part target program.
Specifically, as shown in Fig. 2, the S1 includes the following steps:
S101:Determine the corresponding Program path of hidden process;I.e. according to practical application scene, service host process, which determines, to be needed Program path where hiding process.Service host process can specify the complete trails of program where process come hide specify into Journey can also specify its father path to hide all processes under the path.
S102:Host process is serviced according to the preset time cycle, obtains process list;Specifically, service host process passes through Related Windows API obtain the process list comprising process ID.Preferably, the preset time cycle is 2s, i.e., often S102-S108 is thened follow the steps every 2s, needs hiding process to update.
S103:Obtain the corresponding Program path of each process in the process list;Specifically, service host process passes through correlation Windows API obtain the corresponding Program path of each process in process list.
S104:A process is obtained from the process list successively, i.e., obtained from process list it is one-dimensional be traversed into Journey.
S105:Judge the corresponding Program path of process Program path phase whether corresponding with the hidden process Match, i.e., whether includes the corresponding Program path of a process in the corresponding Program path of described hidden process, if so, executing Step S106, if it is not, thening follow the steps S107.
S106:Obtain the process number of a process;Further, the process ID of a process can be preserved to team In row.
S107:Judge whether traversal terminates, if so, S108 is thened follow the steps, if it is not, then continuing to obtain from process list Next process not being traversed executes step S104.
S108:It preserves and numbers acquired process, it is preferable that store acquired process number to shared drive In, i.e., the process ID in queue is stored into shared drive.
The second part be on the basis of first part saves the process ID of hidden process, be based on API HOOK skills Art carrys out the process list that Filtration Goal program is got, to realize hiding for process.
Specifically, as shown in figure 3, the S2 includes the following steps:
S201:Global message hook is installed;Specifically, global message hook is installed in a local computer, to monitor The window events of the local computer, such as the establishment of monitoring window, movement, destruction, change size.Preferably, the message Hook includes mouse information hook, Keyboard Message hook and CBT message hooks.
S202:Detect whether current process is target process by global message hook, i.e., in monitoring window event procedure In, judge whether open process is target process, if so, thening follow the steps S203.Wherein, target process can be preset In shared drive.
S203:By API HOOK technologies, the entry address for the api function that process list is obtained in target program is changed For the entry address of preset process hiding function, which is the function of hidden process.
S204:When target process query procedure list, then executive process hides function, specifically, in process hiding number In, it first calls the former api function for obtaining process list to obtain process list, then process is numbered and is preserved with step S108 Process number consistent process and deleted from process list, finally the process hiding function is returned, return value is filtering Process list afterwards, to realize process hiding.
Compared with prior art, the present embodiment has the characteristics that:
1, more flexibly;By judging whether process needs to hide according to the path where program process, it is possible to specify The complete trails of process hides specified process, can also specify father path to hide all processes under the path.Meanwhile it can With by global message Hook Technique specify which process cannot check critical processes (such as setting task manager be by management and control Process).
2, more stable effective;Process list is traversed by using the Windows service processes of higher-rights, guarantee can Obtain the Program path of all processes other than system process (System Idle Process and System process).
3, relatively simple efficient;It is changed by using global message hook, API HOOK technologies and share memory technology The behavior of target process, the process list that Filtration Goal process obtains.
Embodiment two
The present embodiment is a kind of computer readable storage medium of corresponding above-described embodiment, is stored thereon with computer journey Sequence realizes following steps when described program is executed by processor:
Timing obtains the process that Program path and preset Program path match from process list, and obtain it is described into The process of journey is numbered;
When target process query procedure list, according to acquired process number filter course list, and will be after filtering Process list return to the target process.
Further, the timing obtain that Program path and preset Program path match from process list into Journey, and the process number for obtaining the process is specially:
Determine the corresponding Program path of hidden process;
Host process is serviced according to the preset time cycle, obtains process list;
Obtain the corresponding Program path of each process in the process list;
Traverse the process list;
If the corresponding Program path of process Program path corresponding with the hidden process matches, described one is obtained The process of process is numbered.
Further, after the process number for obtaining a process, further comprise:
At the end of process list traverses, acquired process number is stored into shared drive.
Further, described when target process query procedure list, it is arranged according to acquired process number filter course Table, and filtered process list is returned into the target process and is specially:
Global message hook is installed;
It, then will be in target process when detecting that the process when front opening is preset target process by global message hook It is revised as the entry address of preset process hiding function in the entry address for obtaining the api function of process list;
When target process query procedure list, by the process hiding function filter course list process number with Acquired process numbers consistent process, and filtered process list is returned to the target process.
Further, the global message hook includes mouse information hook, Keyboard Message hook and CBT message hooks.
In conclusion a kind of process hiding method provided by the invention and computer readable storage medium, according to process pair The Program path answered needs hiding process to obtain in process list, cleverer compared to the scheme judged according to process number It is living;By the way that filtered process list is returned to target process, make the process list query result of target process be not comprising The process list for needing hiding process, to realize process hiding.The present invention has configuration flexible, stable effective, simple high The characteristics of effect, and versatile, can neatly apply in various application systems.
Example the above is only the implementation of the present invention is not intended to limit the scope of the invention, every to utilize this hair Equivalents made by bright specification and accompanying drawing content are applied directly or indirectly in relevant technical field, include similarly In the scope of patent protection of the present invention.

