Protected computing environment
First Claim
Patent Images
1. A method of establishing a protected environment within a computing device comprising:
- validating a kernel component loaded into a kernel of the computing device;
establishing a security state for the kernel based on the validation;
creating a secure process and loading a software component into the secure process;
periodically checking the security state of the kernel; and
notifying the secure process when the security state of the kernel has changed.
2 Assignments
0 Petitions
Accused Products
Abstract
A method of establishing a protected environment within a computing device including validating a kernel component loaded into a kernel of the computing device, establishing a security state for the kernel based on the validation, creating a secure process and loading a software component into the secure process, periodically checking the security state of the kernel, and notifying the secure process when the security state of the kernel has changed.
141 Citations
20 Claims
-
1. A method of establishing a protected environment within a computing device comprising:
-
validating a kernel component loaded into a kernel of the computing device;
establishing a security state for the kernel based on the validation;
creating a secure process and loading a software component into the secure process;
periodically checking the security state of the kernel; and
notifying the secure process when the security state of the kernel has changed. - View Dependent Claims (2, 3, 4, 5)
-
-
6. A method of loading kernel components to create a secure computing environment comprising:
-
setting a kernel secure flag to a true state;
checking to determine if a debugger is present in an operating system; and
checking to see if a debug credential associated with the debugger is present. - View Dependent Claims (7, 8, 9)
-
-
10. A method of creating a protected environment comprising:
-
creating a protected environment for loading a component;
checking the validity of a signature;
checking the validity of a certificate;
checking to see if the signature is in a revocation list;
checking to see if the certificate is in the revocation list;
checking to see that the signature is acceptable for use checking to see that a certificate is acceptable for use;
setting a kernel secure flag; and
loading the component into the protected environment. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification