Password protection system based on hardware virtualization
A hardware virtualization and password protection technology, applied in instruments, digital data authentication, computing, etc., can solve problems such as insufficient security, inability to prevent kernel-level rootkit attacks, rootkit attacks, etc., achieving good flexibility and high security , the effect of high flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0025] The present invention will be further described in detail below in conjunction with the accompanying drawings.
[0026] The invention realizes the password protection module at the kernel layer of the operating system and at the same time realizes the kernel protection module at the virtual machine manager layer to prevent rootkit attacks, thereby realizing high security of the system. Divided from the working principle, the system can be divided into four parts: instruction interception module 1, kernel protection module 2, password protection module 3, scheduling management module 4. The structure diagram of the password protection system based on hardware virtualization is as follows: figure 1 shown. When a safe input environment is needed, the dynamic loading virtual machine manager takes over the operating system; during the protection process, the instruction interception module 1, the kernel protection module 2, the password protection module 3 and the schedulin...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com