CN112800409A - Method, device and medium for bypassing login protection - Google Patents

Method, device and medium for bypassing login protection Download PDF

Info

Publication number
CN112800409A
CN112800409A CN202110023601.4A CN202110023601A CN112800409A CN 112800409 A CN112800409 A CN 112800409A CN 202110023601 A CN202110023601 A CN 202110023601A CN 112800409 A CN112800409 A CN 112800409A
Authority
CN
China
Prior art keywords
hook function
input data
bypassing
layer
login protection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110023601.4A
Other languages
Chinese (zh)
Other versions
CN112800409B (en
Inventor
甘锐
傅博
王玲敏
李广斌
彭寿林
郭月丰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Wulian Technology Co ltd
Original Assignee
Hangzhou Wulian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Wulian Technology Co ltd filed Critical Hangzhou Wulian Technology Co ltd
Priority to CN202110023601.4A priority Critical patent/CN112800409B/en
Publication of CN112800409A publication Critical patent/CN112800409A/en
Application granted granted Critical
Publication of CN112800409B publication Critical patent/CN112800409B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Automation & Control Theory (AREA)
  • Stored Programmes (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a method, a device and a medium for bypassing login protection, wherein the method comprises the steps of obtaining a global variable and a non-bottom hook function, then transmitting the global variable and the non-bottom hook function into a first API (application programming interface) to obtain a handle of the bottom hook function, storing obtained input data in a memory of a structure body corresponding to the non-bottom hook function, and simulating a message queue of the bottom hook function and the bottom hook function according to the handle of the bottom hook function and the structure body so as to send the input data to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.