Claims (10)

1. a kind of process hiding method, which is characterized in that including:
Timing obtains the process that Program path matches with preset Program path from process list, and obtains the process Process is numbered;
When target process query procedure list, according to acquired process number filter course list, and by it is filtered into Cheng Liebiao returns to the target process.
2. process hiding method according to claim 1, which is characterized in that the timing obtains program from process list The process that path matches with preset Program path, and the process number for obtaining the process is specially:
Determine the corresponding Program path of hidden process;
Host process is serviced according to the preset time cycle, obtains process list;
Obtain the corresponding Program path of each process in the process list;
Traverse the process list;
If the corresponding Program path of process Program path corresponding with the hidden process matches, a process is obtained Process number.
3. process hiding method according to claim 2, which is characterized in that the process number for obtaining a process Later, further comprise:
At the end of process list traverses, acquired process number is stored into shared drive.
4. process hiding method according to claim 1, which is characterized in that described to work as target process query procedure list When, according to acquired process number filter course list, and filtered process list is returned into the target process and is had Body is:
Global message hook is installed;
When by global message hook detect when front opening process be preset target process, then will be obtained in target process It is revised as the entry address of preset process hiding function in the entry address of the api function of process list;
When target process query procedure list, numbers and obtained by process in the process hiding function filter course list The process taken numbers consistent process, and filtered process list is returned to the target process.
5. process hiding method according to claim 4, which is characterized in that the global message hook includes mouse information Hook, Keyboard Message hook and CBT message hooks.
6. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that described program is by processor Following steps are realized when execution:
Timing obtains the process that Program path matches with preset Program path from process list, and obtains the process Process is numbered;
When target process query procedure list, according to acquired process number filter course list, and by it is filtered into Cheng Liebiao returns to the target process.
7. computer readable storage medium according to claim 6, which is characterized in that the timing is obtained from process list The process that program fetch path matches with preset Program path, and the process number for obtaining the process is specially:
Determine the corresponding Program path of hidden process;
Host process is serviced according to the preset time cycle, obtains process list;
Obtain the corresponding Program path of each process in the process list;
Traverse the process list;
If the corresponding Program path of process Program path corresponding with the hidden process matches, a process is obtained Process number.
8. computer readable storage medium according to claim 7, which is characterized in that it is described obtain the process into After journey number, further comprise:
At the end of process list traverses, acquired process number is stored into shared drive.
9. computer readable storage medium according to claim 6, which is characterized in that described to work as target process query procedure When list, according to acquired process number filter course list, and by filtered process list return to the target into Journey is specially:
Global message hook is installed;
When by global message hook detect when front opening process be preset target process, then will be obtained in target process It is revised as the entry address of preset process hiding function in the entry address of the api function of process list;
When target process query procedure list, numbers and obtained by process in the process hiding function filter course list The process taken numbers consistent process, and filtered process list is returned to the target process.
10. computer readable storage medium according to claim 9, which is characterized in that the global message hook includes Mouse information hook, Keyboard Message hook and CBT message hooks.
CN201810365246.7A 2018-04-23 2018-04-23 Process hiding method and computer readable storage medium Active CN108762826B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810365246.7A CN108762826B (en) 2018-04-23 2018-04-23 Process hiding method and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810365246.7A CN108762826B (en) 2018-04-23 2018-04-23 Process hiding method and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108762826A true CN108762826A (en) 2018-11-06
CN108762826B CN108762826B (en) 2021-09-28

Family

ID=64011599

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810365246.7A Active CN108762826B (en) 2018-04-23 2018-04-23 Process hiding method and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108762826B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414212A (en) * 2020-03-27 2020-07-14 中国平安财产保险股份有限公司 Global process control method and device, computer equipment and storage medium

