Method and system for intercepting and capturing port data in WinNT operation system
An operating system and port technology, applied in the field of data interception, can solve the problem of high cost, achieve the effect of ensuring security and reducing cost
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0037] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention.
[0038] figure 2 It is a flowchart of a method for intercepting port data in the WinNT operating system provided by the present invention. Such as figure 2 As shown, the method includes:
[0039] Step 201: In kernel mode, create a log file corresponding to the port.
[0040] Here, unlike other operating systems, the WinNT operating system is designed using a layered design idea, that is, the operating system is divided into user mode and kernel mode. Among them, the core code of the operating system runs in the kernel mode, and these core codes can directly access physical ports, physical memory, etc., while the non-core code runs in the user mode, and these non-core codes need to request the Request, and then ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 