Description

Method, device and medium for bypassing login protection
Technical Field
The present application relates to the field of game service technologies, and in particular, to a method, an apparatus, and a medium for bypassing login protection.
Background
With the development of network technology and cloud computing technology, a novel game mode is created: and (5) cloud games. In the cloud game mode, all game programs run on a cloud host provided by a cloud game service provider, the cloud host is responsible for rendering game pictures by using a high-performance Central Processing Unit (CPU) and a Graphics Processing Unit (GPU), and the video streaming programs compress the pictures displayed by the cloud host and then transmit the compressed pictures to a user through a network. In order to enhance the competitiveness of the own cloud game service, a game service provider usually purchases a high-performance computer as a cloud host. However, for players who do not need too high computer performance, there is redundancy in the performance of the cloud host when the cloud host is used to individually provide services for the part of users.
In recent years, in order to reduce the problem of performance redundancy, a game method is adopted in which a plurality of users are operated on a single cloud host, so that the plurality of users share hardware resources to fully exert the entire performance of the cloud host. At present, when a plurality of users log in a game on a cloud host, in order to avoid mutual interference of keyboard and mouse operation data of the plurality of users, a multi-user analog input scheme is adopted, that is, collected user input data is firstly stored in a memory, and the cloud host simulates a message queue and a rawnput queue of a non-underlying keyboard hook function through Application Program Interfaces (API) such as AllocateHidData, PostInputMessage, FreeHidData, ValidateHwnd, xxxsendtransformatemailed message timeout and posttransformatemailed message extension, and sends a simulation result to the game. However, since the game has a login protection function, whether the user inputs the password on the real keyboard is judged through the message queue and the rawInput queue of the bottom-layer keyboard hook function, and the API interfaces cannot simulate the message queue and the rawInput queue of the bottom-layer keyboard hook function, so that data simulated by the API interfaces can be judged as malicious data by the game to cause user input failure, normal login is impossible, and the experience of the user in using the cloud host is reduced.
Therefore, how to improve the experience of the user using the cloud host is a problem to be solved urgently by those skilled in the art.
Disclosure of Invention
The application aims to provide a method for bypassing login protection, so as to improve the experience of a user using a cloud host. It is an object of the present application to also provide a device and medium that bypasses login protection.
To solve the above technical problem, the present application provides a method for bypassing login protection, including:
acquiring a global variable and a non-bottom-layer hook function;
transmitting the global variable and the non-bottom-layer hook function into a first API (application programming interface) interface to obtain a handle of the bottom-layer hook function;
storing the acquired input data in a memory of a structure body corresponding to the non-bottom-layer hook function;
the handle and the fabric are passed to a second API interface for sending the input data through the second API interface upon receipt of a signal to obtain the input data.
Preferably, before the obtaining the global variable and the non-bottom-layer hook function, the method further includes:
entering a critical area;
preferably, after the transmitting the handle and the structure to the second API interface, the method further includes:
and exiting the critical region.
Preferably, before entering the critical region, the method further comprises:
judging whether the input data is valid according to the type of the non-bottom-layer hook function;
if so, entering the critical region.
Preferably, before determining whether the input data is valid according to the type of the non-bottom-layer hook function, the method further includes:
judging whether the user login box is in a protected state or not;
if yes, the step of judging whether the input data is valid according to the type of the non-bottom-layer hook function is carried out.
Preferably, the non-bottom layer hook function is specifically a non-bottom layer keyboard hook function, and the bottom layer hook function is specifically a bottom layer keyboard hook function.
Preferably, the non-underlying KEYBOARD hook function is WH _ KEYBOARD _ LL.
Preferably, the input data is specifically the input data after being subjected to streaming processing.
In order to solve the above technical problem, the present application further provides a device for bypassing login protection, including:
the first acquisition module is used for acquiring a global variable and a non-bottom-layer hook function;
the second obtaining module is used for transmitting the global variable and the non-bottom-layer hook function into a first API (application program interface) to obtain a handle of the bottom-layer hook function;
the storage module is used for storing the acquired input data in a memory of the structure body corresponding to the non-bottom-layer hook function;
a transmitting module for transmitting the handle and the structure to a second API interface so as to transmit the input data through the second API interface upon receiving a signal to acquire the input data.
In order to solve the above technical problem, the present application further provides a device for bypassing login protection, including:
a memory for storing a computer program;
a processor for implementing the steps of the method of bypassing login protection as described above when executing said computer program.
To solve the above technical problem, the present application further provides a computer-readable storage medium having a computer program stored thereon, where the computer program is executed by a processor to implement the steps of the method for bypassing login protection as described above.
According to the method for bypassing login protection, after a global variable and a non-bottom hook function are obtained, the global variable and the non-bottom hook function are transmitted into a first API (application programming interface) to obtain a handle of the bottom hook function, obtained input data are stored in a memory of a structure body corresponding to the non-bottom hook function, and a message queue of the bottom hook function are simulated according to the handle of the bottom hook function and the structure body, so that the input data are sent to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
In addition, the device and the medium for bypassing the login protection correspond to the method for bypassing the login protection, and the effect is the same as that of the method for bypassing the login protection.
Drawings
In order to more clearly illustrate the embodiments of the present application, the drawings needed for the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
Fig. 1 is a flowchart of a method for bypassing login protection according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of an apparatus for bypassing login protection according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of another apparatus for bypassing login protection according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without any creative effort belong to the protection scope of the present application.
The core of the application is to provide a method for bypassing login protection, so as to improve the experience of a user using a cloud host. The core of the application is also to provide a device and medium for bypassing login protection.
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings.
Fig. 1 is a flowchart of a method for bypassing login protection according to an embodiment of the present application. As shown in fig. 1, the method includes:
s10: and acquiring a global variable and a non-bottom-layer hook function.
In the embodiment of the application, the global variable is specifically a global variable obtained according to a win32kbase.sys program, the non-bottom hook function is specifically a function mounted by an application program and used for processing system messages, and the application program can filter all messages and events and access messages which cannot be accessed under normal conditions through the function.
It can be understood that the non-underlying hook function may include multiple types, and in a specific implementation, what type of non-underlying hook function is adopted needs to be matched according to a login manner of an application installed on the cloud host. For example, some applications log in through input data of a mouse, and then obtain global variables and non-underlying mouse hook functions.
At present, most of the login modes of the application programs are login by inputting an account and a password through a keyboard, so as to be a preferred embodiment, the non-bottom layer hook function is specifically a non-bottom layer keyboard hook function. Due to the fact that the non-bottom-layer keyboard hook function is obtained, the login method of most application programs of the cloud host can be met, the disorder and the misuse of the non-bottom-layer hook function are avoided, and the use experience of a user is further improved.
S11: and transmitting the global variable and the non-bottom hook function into a first API (application programming interface) to obtain a handle of the bottom hook function.
It can be understood that after the global variable and the non-underlying hook function are obtained, the global variable and the non-underlying hook function are used as a first parameter and a second parameter to be transmitted into the first API interface, so as to obtain a handle of the underlying hook function.
Wherein, the first API interface may be a PhkFirstValid interface.
It should be noted that, the handle of the underlying hook function can be acquired through the PhkFirstValid interface. The bottom-layer hook function is specifically a bottom-layer hook function corresponding to the type of the above non-bottom-layer hook function. For example, the above non-underlying hook function is specifically a non-underlying mouse hook function, and the obtained handle of the underlying hook function is specifically a handle of the underlying mouse hook function.
At present, most application programs log in through keyboard input accounts and passwords, so as to be a preferred embodiment, on the basis that the non-bottom layer hook function is specifically a non-bottom layer keyboard hook function, the bottom layer hook function is specifically a bottom layer keyboard hook function. Due to the fact that the bottom-layer keyboard hook function is obtained, the login method of most application programs of the cloud host can be met, misuse of the bottom-layer hook function is avoided, and the use experience of a user is further improved.
S12: and storing the acquired input data in a memory of a structural body corresponding to the non-bottom-layer hook function.
In the embodiment of the application, in order to ensure that the application program obtains the input data of the user through the bottom-layer hook function simulated by the cloud host and the message queue of the bottom-layer hook function, the problem that the application program cannot obtain the input data due to mismatching of the simulated bottom-layer hook function and the storage area for storing the input data of the user is avoided, and therefore the input data needs to be stored in the memory of the structure body corresponding to the non-bottom-layer hook function. Taking WH _ keyhoard _ LL as an example of a KEYBOARD hook function, the corresponding structure is the kbdholokstruct structure, and the input data is stored in the memory of the kbdholokstruct structure.
In order to make those skilled in the art better understand the embodiment of the present application, how the cloud host obtains the input data of the user will be described in detail below:
firstly, the terminal captures input data of a user through API (application programming interface) interfaces related to models RawInput and DX (full Duplex switched Ethernet) for capturing input data of a keyboard and a mouse, and transmits the input data to the cloud host through a network. Then, after receiving the input data, the cloud host transmits the input data to a driving layer of the cloud host through the communication interface IOCTRL, and after applying for a structural body corresponding to the non-bottom hook function, the cloud host stores the input data in a memory of the structural body so as to be used subsequently.
As a preferred embodiment, before the client transmits the input data to the cloud host, the input data may be further subjected to streaming processing, and the input data subjected to streaming processing is transmitted to the cloud host in a form of a network data packet. Due to the fact that the input data after the streaming processing is carried out, the cloud host can receive the input data without waiting for the completion of downloading, and therefore the efficiency and the speed of the cloud host for receiving the input data are improved.
S13: the handle and the fabric are passed to a second API interface for sending the input data through the second API interface upon receipt of a signal to retrieve the input data.
It should be noted that the handle and the structure containing the input data of the user are transmitted into the second API interface as the third parameter and the fourth parameter, where the second API interface may be an xxxCallHook2 interface, and the xxxCallHook2 interface may enable the cloud host to send the input data to an application installed on the cloud host, that is, the xxxCallHook2 interface may send the input data to the application hooked with the bottom-layer hook function, thereby completing the simulation of the message queues of the bottom-layer hook function and the bottom-layer hook function.
According to the method for bypassing login protection, after a global variable and a non-bottom hook function are obtained, the global variable and the non-bottom hook function are transmitted into a first API (application programming interface) to obtain a handle of the bottom hook function, the obtained input data are stored in a memory of a structure body corresponding to the non-bottom hook function, and a message queue of the bottom hook function and the bottom hook function is simulated according to the handle of the bottom hook function and the structure body, so that the input data are sent to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
On the basis of the above embodiment, before S10, the method further includes: and entering a critical area.
Further included after S13 is: exiting the critical area.
In the embodiment of the present application, the critical region may be entered through an EnterCrit interface, and the critical region may be exited through a usersessionswitchlevere interface, where the critical region is specifically a Crit region.
It can be understood that, after entering the Crit region, the global variable can be obtained in the Crit region according to the win32kbase.sys program, so as to ensure the validity of the global variable in the method for bypassing the login protection provided by the application, and avoid that the handle of the bottom-layer hook function cannot be obtained due to the invalidity of the global variable.
According to the method for bypassing login protection provided by the embodiment of the application, the API finishes entering the critical area and exiting the critical area, and the method for bypassing login protection provided by the application is finished in the critical area, so that the subsequent used data can be ensured to be present and effective, and the phenomenon of blue screen caused by access violation due to absence or invalidity of the data is avoided.
On the basis of the above embodiment, before the step of entering the critical region, the method further includes:
judging whether the input data is valid according to the type of the non-bottom-layer hook function;
if yes, entering the step of entering the critical area.
It can be understood that whether the input data is matched with the type of the non-underlying hook function is judged in advance, so that the problem that the user cannot log in an application program due to the fact that the input data of the user cannot be sent to the application program through the second API in the subsequent cloud host is avoided, and the experience of the user in using the cloud host is further improved.
On the basis of the above embodiment, before the step of determining whether the input data is valid according to the type of the non-underlying hook function, the method further includes:
and judging whether the user login box is in a protected state or not.
If yes, the step of judging whether the input data is valid according to the type of the non-bottom-layer hook function is carried out.
It will be appreciated that in the case where the user login box is not in a protected state, the API interface according to the prior art may: the system comprises an AllocateHidData interface, a PostInputMessage interface, a FreeHidData interface, a ValidateHwnd interface, a xxxSendTransformateMessameTimeout interface and a PostTransformateMessaeExtended interface, wherein a message queue and a RawInput queue of a non-bottom-layer hook function are simulated so as to facilitate logging in an application program; and under the condition that the user login box is in a protected state, logging in the application program by the method for bypassing login protection provided by the application.
The method for bypassing login protection provided by the embodiment of the application is adopted when the user login frame is in a protected state. Due to the fact that the workload of the method bypassing login protection is large, if all logins adopt the method provided by the application, the response efficiency of the application program is reduced, the response efficiency of the application program installed on the cloud host is improved, and the situation that the application program is blocked due to the reduction of the response efficiency is avoided.
