System and method for killing ROOTKIT
A technology of scanning and killing system files, which is applied in the field of scanning and killing ROOTKIT systems, which can solve problems such as user inconvenience, process cannot be checked, and the method of closing the system is unrealistic, achieving high security effects
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0039] The system and method for detecting and killing ROOTKIT of the present invention will be further described below in conjunction with accompanying drawings 1 to 3 .
[0040] FIG. 1 is a schematic diagram of the system structure of the ROOTKIT of the present invention.
[0041] As shown in FIG. 1 , the ROOTKIT killing system of the present invention includes: at least one guest operating system (guest OS) 1 , a service operating system 2 , and a virtual machine monitor (Virtual Machine Monitor, VMM) 3 .
[0042] Wherein, the virtual machine monitor 3 runs on a hardware platform that supports virtual computing instructions, and runs various existing operating systems (comprising the guest operating system 1 and the service operating system 2 of the present invention) on it; the service operating system 2. It runs on the virtual machine monitor 3 and includes a check module 21. The check module 21 includes a filter module 211 and a detection tool 212, wherein the filter mod...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com