Personal computer internet security system
First Claim
1. An intrusion secure computer system comprising:
- a CPU;
a data storage means;
a memory means;
an operating system;
a virtual machine operating system; and
at least one I/O connection in operative communication with a data source.
4 Assignments
0 Petitions
Accused Products
Abstract
A software application installable on a personal computer protects the computer'"'"'s primary data files from being accessed by malicious code (e.g., viruses, worms and trojans) imported from an external data source, such as the Internet. A master file serves as the image from which all other software code and functions are derived. Activation of the master image file establishes a secondary operating environment (isolation bubble) in which a secondary operating system including a browser and any other desired applications are installed and run. Access permissions for communications between the computer at large (primary operating system) and the secondary operating system to prevent any access to the files on the primary operating system from any operations originating from the secondary operation system. Activation of the secondary operating system is required before any connection to the Internet (or other external data source) is enabled.
-
Citations
26 Claims
-
1. An intrusion secure computer system comprising:
-
a CPU;
a data storage means;
a memory means;
an operating system;
a virtual machine operating system; and
at least one I/O connection in operative communication with a data source. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A software application installable on a personal computer, the software protecting the computer'"'"'s primary data files from being accessed by malicious code from an external data source, the software comprising:
-
computer code for a isolated operating environment; and
computer code for a secondary operating system functional within the isolated operating environment. - View Dependent Claims (8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25)
-
-
26. A security method for protecting a personal computer from malicious code derived from an external data source comprising the steps of:
-
loading a software application installable on the personal computer, the software application for protecting the computer'"'"'s primary data files from being accessed by malicious code from an external data source;
installing the software application on the personal computer, the installed application defining a isolated operating environment including a secondary operating system, the secondary operating system functioning in conjunction with and separate from a primary operating on the computer, and the installed application defining primary operating system permission codes to limit access to a node connectable to an external data source to the isolated operating environment under control of the secondary operating system;
initiating an external data source interface session via the node within the isolated operating environment, and allocating a volatile memory space and a temporary data storage space to the secondary operating system for the duration of the session; and
establishing connectivity with the external data source via the node under control of the secondary operating system to isolate operative communication with the external data source to the isolated operating environment, and protecting the personal computer from malicious code derived from the external data source.
-
Specification