Method and device for coping with illegal accesses to a data server
The secondary OS is executed on the primary OS running on a computer, and a data server is implemented in the computer by executing an application program on the secondary OS. Then, executing an illegal access coping program on the primary OS, the computer accesses the data server, judges whether a...
Saved in:
Main Author | |
---|---|
Format | Patent |
Language | English |
Published |
05.02.2008
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The secondary OS is executed on the primary OS running on a computer, and a data server is implemented in the computer by executing an application program on the secondary OS. Then, executing an illegal access coping program on the primary OS, the computer accesses the data server, judges whether a response to the access received from the data server is normal or abnormal and obtains data stored in memory managed by the secondary OS if it is judged that the response is abnormal. |
---|---|
Bibliography: | Application Number: US20020265406 |