GHOST file security check method and apparatus
A security inspection and document technology, applied in computer security devices, internal/peripheral computer component protection, digital data protection, etc., can solve problems such as data insecurity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.
[0044] figure 1 It is a block diagram of the GHOST file security check method provided by the embodiment of the present invention, such as figure 1 As shown, the steps include:
[0045] Step S101: During the security check of the GHOST file in the computer, a virtual disk is set in the memory of the computer.
[0046] Step S102: Open the GHOST file, read the content of the GHOST file, and write the content of the GHOST file into the virtual disk.
[0047] Step S103: Perform a security check on the content of the GHOST file that has been written into the virtual disk, and unmount the virtual disk after completing the security check.
[0048] In this emb...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



