Network adapter management
First Claim
1. ) An operating system comprising which dynamically assigns a label to a newly-installed adapter substantially upon activation thereof, the label depending upon the attributes of said adapter, and removes said label when said adapter is deactivated.
2 Assignments
0 Petitions
Accused Products
Abstract
An operating system comprising a kernel (100) incorporating mandatory access controls as a means to counter the effects posed by application compromise. The operating system uses a technique known as “containment” to at least limit the scope of damage when security breaches occur. In a preferred embodiment, each application supported by the operating system, is assigned a tag or label, each tag or label being indicative of a logically protected computing environment or “compartment”, and applications having the same tag or label belonging to the same compartment. By default, only applications running in the same compartment can communicate with each other. Access control rules define very narrow tightly-controlled communications paths between compartments.
91 Citations
7 Claims
- 1. ) An operating system comprising which dynamically assigns a label to a newly-installed adapter substantially upon activation thereof, the label depending upon the attributes of said adapter, and removes said label when said adapter is deactivated.
Specification