Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and equipment capable of protecting operating system from Trojan and virus attack

An operating system and virus technology, applied in the fields of instruments, digital data processing, platform integrity maintenance, etc., can solve system zero-day vulnerabilities, cannot fundamentally solve security problems, and the operating system is vulnerable to Trojan horse and virus attacks.

Inactive Publication Date: 2015-04-29
梁庆生
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Traditional operating systems are vulnerable to attacks from Trojan horses and viruses. The main reason is that all programs in existing operating systems share input and output systems and memory. risk, so it is impossible to solve the security problem fundamentally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and equipment capable of protecting operating system from Trojan and virus attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0062] refer to figure 1 As shown; provide an operating system that can prevent being attacked by Trojan horses and viruses, the operating system is composed of two parts: the management system and the operating system; the management system is composed of hardware and software, and the software part is the management operating system, referred to as the management COS ;The operating system is composed of hardware and software, and the operating system is responsible for the running of the program; the program runs in the operating system by copying or mapping; the software part is the operating system, referred to as the running COS.

[0063] The management system has only one management COS running; the running system can have multiple running COS running at the same time, but only one running COS is running at the same time; the program has three running modes: private, trustworthy and untrusted, The program has four running states: running, suspending, resuming and ending;...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an operating system and equipment capable of preventing Trojan and virus attack. The operating system is composed of a management system and a running system; the management system is composed of a hardware and a software, and the software part is a management operating system which is called management COS for short; the running system is composed of a hardware and a software and responsible for the program running; a program runs in the running system through a copying or mapping mode; the software part is a running operating system which is called running COS for short. A new operating system and equipment are composed of a management system and a running system. The running system can be regarded as a traditional operating system and equipment. The new operating system and equipment allow different authorities of programs to run in different running systems, and even one running system only runs one independent program. The management system is responsible for managing each running system, and the new operating system and equipment can well solve the safety problem.

Description

technical field [0001] The present invention relates to a computer system and its equipment. Background technique [0002] Traditional operating systems are vulnerable to attacks from Trojan horses and viruses. The main reason is that all programs in existing operating systems share input and output systems and memory. risk, so it is impossible to fundamentally solve the security problem. Contents of the invention [0003] The object of the present invention is to provide an operating system and its equipment capable of preventing the attacks of Trojan horses and viruses against the above-mentioned defects of the prior art. [0004] Provide an operating system that can prevent attacks by Trojan horses and viruses. The operating system is composed of a management system and an operating system; the management system is composed of hardware and software, and the software part is a management operating system, referred to as management COS; the operating system Composed of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/51G06F21/74
CPCG06F21/57G06F21/53
Inventor 梁庆生
Owner 梁庆生