System reloading based mimicry safety implementation system and method
A technology for implementing systems and methods, applied in computer security devices, instruments, calculations, etc., can solve problems such as hacker breakthroughs and severe problems, and achieve the effects of improving security and reliability, increasing the difficulty and cost of hacking attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0027] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings.
[0028] Given that the existing network devices or systems are mostly a single fixed operating system, the methods or technologies used to defend against external attacks are all defenses or vulnerability patches against known backdoors or vulnerabilities, and there is a certain lag, inactivity or vulnerability. It is called passive defense. In order to effectively solve the problems existing in the above passive defense forms, the present invention proposes a system and method for implementing system overloading based on the basic principle of irregular and non-deterministic replacement of various operating systems.
[0029] The present invention actively defends against unknown backdoors and loopholes through mimetic security. Mimicry is the phenomenon in whic...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap