Integrating security protection tools with computer device integrity and privacy policy

At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, "program") running on the computer device to monitor the activities of the program. When the monitoring program i...

Full description

Saved in:
Bibliographic Details
Main Authors BRUNDRETT PETER T, FIELD SCOTT, KURIEN THEKKTHALACKAL VARUGIS, NAGAMPALLI NARASIMHA RAO, HAMBLIN JEFFREY B
Format Patent
LanguageEnglish
Published 14.02.2012
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:At computer device power on, the operating system of the computer device initiates a monitor. The monitor assigns a monitoring program to each program and object (collectively, "program") running on the computer device to monitor the activities of the program. When the monitoring program is assigned to a program, the monitoring program is assigned an integrity and/or privacy label (collectively, "integrity label") based on predetermined criteria applied to the monitored program. The monitoring program, in turn, assigns an integrity label to the program monitored by the monitoring program. The integrity label assigned to the monitored program is less than or equal to the integrity label of the monitoring program. The monitor enforces an integrity policy of the computer device based on the integrity label assigned to monitored programs and the integrity label associated with data, another program, or a remote network resource that the monitored program is seeking to access.
Bibliography:Application Number: US20060472052