An application key data protection system and its protection method
A technology for key data and applications, applied in the direction of preventing unauthorized use of memory, etc., can solve problems such as many loopholes, operating system security cannot be fully trusted, and achieve the effect of protecting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0074] The present invention will be further described below in conjunction with the accompanying drawings.
[0075] like figure 1 As shown, an application key data protection system provided by the present invention includes a host process, a client operating system, computer hardware, and a key data protector. The application program to which the key data belongs is called the host process. When there is no key data When protection is required, the host process works in a normal way, using the client operating system to access computer hardware. When high-security key data protection is required, the host process contains key data KD, sends a request to the key data protector, and passes the key data The key data KD is read and written after the protector is allowed; the key data protector is the core component of this system, which provides an isolated protection environment for the key data KD, and is a lightweight virtual machine monitor that implements full-process manag...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com