On the basis of the above embodiment, the non-underlying KEYBOARD hook function is specifically WH _ keybackrd _ LL, and the corresponding structure is kbdhllokstruct.
In the embodiment of the application, because the non-bottom-layer KEYBOARD hook function specifically includes two types, namely WH _ keykeyboard and WH _ keykeyboard _ LL, and because WH _ keykeyboard can only respond to the KEYBOARD key message of a certain process, and the KEYBOARD key messages of other processes cannot respond, in specific implementation, a same user may need to log in multiple application programs.
In the above embodiments, the method for bypassing login protection is described in detail, and the present application also provides embodiments corresponding to the apparatus for bypassing login protection. It should be noted that the present application describes the embodiments of the apparatus portion from two perspectives, one from the perspective of the function module and the other from the perspective of the hardware.
Fig. 2 is a schematic structural diagram of an apparatus for bypassing login protection according to an embodiment of the present application. As shown in fig. 2, the apparatus includes, based on the angle of the function module:
the first obtaining module 10 is configured to obtain a global variable and a non-bottom-layer hook function.
And the second obtaining module 11 is configured to transmit the global variable and the non-bottom hook function to the first API interface to obtain a handle of the bottom hook function.
And the storage module 12 is configured to store the acquired input data in a memory of a structure corresponding to the non-bottom hook function.
And a transmission module 13, configured to transmit the handle and the structure to the second API interface, so as to send the input data through the second API interface when receiving the signal for acquiring the input data.
Since the embodiments of the apparatus portion and the method portion correspond to each other, please refer to the description of the embodiments of the method portion for the embodiments of the apparatus portion, which is not repeated here.
As a preferred embodiment, the method further comprises the following steps:
the first entering module is used for entering the critical area.
And the exit module is used for exiting the critical area.
Further comprising:
and the first judging module is used for judging whether the input data is valid according to the type of the non-bottom-layer hook function.
And the second entering module is used for entering the step of entering the critical area if the critical area is reached.
Further comprising:
and the second judgment module is used for judging whether the user login box is in a protected state.
And the third judging module is used for entering the step of judging whether the input data is valid according to the type of the non-bottom-layer hook function if the input data is valid.
According to the device bypassing login protection, after the global variable and the non-bottom hook function are obtained, the global variable and the non-bottom hook function are transmitted into the first API interface to obtain the handle of the bottom hook function, the obtained input data are stored in the memory of the structure body corresponding to the non-bottom hook function, and the message queues of the bottom hook function and the bottom hook function are simulated according to the handle of the bottom hook function and the structure body, so that the input data are sent to the application program through the second API interface. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
Fig. 3 is a schematic structural diagram of another apparatus for bypassing login protection according to an embodiment of the present application. As shown in fig. 3, the apparatus includes, from the perspective of the hardware configuration:
a memory 20 for storing a computer program;
a processor 21 for implementing the steps of the method for bypassing login protection as in the above embodiments when executing the computer program.
The processor 21 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 21 may be implemented in at least one hardware form of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 21 may also include a main processor and a coprocessor, where the main processor is a processor for Processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 21 may be integrated with a Graphics Processing Unit (GPU) which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 21 may further include an Artificial Intelligence (AI) processor for processing computational operations related to machine learning.
The memory 20 may include one or more computer-readable storage media, which may be non-transitory. Memory 20 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 20 is at least used for storing a computer program 201, wherein after being loaded and executed by the processor 21, the computer program can implement the relevant steps of the method for bypassing login protection disclosed in any of the foregoing embodiments. In addition, the resources stored in the memory 20 may also include an operating system 202, data 203, and the like, and the storage manner may be a transient storage manner or a permanent storage manner. Operating system 202 may include, among others, Windows, Unix, Linux, and the like. Data 203 may include, but is not limited to, data involved in bypassing methods of login protection, and the like.
In some embodiments, the means for bypassing login protection may further comprise a display screen 22, an input/output interface 23, a communication interface 24, a power supply 25, and a communication bus 26.
Those skilled in the art will appreciate that the configuration shown in FIG. 3 does not constitute a limitation on devices that bypass login protection and may include more or fewer components than those shown.
The device for bypassing login protection provided by the embodiment of the application comprises a memory and a processor, wherein when the processor executes a program stored in the memory, the following method can be realized: after acquiring the global variable and the non-bottom hook function, the global variable and the non-bottom hook function are transmitted into a first API (application programming interface) to acquire a handle of the bottom hook function, the acquired input data are stored in a memory of a structure body corresponding to the non-bottom hook function, and a message queue of the bottom hook function and the message queue of the bottom hook function are simulated according to the handle of the bottom hook function and the structure body, so that the input data are transmitted to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
Finally, the application also provides a corresponding embodiment of the computer readable storage medium. The computer-readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps as set forth in the above-mentioned method embodiments.
It is to be understood that if the method in the above embodiments is implemented in the form of software functional units and sold or used as a stand-alone product, it can be stored in a computer readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be embodied in the form of a software product, which is stored in a storage medium and executes all or part of the steps of the methods described in the embodiments of the present application, or all or part of the technical solutions. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The computer readable storage medium provided by the embodiment of the application, the medium is stored with a computer program, and when the computer program is executed by a processor, the following method can be realized: after acquiring the global variable and the non-bottom hook function, the global variable and the non-bottom hook function are transmitted into a first API (application programming interface) to acquire a handle of the bottom hook function, the acquired input data are stored in a memory of a structure body corresponding to the non-bottom hook function, and a message queue of the bottom hook function and the message queue of the bottom hook function are simulated according to the handle of the bottom hook function and the structure body, so that the input data are transmitted to an application program through a second API. When a user logs in an application program of the cloud host, the cloud host simulates a bottom layer hook function and a message queue of the bottom layer hook function according to user input data and a handle, so that the application program obtains the input data according to the simulated bottom layer hook function, and the login protection function of the application program does not need to judge whether the user inputs related data for login on a real keyboard or not through the bottom layer hook function, so that the cloud host can log in by bypassing the password box login protection of the application program, and the experience of the user in using the cloud host is improved.
The method, apparatus, and medium for bypassing login protection provided by the present application are described in detail above. The embodiments are described in a progressive manner in the specification, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
It is further noted that, in the present specification, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.

Claims (10)

1. A method of bypassing login protection, comprising:
acquiring a global variable and a non-bottom-layer hook function;
transmitting the global variable and the non-bottom-layer hook function into a first API (application programming interface) interface to obtain a handle of the bottom-layer hook function;
storing the acquired input data in a memory of a structure body corresponding to the non-bottom-layer hook function;
the handle and the fabric are passed to a second API interface for sending the input data through the second API interface upon receipt of a signal to obtain the input data.
2. The method of bypassing login protection according to claim 1, further comprising, before obtaining the global variable and the non-underlying hook function:
entering a critical area;
after the transmitting the handle and the structure to a second API interface, the method further includes:
and exiting the critical region.
3. The method of bypassing login protection of claim 2, further comprising, prior to entering the critical area:
judging whether the input data is valid according to the type of the non-bottom-layer hook function;
if so, entering the critical region.
4. The method of bypassing login protection according to claim 3, wherein before determining whether the input data is valid according to the type of the non-underlying hook function, further comprising:
judging whether the user login box is in a protected state or not;
if yes, the step of judging whether the input data is valid according to the type of the non-bottom-layer hook function is carried out.
5. The method of bypassing login protection according to any one of claims 1 to 4, wherein the non-bottom layer hook function is specifically a non-bottom layer keyboard hook function, and the bottom layer hook function is specifically a bottom layer keyboard hook function.
6. The method of bypassing login protection according to claim 5, wherein the non-underlying KEYBOARD hook function is specifically WH _ KEYBOARD _ LL.
7. The method of bypassing login protection according to claim 1, wherein the input data is specifically the input data that is streamed.
8. An apparatus for bypassing login protection, comprising:
the first acquisition module is used for acquiring a global variable and a non-bottom-layer hook function;
the second obtaining module is used for transmitting the global variable and the non-bottom-layer hook function into a first API (application program interface) to obtain a handle of the bottom-layer hook function;
the storage module is used for storing the acquired input data in a memory of the structure body corresponding to the non-bottom-layer hook function;
a transmitting module for transmitting the handle and the structure to a second API interface so as to transmit the input data through the second API interface upon receiving a signal to acquire the input data.
9. An apparatus for bypassing login protection, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the method of bypassing login protection as claimed in any one of claims 1 to 7 when executing said computer program.
10. A computer-readable storage medium, having stored thereon a computer program which, when being executed by a processor, carries out the steps of the method of bypassing login protection according to any one of claims 1 to 7.
CN202110023601.4A 2021-01-08 2021-01-08 Method, device and medium for bypassing login protection Active CN112800409B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110023601.4A CN112800409B (en) 2021-01-08 2021-01-08 Method, device and medium for bypassing login protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110023601.4A CN112800409B (en) 2021-01-08 2021-01-08 Method, device and medium for bypassing login protection

Publications (2)

Publication Number Publication Date
CN112800409A true CN112800409A (en) 2021-05-14
CN112800409B CN112800409B (en) 2023-03-24

Family

ID=75809367

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110023601.4A Active CN112800409B (en) 2021-01-08 2021-01-08 Method, device and medium for bypassing login protection

Country Status (1)

Country Link
CN (1) CN112800409B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5935251A (en) * 1997-12-22 1999-08-10 Hewlett Packard Company Method and apparatus expedited log-on to an application program
CN101114323A (en) * 2006-07-28 2008-01-30 上海山丽信息安全有限公司 Device for monitoring keyboard hook
CN102195940A (en) * 2010-03-12 2011-09-21 北京路模思科技有限公司 Virtual-machine-technology-based data security input and submission method and system
US20120089678A1 (en) * 2009-07-08 2012-04-12 Xobni Corporation Locally Hosting a Social Network Using Social Data Stored on a User's Computer
CN104573484A (en) * 2014-12-31 2015-04-29 上海动联信息技术股份有限公司 Highly safe password input box
CN106446678A (en) * 2016-09-22 2017-02-22 武汉斗鱼网络科技有限公司 Method and system for protecting network account based on handle function
US9684543B1 (en) * 2016-02-05 2017-06-20 Sas Institute Inc. Distributed data set storage, retrieval and analysis
CN106897078A (en) * 2015-12-17 2017-06-27 珠海市君天电子科技有限公司 Information obtaining method and device
US10002029B1 (en) * 2016-02-05 2018-06-19 Sas Institute Inc. Automated transfer of neural network definitions among federated areas
US20180285839A1 (en) * 2017-04-04 2018-10-04 Datient, Inc. Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network
CN109951726A (en) * 2019-03-08 2019-06-28 视联动力信息技术股份有限公司 Long-range control method and device
CN111683091A (en) * 2020-06-08 2020-09-18 平安科技(深圳)有限公司 Method, device, equipment and storage medium for accessing cloud host console
CN112149193A (en) * 2020-11-03 2020-12-29 深圳市启望科文技术有限公司 Keyboard authorization monitoring method and device, computer equipment and storage medium

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5935251A (en) * 1997-12-22 1999-08-10 Hewlett Packard Company Method and apparatus expedited log-on to an application program
CN101114323A (en) * 2006-07-28 2008-01-30 上海山丽信息安全有限公司 Device for monitoring keyboard hook
US20120089678A1 (en) * 2009-07-08 2012-04-12 Xobni Corporation Locally Hosting a Social Network Using Social Data Stored on a User's Computer
CN102195940A (en) * 2010-03-12 2011-09-21 北京路模思科技有限公司 Virtual-machine-technology-based data security input and submission method and system
CN104573484A (en) * 2014-12-31 2015-04-29 上海动联信息技术股份有限公司 Highly safe password input box
CN106897078A (en) * 2015-12-17 2017-06-27 珠海市君天电子科技有限公司 Information obtaining method and device
US9684543B1 (en) * 2016-02-05 2017-06-20 Sas Institute Inc. Distributed data set storage, retrieval and analysis
US10002029B1 (en) * 2016-02-05 2018-06-19 Sas Institute Inc. Automated transfer of neural network definitions among federated areas
CN106446678A (en) * 2016-09-22 2017-02-22 武汉斗鱼网络科技有限公司 Method and system for protecting network account based on handle function
US20180285839A1 (en) * 2017-04-04 2018-10-04 Datient, Inc. Providing data provenance, permissioning, compliance, and access control for data storage systems using an immutable ledger overlay network
CN109951726A (en) * 2019-03-08 2019-06-28 视联动力信息技术股份有限公司 Long-range control method and device
CN111683091A (en) * 2020-06-08 2020-09-18 平安科技(深圳)有限公司 Method, device, equipment and storage medium for accessing cloud host console
CN112149193A (en) * 2020-11-03 2020-12-29 深圳市启望科文技术有限公司 Keyboard authorization monitoring method and device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李晋丽等: "基于过滤驱动的安全密码框的研究与实现", 《软件》 *

Also Published As

Publication number Publication date
CN112800409B (en) 2023-03-24

Similar Documents

Publication Publication Date Title
US10162661B2 (en) Interdependent virtual machine management
CN101996073B (en) Component rendering method and device
CN113595968B (en) Login method and system based on cloud application instance and related equipment
CN108854055A (en) Virtualizing graphics processing method and system based on cloud for remote display
US9021008B1 (en) Managing targeted scripts
CN113626133B (en) Virtual machine control method, device, equipment and computer readable storage medium
WO2024037110A1 (en) Data processing method and apparatus, device, and medium
CN112988400A (en) Video memory optimization method and device, electronic equipment and readable storage medium
CN110806922B (en) Script execution method, device, equipment and storage medium
CN113691602A (en) Service processing method, system, device, equipment and medium based on cloud mobile phone
CN105357239A (en) Method and device for providing service, and method and device for acquiring service
Barboza et al. A simple architecture for digital games on demand using low performance resources under a cloud computing paradigm
CN112800409B (en) Method, device and medium for bypassing login protection
CN115454576B (en) Virtual machine process management method and system and electronic equipment
CN111831991A (en) Input operation detection method, device, computing equipment and medium
US20180267914A1 (en) Device interfacing
KR102168740B1 (en) Content Deployment, Scaling and Telemetry
CN111245810B (en) Method, device, equipment and medium for realizing cloud host functional terminal
CN111294661B (en) Bullet screen display method and device, bullet screen server equipment and storage medium
CN112733101A (en) Cloud server management method, device, storage medium and server terminal
CN110968368B (en) Live broadcast data processing method and related equipment thereof
CN113577759A (en) Game data processing method, electronic device and storage medium
CN112084099A (en) Method, device and equipment for obtaining alarm state value based on host and storage medium
CN107982915B (en) Multi-game same-screen implementation method and device
CN112269741A (en) Application program compatibility testing method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant