Method and device for coping with illegal accesses to a data server

The secondary OS is executed on the primary OS running on a computer, and a data server is implemented in the computer by executing an application program on the secondary OS. Then, executing an illegal access coping program on the primary OS, the computer accesses the data server, judges whether a...

Full description

Saved in:
Bibliographic Details
Main Author Sasage, Taiji
Format Patent
LanguageEnglish
Published 11.09.2003
Online AccessGet full text

Cover

Loading…
More Information
Summary:The secondary OS is executed on the primary OS running on a computer, and a data server is implemented in the computer by executing an application program on the secondary OS. Then, executing an illegal access coping program on the primary OS, the computer accesses the data server, judges whether a response to the access received from the data server is normal or abnormal and obtains data stored in memory managed by the secondary OS if it is judged that the response is abnormal.