VIRTUALIZATION METHOD FOR PROTECTING COMPUTER PROGRAMS AND DATA FROM HOSTILE CODE
First Claim
1. A computer implemented method for maintaining security of a computing system, comprising directing a processor to perform the actions:
- defining a virtualized environment within the computing system;
defining a virtualized repository within storage resources of the computing system, the virtualized repository forming part of the virtualized environment;
whenever a program runs within the virtualized environment, preventing the program from interacting with any computing resources outside of the virtualized environment.whenever a program executing within the virtualized environment attempts to save a file in a designated folder, performing the following operations;
if no virtualized folder corresponding to the designated folder exists within the virtualized repository, creating a corresponding virtualized folder inside the virtualized repository, saving the file inside the virtualized folder, and creating a virtual shortcut inside the designated folder, the virtual shortcut pointing to the file inside the virtualized folder; and
,if a virtualized folder corresponding to the designated folder exists within the virtualized repository, saving the file inside the virtualized folder, and creating a virtual shortcut inside the designated folder, the virtual shortcut pointing to the file inside the virtualized folder.
3 Assignments
0 Petitions
Accused Products
Abstract
A secure computing environment that prevents malicious code from “illegitimately” interacting with programs and data residing on the computing platform. While the various embodiments restrict certain programs to operate in a virtualized environment, such operation is transparent to the user from the operational point of view. Moreover, any program operating in the virtualized environment is made to believe that it has full access to all of the computing resources. To prevent a user from unknowingly or inadvertently allowing the program to adversely affect the computer, the user is also presented with “feel” that the program is able to perform all operations in the computing environment.
79 Citations
20 Claims
-
1. A computer implemented method for maintaining security of a computing system, comprising directing a processor to perform the actions:
-
defining a virtualized environment within the computing system; defining a virtualized repository within storage resources of the computing system, the virtualized repository forming part of the virtualized environment; whenever a program runs within the virtualized environment, preventing the program from interacting with any computing resources outside of the virtualized environment. whenever a program executing within the virtualized environment attempts to save a file in a designated folder, performing the following operations; if no virtualized folder corresponding to the designated folder exists within the virtualized repository, creating a corresponding virtualized folder inside the virtualized repository, saving the file inside the virtualized folder, and creating a virtual shortcut inside the designated folder, the virtual shortcut pointing to the file inside the virtualized folder; and
,if a virtualized folder corresponding to the designated folder exists within the virtualized repository, saving the file inside the virtualized folder, and creating a virtual shortcut inside the designated folder, the virtual shortcut pointing to the file inside the virtualized folder. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
Specification