A security protection method for hidden operation of pre-installed software
A security protection and pre-installation technology, applied in internal/peripheral computer component protection, program/content distribution protection, etc., can solve the problems that pre-installed software and data are invisible to users, and users cannot intuitively perceive usage restrictions, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0022] figure 1 Shown is a flow chart of pre-installed software injection and hidden operation of the present invention, as figure 1 as shown, figure 2 Shown is a schematic diagram of the pre-installed software injection process, such as figure 2 as shown,
[0023] Step 1: In the factory environment host, bypass the host file system, directly call the NVMe driver, and issue NVMe private commands (private hidden area write commands);
[0024] Step 2: In the host machine in the factory environment, the master controller of the solid state disk receives and recognizes the private hidden area write command and executes it, and writes the protected file into the hidden area;
[0025] For the protected program that nee...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


