Trusted computer system
First Claim
1. A trusted operating system comprising:
- an application domain, in which trusted and untrusted applications can be executed;
an operating system services layer, wherein the operating system services layer provides interfaces allowing applications written for at least one other operating system to be run in the trusted operating system, whereby the operating system services layer emulates the at least one other operating systems;
a trusted system services layer; and
, a security kernel, for enforcing system security policy and integrity rules, and for providing basic operating system services, including facilitating user and administrator actions.
8 Assignments
0 Petitions
Accused Products
Abstract
A trusted computer system that offers Linux® compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e.g., classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
79 Citations
46 Claims
-
1. A trusted operating system comprising:
-
an application domain, in which trusted and untrusted applications can be executed;
an operating system services layer, wherein the operating system services layer provides interfaces allowing applications written for at least one other operating system to be run in the trusted operating system, whereby the operating system services layer emulates the at least one other operating systems;
a trusted system services layer; and
,a security kernel, for enforcing system security policy and integrity rules, and for providing basic operating system services, including facilitating user and administrator actions. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24)
-
-
25. A trusted computer system comprising:
-
at least one processor, wherein each of the at least one processors supports a multi-domain architecture;
at least one terminal, for facilitating operation of the trusted computer system;
at least one data storage unit;
at least one memory unit; and
a secure operating system running on the trusted computing system, wherein the secure operating system utilizes the multi-domain architecture of the at least one processor to enforce process isolation. - View Dependent Claims (26, 27, 28, 29, 30)
-
-
31. A security policy enhancement system, comprising:
-
at least one processor, wherein at least one of the at least one processors implements a multi-domain architecture;
at least one Random Access Memory unit;
a secure operating system, wherein the secure operating system operates at least two different security classification levels, with data existing in each of the security classification levels; and
,at least one data security verification means, wherein the data security verification means performs security checks on the content of data to determine if the data can be transferred by the secure operating system from one classification level to another. - View Dependent Claims (32, 33, 34, 35, 36, 37, 38, 39)
-
- 40. A trusted operating system which emulates another operating system by allowing an application program written for the other operating system to execute on the trusted operating system without requiring changes to the application program.
- 42. A trusted operating system, capable of concurrently running a plurality of processes, which provides a subtype mechanism wherein the subtype mechanism allows additional access control differentiation beyond mandatory and discretionary access.
-
45. A trusted operating system wherein four separate policies are enforced whenever any process attempts to access any file system object, the policies comprising:
-
a Mandatory Security Policy;
a Mandatory Integrity Policy;
a Discretionary Access Control Policy; and
a Subtype Policy.
-
-
46. A trusted operating system which prevents a first process from learning about the existence or status of a second higher classified process by limiting the number and speed of covert storage channels.
Specification