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060212945A1 (en) * 2005-03-15 2006-09-21 Donlin Patrick J Computer system with dual operating modes
US20100063967A1 (en) * 2006-03-30 2010-03-11 Microsoft Corporation Unified searching and running of files
CN102394859A (en) * 2011-07-27 2012-03-28 哈尔滨安天科技股份有限公司 Method and system for detecting file stealing Trojan based on thread behavior
CN103620613A (en) * 2011-03-28 2014-03-05 迈克菲股份有限公司 System and method for virtual machine monitor based anti-malware security
CN104331659A (en) * 2014-10-30 2015-02-04 浪潮电子信息产业股份有限公司 Design method for system resource application isolation of critical application host
CN104615484A (en) * 2015-02-13 2015-05-13 厦门市美亚柏科信息股份有限公司 Adaptive sandbox creation method and adaptive sandbox creation system
CN105117645A (en) * 2015-07-29 2015-12-02 杭州安恒信息技术有限公司 Method for operating multiple samples of sandbox virtual machine based on file system filtering drive
CN106127031A (en) * 2016-06-23 2016-11-16 北京金山安全软件有限公司 Method and device for protecting process and electronic equipment
CN106682493A (en) * 2015-11-06 2017-05-17 珠海市君天电子科技有限公司 Method and device for preventing process from being maliciously ended and electronic equipment
US20170329621A1 (en) * 2011-02-08 2017-11-16 Pegasystems Inc. Code injection and code interception in an operating system with multiple subsystem environments

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060212945A1 (en) * 2005-03-15 2006-09-21 Donlin Patrick J Computer system with dual operating modes
US20100063967A1 (en) * 2006-03-30 2010-03-11 Microsoft Corporation Unified searching and running of files
US20170329621A1 (en) * 2011-02-08 2017-11-16 Pegasystems Inc. Code injection and code interception in an operating system with multiple subsystem environments
CN103620613A (en) * 2011-03-28 2014-03-05 迈克菲股份有限公司 System and method for virtual machine monitor based anti-malware security
CN102394859A (en) * 2011-07-27 2012-03-28 哈尔滨安天科技股份有限公司 Method and system for detecting file stealing Trojan based on thread behavior
CN104331659A (en) * 2014-10-30 2015-02-04 浪潮电子信息产业股份有限公司 Design method for system resource application isolation of critical application host
CN104615484A (en) * 2015-02-13 2015-05-13 厦门市美亚柏科信息股份有限公司 Adaptive sandbox creation method and adaptive sandbox creation system
CN105117645A (en) * 2015-07-29 2015-12-02 杭州安恒信息技术有限公司 Method for operating multiple samples of sandbox virtual machine based on file system filtering drive
CN106682493A (en) * 2015-11-06 2017-05-17 珠海市君天电子科技有限公司 Method and device for preventing process from being maliciously ended and electronic equipment
CN106127031A (en) * 2016-06-23 2016-11-16 北京金山安全软件有限公司 Method and device for protecting process and electronic equipment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
余劲等: "VMSPY:一种自动化的虚拟机客户机系统函数截获和控制方案", 《计算机学报》 *
李博等: "基于VMM的操作系统隐藏对象关联检测技术", 《软件学报》 *
郑豪等: "智能终端安全策略技术浅析", 《金融电子化》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111414212A (en) * 2020-03-27 2020-07-14 中国平安财产保险股份有限公司 Global process control method and device, computer equipment and storage medium
CN111414212B (en) * 2020-03-27 2023-06-23 中国平安财产保险股份有限公司 Global process control method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN108762826B (en) 2021-09-28

Similar Documents

Publication Publication Date Title
US20150242627A1 (en) Apparatus and method for blocking actvity of malware
CA2560747A1 (en) Profile based capture component for monitoring events in applications
CN107908958B (en) SELinux security identifier anti-tampering detection method and system
US11287948B2 (en) Method for controlling the execution of a program configurable into a disabled state and enabled state
US20170192649A1 (en) System and method for preventing unintended user interface input
CN106775981B (en) Process processing method and device and computer readable medium
CN103428212A (en) Malicious code detection and defense method
CN112148163B (en) Screen recording method and device and electronic equipment
CN105893127A (en) Method for starting application and terminal device
CN106951326B (en) File unlocking method and electronic equipment
CN108762826A (en) Process hiding method and computer readable storage medium
CN107871079A (en) A kind of suspicious process detection method, device, equipment and storage medium
US20140101770A1 (en) Systems and Methods for Security Detection
CN104951247B (en) Information processing unit and storage management method
CN104601543A (en) Method and system for identifying software tampered browser home page
CN102831334A (en) Positioning method and positioning system for target address
CN103309769B (en) Os starting guard method and device
CN105701004B (en) Application testing method and device
CN103632099A (en) Underived Native API function acquiring method and device
CN105740028A (en) Access control method and device
CN104050418B (en) A kind of method and apparatus of web browser text background secure print
CN105700814A (en) Method and device for protecting application information and mobile terminal
CN102984591B (en) Carry intelligent television method for early warning and the system of operating system
CN103024537B (en) Intelligent television method for early warning and system
CN109189495B (en) A kind of method and apparatus applied in deletion backstage

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant