Isolation Environment-Based Information Access
First Claim
1. A method, at least partially implemented by a computing-based device, comprising:
- creating an isolation environment on the computing-based device;
isolating a program in the isolation environment; and
accessing information through the isolation environment unbeknownst to the program and/or the computing-based device.
5 Assignments
0 Petitions
Accused Products
Abstract
In an embodiment of isolation environment-based information access, programs—including operating systems and applications—running on a computing-based device can be isolated in an environment such as a virtual machine. Information including commands and/or data transmitted between the computing-based device and the program(s) being run, as well as information associated with the program(s) and the computing-based device, is accessed without being detected by the program(s). In one implementation, the information includes state information as well as commands and/or data—including sensitive information, such as usernames and passwords. In another implementation, the information can be used to secretly access the program(s).
-
Citations
20 Claims
-
1. A method, at least partially implemented by a computing-based device, comprising:
-
creating an isolation environment on the computing-based device; isolating a program in the isolation environment; and accessing information through the isolation environment unbeknownst to the program and/or the computing-based device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. One or more computer readable media comprising computer executable instructions that, when executed, direct a computing-based device to:
-
create a program isolation system and a first isolation environment; load a first operating system and at least one application in the first isolation environment; and access information associated with one or more of the first operating system, the at least one application, and the computing-based device unbeknownst to one or more of the first operating system and the at least one application. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
-
16. A computing-based device comprising:
-
hardware, including one or more processors and memory; and a program isolation module executed from memory by the processors, the program isolation module including instructions to implement a program isolation system and/or at least one isolation environment, wherein the program isolation system and/or at least one isolation environment are configured to provide access to the hardware and/or one or more programs running on the program isolation system, and/or in the at least one isolation environment, wherein the access is undetectable by the one or more programs running on the program isolation system, and/or in the at least one isolation environment. - View Dependent Claims (17, 18, 19, 20)
-
Specification