Method and equipment capable of protecting operating system from Trojan and virus attack
An operating system and virus technology, applied in the fields of instruments, digital data processing, platform integrity maintenance, etc., can solve system zero-day vulnerabilities, cannot fundamentally solve security problems, and the operating system is vulnerable to Trojan horse and virus attacks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0062] refer to figure 1 As shown; provide an operating system that can prevent being attacked by Trojan horses and viruses, the operating system is composed of two parts: the management system and the operating system; the management system is composed of hardware and software, and the software part is the management operating system, referred to as the management COS ;The operating system is composed of hardware and software, and the operating system is responsible for the running of the program; the program runs in the operating system by copying or mapping; the software part is the operating system, referred to as the running COS.
[0063] The management system has only one management COS running; the running system can have multiple running COS running at the same time, but only one running COS is running at the same time; the program has three running modes: private, trustworthy and untrusted, The program has four running states: running, suspending, resuming and ending;...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 