TW200928747A - Method for avoiding user account control and computer accessible storage media to store program thereof - Google Patents

Method for avoiding user account control and computer accessible storage media to store program thereof Download PDF

Info

Publication number
TW200928747A
TW200928747A TW96148684A TW96148684A TW200928747A TW 200928747 A TW200928747 A TW 200928747A TW 96148684 A TW96148684 A TW 96148684A TW 96148684 A TW96148684 A TW 96148684A TW 200928747 A TW200928747 A TW 200928747A
Authority
TW
Taiwan
Prior art keywords
program
user account
application
account control
service
Prior art date
Application number
TW96148684A
Other languages
Chinese (zh)
Inventor
Yi-Lung Lee
Original Assignee
Inventec Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inventec Corp filed Critical Inventec Corp
Priority to TW96148684A priority Critical patent/TW200928747A/en
Publication of TW200928747A publication Critical patent/TW200928747A/en

Links

Landscapes

  • Stored Programmes (AREA)

Abstract

A method for avoiding user account control (UAC) is provided. A service program (SP) is provided in a system. A UAC Authorization Prompt UI is appeared only when the SP is installed into the system. An application program (AP) will not transmit an operating command to the function program (FP), but transmit request information to the SP in accordance with the protocol of the system when the AP proceeds an operation needed the Administrator's authority. The SP transmits the operating command for the FP in accordance with the request information. In the UAC mode, transmitting the request information to the FP from the SP will not trigger the UAC. Therefore, the UAC Authorization Prompt UI is not appeared.

Description

200928747 L/J87twf.doc/n 九、發明說明: 【發明所屬之技術領域】 本發明是有關於一種電腦軟體,且特別是有關於一種 避開作業系統中使用者帳戶控制(User Account Control UAC)之方法。 ’ 【先前技術】 Ο 為了資訊安全的考量’作業系統可能會設立各種安全 機制。例如,微軟⑽cro讀)公司所發行的Vista視窗 2系統便為了安全性的理由,設置了使用者帳戶控制的 使用者帳戶控制是·的狀態下,所有需要管理 皆會出現詢問視窗以便_吏用 例如’圏1是說明傳統「使用者帳戶 來二—般而言’使用者會藉由執行應用程式 來凡成某些特疋作業(步驟su ❹ 程中,系統的「使用者a應用程式的執仃過 每一個動作(步1」糊錄查細程式的 此應用㈣執行的動作^右,S13G的判斷結果為’ S140以繼續執行應用程式限’則進行步驟 此應用程式執行_作是騎結果為’ 系統設定、安裝軟體、關閉‘;的?業(如更改 控制」機制會被鋪路彳疋裝置等)’使用者帳戶 用者確句、/俨權/ μ 現詢問視窗(步驟S150)以供使 此詢問規窗出現的時候,使_法: 仃任_作’直到制者回應__、。使_法進 5 200928747200928747 L/J87twf.doc/n IX. Description of the Invention: [Technical Field] The present invention relates to a computer software, and in particular to a user account control (UAC) in a avoidance operating system The method. ’ [Prior Art] Ο For information security considerations, the operating system may have various security mechanisms. For example, Microsoft (10)cro read) the Vista Windows 2 system issued by the company for the sake of security, set the user account control user account control is in the state, all need to manage will appear in the query window for _ use For example, '圏1 is a description of the traditional "user account to the second general" user will perform some special tasks by executing the application (in step su, the system "user a application" Execute each action (step 1) paste this program (4) the action executed ^ right, S13G judgment result is 'S140 to continue to execute the application limit' then step the application execution _ is riding The result is 'system setting, installation software, shutdown'; the business (such as the change control mechanism) will be paved, etc.) 'user account user confirmation sentence, /俨 right / μ current inquiry window (step S150) In order to make this inquiry window appear, make _ method: 仃 _ _ ' until the producer responds __,. _ fafa 5 200928747

"U〇V/. J ^^87twf.doc/n 於步驟s_巾’使用者可以透過此詢問視窗選 權(進行步驟襲以繼續執行應用程式),或選擇 進仃步驟S170以停止執行應用程式) 驟SHO,則此應難式會去完絲述特定作^擇進仃步 雖然「使用者帳戶控制」可有效杜絕一些 ^同,也增強了祕安全性,但仍造成使用者許多不^的 =有些使用者在不堪其擾的情況之下,便會去_「使 =戶控制」功能。然:而’不分青紅皂白地關閉「使用 控制」功能,往往造成安全性的問題。 【發明内容】 為解決上制題’本發明提出—種·使用者帳户控 中CGntlOl,UAC)之方法。首先於作業‘ Ιϊί 此作業系統具有使用者帳戶控制 ,制’且該服務程式具有作㈣統之管理者權限。應 t傳^求資訊給服務程式。依據需求資訊,服務程 發出#作指令給功能程式。 ,發明另提供—種電腦可讀取畴職,用 腦程式。該電腦程式用以載人至電腦系統中並且使得= 私糸統執行上述避開使用者帳戶控制之方法。 月只f在安裝服務程式至系統時會出現「使用者 “i要==視窗(認註畫面)。當應用程式欲進行 々的作業時’此應用程式是依據系統内 &傳送需*資訊給前述服務程式。依據上述需 、貝5 ’服務程式將代替應用程式傳送操作指令給功能程 200928747 ^387twf.doc/n 式。因此,服務程式傳送操作指令仏 ;::r控制」,會 ,較佳實施例,並配合所二J點;下:文特 【實施方式】 广 所屬領域之技術人員可以參照以下實施例來 ^當下述實施例亦可以電腦程式的形式實現之,並 JI用電腦可讀取儲存媒體儲存此—電腦程式,關電腦 行避開使用者帳戶控制之方法。 鲁 *本實施例將以微軟(Microsoft)公司所發行的Vi伽 視窗作業系統為應用範例。%叫見窗作業系統為了安全性 的理由,設置了「使用者帳戶控制」的機制。在「使用者 ^戶控制」是開啟的狀態下’所有需要管理者權限執行的 程式/操作,冑會丨現詢問視窗以便詢問使时是否要繼續 執行。為了避免頻繁地觸發「使用者帳戶控制」機制,又 希望不要關閉「使用者帳戶控制」的安全保護機制,本實 施例將以圖2說明其技術手段。 圖2是依照本發明實施例說明一種避開「使用者帳戶 控制」之方法。此方法在Vista視窗作業系統的環境中建 立/提供一個服務程式(步驟S210),且該服務程式具有 Vlsta視窗作業系統之管理者權限。在此服務程式安裝至系 統時會出現「使用者帳戶控制」詢問視窗(認証晝面)。 7 200928747 V t VOX/ / . X ττ ^-v-/ 87twf.doc/n 由於此服務程式可以在產品售出前便事先由廠商預先安裝 至產品系統中,因此使用者並不會遭遇前述詢問視窗。 本實施例中將有關需要管理者權限的作業/功能(如更 改系統設定、安裝軟體、或關閉特定裝置等)從應用程式 中分離出來,成為「功能程式」。此功能程式可以任何方 式實現之,其可能的實施樣態包含「動態鏈結程式庫」 (Dynamic Lmk Library, DLL)。當此應用程式欲進行某 個需要管理者權限的作業時,此應用程式並不會傳送操i乍 指令給功能程式,而是依據系統内定之通訊協定傳送需求 資訊給前述服務程式(步驟S22〇)。依據上述需求資訊, 服務程式將代替應用程式發出操作指令給功 S230)。在⑽視窗作業系統的「使用者帳 式下,具有管理者權限之服務程式傳送操作指令給功能程 式,其並不會觸發「使用者帳戶控制」。因此,便不會出 現「使用者帳戶控制」詢問視窗。 本發明之實施方式並不限於上述實施例之說明。圖3 ❹ {依照本發明實施舰明各程式之_信息流。圖4是依 照本發明實施例說明另一種避開「使用者帳戶控制」之方 法。其中’圖4部分内容可以參照圖2之相關說^實施之, 故相同的部分便不在此贅述。 請同時參照圖3與圖4,步驟S210提供了服務程式 330。一般而言,使用者會藉由執行應用程式3仞來完成某 些特定作業(步驟剛)。在應用程式31〇的執行過程厂 系統的「使用者帳戶控制」機制會檢查應用程式3ι〇的每 8 200928747 87twf.d〇c/n 個動作(步驟S42〇)。本實施例中已經將有關需要管理 者,限的作業/功能(如更改系統設定、安裝軟體、或關閉 特定裝置等)從應用程式310中分離出來,成為「功能程 式」340。因此,步驟S43〇的判斷結果為,此應用程式31〇 執行的動作不需要管理者權限,於是進行步驟S220以繼 續執行應用程式。 ^ ,步驟S220中,此應用程式310依據系統内定之通 Ο 訊協定傳送需求資訊給服務程式330。在此,步驟S220可 以包括.建立具名管道(Named Pipe) 320於應用程式310 與服務程式330之間;以及透過具名管道32〇將需求資訊 傳送給服務程式33〇。上述「需求資訊」可能包含功能程 式340的路徑、輪出功能名稱(Export Function Name )、 及/或功旎參數(Argument for func)等。另外,應用程式 31〇與服務程式33〇之間的通訊協定並不限於上述其亦 可以用domain socket、memory mapping等方式實施之。 接下來進行步驟S23〇 ’依據上述需求資訊,服務程式 330將代替應用程式31〇發出操作指令給功能程式34〇。在 步驟S440中’功能程式34〇執行該操作指令。透過服務 程式330呼叫功能程式34〇,使得功能程式34〇被執行而 完成預定的作業/功能(如更改系統設定、安裝軟體、或關 閉特定裝置等)。在Vista視窗作業系統的「使用者帳戶 控制」模式下,具有管理者權限之服務程式330傳送操作 指令給功能程式340,其並不會觸發「使用者帳戶控制」。 因此,便不會出現「使用者帳戶控制」詢問視窗。」 9 200928747 i87twf.doc/n 你:^70成步驟S44G後,功絲式34G可能會依據該操 乍才曰々,而回傳執行結果給服務程式330 (步驟S450)。 =服務程式執行結果後,便職行絲透過 s道320回傳給該應用程式310。 、 m 综上所述,本實施例只有在安裝服務程式33〇至系 =出現「使用者帳戶控制」之詢問視窗(認証晝面)、。 ς成2後,服務程式33〇1以常駐系統中而不再需要安 j用程式31〇欲進行某個需要管理者權限的作業 、’此應轉式31G依據祕岐之軌協定傳送^"U〇V/. J ^^87twf.doc/n in step s_巾' the user can select the window through this query (to perform the step to continue executing the application), or select step S170 to stop execution Application) SHO, then it should be difficult to finish the specific work. Although "user account control" can effectively eliminate some of the same, it also enhances the secret security, but still causes many users No = Some users will go to the "Enable = Home Control" function if they are uncomfortable. Of course: and the indiscriminate closure of the "use control" feature often creates security problems. SUMMARY OF THE INVENTION In order to solve the above problem, the present invention proposes a method for controlling user CGntlOl, UAC. First of all, the job ‘ Ιϊ 此 this operating system has user account control, system’ and the service program has the administrator authority of (4). The information should be sent to the service program. According to the demand information, the service program issues # instructions to the function program. The invention provides another kind of computer that can read the domain and use the brain program. The computer program is used to carry people into the computer system and causes the private system to perform the above method of avoiding user account control. In the month of the installation of the service program to the system, "user" i wants == window (review screen). When the application wants to perform a job, the application is based on the system's & transfer required information to the aforementioned service program. According to the above requirements, the Bayes 5' service program will replace the application transfer operation instructions to the function program 200928747 ^387twf.doc/n. Therefore, the service program transmits the operation command 仏;::r control", will, the preferred embodiment, and cooperate with the second point; the following: the text [embodiment] A person skilled in the art can refer to the following examples ^ The following embodiments can also be implemented in the form of a computer program, and the JI can use the computer to read the storage medium to store the computer program, and the computer line avoids the user account control method. Lu * This embodiment will use the Vi Gaming window operating system issued by Microsoft as an application example. % is called the window operating system. For the sake of security, the mechanism of "user account control" is set. In the state where "User User Control" is enabled, all programs/operations that require administrator authority to execute will be displayed in the inquiry window to ask if the execution is to be continued. In order to avoid triggering the "user account control" mechanism frequently, and also hope not to turn off the security protection mechanism of the "user account control", the embodiment of the present invention will be described with reference to FIG. 2 is a diagram illustrating a method of avoiding "user account control" in accordance with an embodiment of the present invention. This method establishes/provides a service program in the environment of the Vista window operating system (step S210), and the service program has the administrator authority of the Vlsta window operating system. The "User Account Control" inquiry window (authentication page) appears when the service program is installed on the system. 7 200928747 V t VOX/ / . X ττ ^-v-/ 87twf.doc/n Since this service program can be pre-installed into the product system by the manufacturer before the product is sold, the user will not encounter the above inquiry. Windows. In the present embodiment, a job/function (such as changing system settings, installing software, or turning off a specific device) that requires administrator authority is separated from the application and becomes a "functional program". This function can be implemented in any way, and its possible implementation includes the "Dynamic Lmk Library" (DLL). When the application wants to perform an operation requiring administrator rights, the application does not transmit the operation command to the function program, but transmits the demand information to the service program according to the system's default communication protocol (step S22〇). ). Based on the above demand information, the service program will send an operation instruction to the application S230 instead of the application. Under the "user account" of the (10) Windows operating system, the service program with administrator authority transmits an operation command to the function mode, which does not trigger "user account control". Therefore, the User Account Control inquiry window will not appear. The embodiments of the present invention are not limited to the description of the above embodiments. Figure 3 ❹ {According to the present invention, the information flow of each program of the ship is implemented. 4 is a diagram illustrating another method of avoiding "user account control" in accordance with an embodiment of the present invention. Wherein the part of FIG. 4 can be implemented with reference to the related description of FIG. 2, the same parts will not be described herein. Referring to FIG. 3 and FIG. 4 simultaneously, the service program 330 is provided in step S210. In general, the user will perform certain tasks (steps just) by executing the application. In the application process of the application program, the "user account control" mechanism checks every 8 200928747 87twf.d 〇 c / n actions of the application 3 〇 (step S42 〇). In the present embodiment, the tasks/functions (such as changing system settings, installing software, or turning off specific devices) that are required by the administrator have been separated from the application 310 into a "functional program" 340. Therefore, the result of the determination in step S43 is that the action performed by the application 31 does not require the administrator authority, and then the step S220 is performed to continue the execution of the application. In step S220, the application 310 transmits the demand information to the service program 330 according to the system-defined communication protocol. Here, step S220 can include: creating a named pipe (Named Pipe) 320 between the application 310 and the service program 330; and transmitting the demand information to the service program 33 via the named pipe 32. The above "requirements information" may include the path of the function program 340, the function name of the round function (Export Function Name), and/or the argument for the function (Argument for func). In addition, the communication protocol between the application program 31 and the service program 33 is not limited to the above, and it can also be implemented by using domain socket, memory mapping, and the like. Next, in step S23〇', based on the above demand information, the service program 330 will issue an operation command to the function program 34〇 instead of the application 31. The function program 34 executes the operation command in step S440. The function program 34 is called through the service program 330, so that the function program 34 is executed to complete a predetermined job/function (such as changing system settings, installing software, or turning off a specific device, etc.). In the "user account control" mode of the Vista window operating system, the service program 330 having the administrator authority transmits an operation command to the function program 340, which does not trigger "user account control". Therefore, the "User Account Control" inquiry window will not appear. 9 200928747 i87twf.doc/n You: ^70 After step S44G, the power line type 34G may follow the operation and return the execution result to the service program 330 (step S450). = After the service program executes the result, the job is passed back to the application 310 via the s channel 320. In summary, in this embodiment, only when the service program is installed, the inquiry window (authentication page) of "user account control" appears. After ς2, the service program 33〇1 is in the resident system and no longer needs to use the program 31. It wants to perform an operation requiring administrator authority. ‘This transfer type 31G is transmitted according to the secret agreement.

St務?式330。依據上述需求資訊,服務程式33〇 ^替應祕式31G傳送操作指令給功能程式340。由於 =式310傳送操作指令給功能程式34〇並不會觸發「使 ο 問ΪΪ」’所以不會出現「使用者帳戶控制」之詢 者帳此機ί實施例可以使曰常安全操作避開「使用 控制:干擾’又不需要去關閉「使用者帳戶 雖然本發明已以較佳實施例揭 限定本發明,任何所屬技術領域中具有通以 脫離本發伙精神和範_,# ^ 不 明之保護範圍當視後附之申請:以^ 【圖式簡單說明】 圖1是說明傳統「使用者帳戶控制」之機制。 200928747 --------- 一一387twf.doc/n 「使用者帳戶 圖2是依照本發明實施例說明一種避開 控制」之方法。 圖3是依照本發明實施例說明各程式之間的信息流。 圖4是依照本發明實施例說明另—種避開二帳 戶控制」之方法。 义 【主要元件符號說明】 31〇 :應用程式 32〇 :具名管道 330 ·服務程式 34〇 :功能程式 S110〜S170 :傳統「使用者帳戶控制」之機制 者二:法sir實施例說明—種避開「使用 用者方==實施例說明另-種避開「使St. 330. Based on the above demand information, the service program 33 transmits the operation command to the function program 340 in response to the secret mode 31G. Since the instruction 310 transfers the operation command to the function program 34, it does not trigger the "make ΪΪ"", so the user account control will not appear. This embodiment can prevent the normal security operation from being avoided. "Usage Control: Interference" does not need to be turned off "User Accounts. Although the present invention has been described in terms of a preferred embodiment, any of the technical fields in the art can be deviated from the spirit of the present invention. Scope is attached to the application: ^ [Simplified description of the schema] Figure 1 is a diagram illustrating the traditional "user account control" mechanism. 200928747 --------- One 387 twf.doc/n "User Account Figure 2 is a diagram illustrating a method of avoiding control" in accordance with an embodiment of the present invention. 3 is a diagram showing the flow of information between programs in accordance with an embodiment of the present invention. Figure 4 is a diagram illustrating another method of avoiding two account controls in accordance with an embodiment of the present invention.义 [Main component symbol description] 31〇: Application 32〇: named pipe 330 • Service program 34〇: function program S110~S170: mechanism of traditional “user account control” 2: method sir embodiment description Open "users' use == embodiment to explain another kind of avoidance"

Claims (1)

200928747 »387twf.d〇c/n 十、申請專利範蔺: &種使用者帳戶控制之方法,包括·· 使:應用Μ該服務m有管理者權限; 依據該需求;訊;程式;以及 能程式。 该服絲式發A-縣指令給一功 ❹ 方法m專概目第1項所述·制者帳戶控制之 該功能程式執行該操作指令; 務程Ϊ據ΞΓ指令,該魏程細傳—執行結果給該服 該服務程式轉該執行結果給該應用程式。 、3.如申請專利範圍第1項所述避開使用者帳戶控制之 方法’其中應用程〜式傳送需求資訊給服務程式之步驟1包括: 建立一具名管道於該應用程式與該服務程式之間;以 及 ❹ 透過該具名管道將該需求資轉送給贿務程式。 4·如申請專利範圍第i項所述賴使用者帳戶控制之 方法,其中該功能程式為一動態鏈結程式庫。 卫 5·如申請專利範圍第1項所述避開使用者帳戶控制之 方法,其中該作業系統包括哪丁八視窗作業系統。工 6.一種電腦可讀取儲存媒體,用以儲存一電腦程式, 該電腦程式用以載入至一電腦系統中並且使得該電腦I 執行如申請專利範圍第1項所述避開使用者帳戶控制^方 法。 力 12200928747 »387twf.d〇c/n X. Application for patents: & User account control methods, including: · Applying: The service has managerial authority; According to the demand; News; Program; Ability to program. The service wire type A-county order gives a credit ❹ method m special outline item 1 of the system account control of the function program to execute the operation instruction; the program according to the command, the Wei Cheng fine transmission - The execution result is sent to the application by the service program. 3. The method for avoiding user account control as described in claim 1 of the patent application, wherein the step 1 of transmitting the demand information to the service program includes: creating a named pipe for the application and the service program And ❹ transfer the demand to the bribery program through the named pipeline. 4. The method of controlling user account according to item i of the patent application scope, wherein the function program is a dynamic link library. Wei 5. The method of avoiding user account control as described in claim 1 of the scope of the patent application, wherein the operating system includes a system of eight windows. 6. A computer readable storage medium for storing a computer program for loading into a computer system and causing the computer I to perform a user account as described in claim 1 Control ^ method. Force 12
TW96148684A 2007-12-19 2007-12-19 Method for avoiding user account control and computer accessible storage media to store program thereof TW200928747A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW96148684A TW200928747A (en) 2007-12-19 2007-12-19 Method for avoiding user account control and computer accessible storage media to store program thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW96148684A TW200928747A (en) 2007-12-19 2007-12-19 Method for avoiding user account control and computer accessible storage media to store program thereof

