Registration protection method
A registry and protection chain technology, applied in the direction of digital transmission systems, electrical components, transmission systems, etc., can solve problems such as rare, blank file protection and registry protection, NIDS cannot meet the needs, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] Such as figure 1 As shown, the registry protection system mainly includes an application program module and a driver program module. in,
[0020] The application module includes user interface, rule analysis module, driver management module and log display module. The application module is responsible for loading and running the HOOK API driver. in,
[0021] The user interface is used to display log information, call the driver management module to control the operation of the driver module, load rules, etc.;
[0022] The log display module displays the log information generated by the driver module in real time;
[0023] The rule parsing module is responsible for reading configuration information from the configuration file, and passing the parsed rule linked list to the driver module through the driver management module;
[0024] The driver management module is responsible for controlling functions such as starting, stopping, adding and deleting rules of the driv...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 