Apparatus and method for providing private and shared access to host address and data spaces by guest programs in a virtual machine computer system
System for providing high security for personal computers and workstations
Efficient security kernel for the 80960 extended architecture
System for operating application software in a safety critical environment
Protected mode simulation of a real mode interupt based programming interface in a computer system
Method and system for providing event-response capabilities to pseudocode Patent #: 5628017
ApplicationNo. 10462771 filed on 06/17/2003
US Classes:726/22, MONITORING OR SCANNING OF SOFTWARE OR DATA INCLUDING ATTACK PREVENTION713/165, File protection703/20, Target device703/21, Computer or peripheral device726/30, By authorizing data718/100, TASK MANAGEMENT OR CONTROL711/164, With password or key702/119, Including program initialization (e.g., program loading) or code selection (e.g., program creation)703/22, Software program (i.e., performance prediction)717/127, Monitoring program execution713/176, Authentication by digital signature representation or digital watermark709/229, Network resources access controlling718/1, VIRTUAL MACHINE TASK OR PROCESS MANAGEMENT709/224Computer network monitoring
ExaminersPrimary: Louis-Jacques, Jacques H.
Assistant: Lipman, Jacob
Attorney, Agent or Firm
International ClassH04L 9/00
AbstractA trusted computer system that offers Linux® compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e.g., classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.