Publications (1)

Publication Number Publication Date
TW200928747A true TW200928747A (en) 2009-07-01

Family

ID=44864196

Family Applications (1)

Application Number Title Priority Date Filing Date
TW96148684A TW200928747A (en) 2007-12-19 2007-12-19 Method for avoiding user account control and computer accessible storage media to store program thereof

Country Status (1)

Country Link
TW (1) TW200928747A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9626720B2 (en) 2013-11-25 2017-04-18 Apple Inc. Linked user accounts
US10255449B2 (en) 2014-05-30 2019-04-09 Apple Inc. Permission request

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9626720B2 (en) 2013-11-25 2017-04-18 Apple Inc. Linked user accounts
US10255449B2 (en) 2014-05-30 2019-04-09 Apple Inc. Permission request

Similar Documents

Publication Publication Date Title
KR101452572B1 (en) Information processing apparatus, information processing method, and storage medium
RU2556338C2 (en) Browser with dual scripting engine for privacy protection
JP5719244B2 (en) Method, program, and computer apparatus for constructing a safely managed virtual machine execution environment
RU2365988C2 (en) Provision for protected input into system with highly reliable program execution environment
EP2453378A2 (en) Apparatus and method for managing digital rights through hooking a kernel native API
WO2016070847A1 (en) Method for performing synchronization control through external device and apparatus thereof
TW200821930A (en) Screensaver for individual application programs
KR20150107858A (en) Key refresh between trusted units
US20220155819A1 (en) Trusted User Interface Display Method And Electronic Device
CN103488954A (en) File encryption system
US20110010710A1 (en) Image Transfer Between Processing Devices
WO2013114935A1 (en) Inhibition device, method for controlling inhibition device, device under control, electronic equipment, control program, and recording medium
TW200928747A (en) Method for avoiding user account control and computer accessible storage media to store program thereof
CN101369302A (en) Method and system for controlling access authority of information safety equipment
EP2240861A1 (en) System and method for preventing drm client crash using process separate execution
CN111158857B (en) Data encryption method, device, equipment and storage medium
US20130124872A1 (en) Method of accessing a computer hardware device in a Metro user interface mode application
JP2010097428A (en) Installation method for software
WO2015117792A1 (en) Method of and device for securely entering user credentials
CN100361078C (en) Computer system having entertainment mode capabilities
JP2007220063A (en) Usb storage device and method of controlling same
JP5972436B2 (en) Information processing apparatus, information processing method, and program
JP2005504365A (en) Method and system for maintaining safe data input / output
CN101131641A (en) User interface manager and method for reacting to a change in system status
KR102576819B1 (en) Cloud HSM system for providing financing token and security token and method thereof