SYSTEM AND METHOD OF PROVIDING TRUSTED, SECURE, AND VERIFIABLE OPERATING ENVIRONMENT
First Claim
1. A method of providing an operating environment, comprising:
- storing and retrieving security tokens and/or security identifiers;
determining signaling, communicating with, and/or controlling said hardware;
interacting with base computing hardware being utilized by said device; and
determining whether to provide a trusted, secure, and/or verifiable operating environment by combining said hardware, said software and/or firmware, and said feature(s).
0 Assignments
0 Petitions
Accused Products
Abstract
A method and system of synergizing hardware, firmware, software, and useful feature(s) into a trusted, secure, and verifiable operating environment (TSVOE) that is critical for businesses and consumers that rely on information technology products and/or services. Such products provide various capabilities such as protecting the corporate infrastructure from attack, protecting the client from attack, designing a customizable operating schema, advanced validation of client authentication, establishing a clean environment within a dirty environment, etcetera. Moreover, by ensuring that operating environment security is achieved, a product can provide guarantees that modern state-of-the-art systems cannot. Finally, diversification of hardware, software, firmware, and features creates robust products.
-
Citations
20 Claims
-
1. A method of providing an operating environment, comprising:
-
storing and retrieving security tokens and/or security identifiers; determining signaling, communicating with, and/or controlling said hardware; interacting with base computing hardware being utilized by said device; and determining whether to provide a trusted, secure, and/or verifiable operating environment by combining said hardware, said software and/or firmware, and said feature(s).
-
-
2. A method, comprising:
-
determining a level of security for an environment relative to a processing of a request; and processing the request in the environment provided based on the level determined. - View Dependent Claims (3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A device-readable storage medium having stored therein a program for causing a computer to execute an operation, comprising:
-
determining a level of security for an environment relative to a processing of a request; and verifying the request for said processing in the environment provided based on the level determined.
-
-
18. A system, comprising:
-
a device processing a request; and a processor determining a level of security for an environment relative to the processing of the request and validating the request for said processing in an environment provided based on the level determined. - View Dependent Claims (19, 20)
-
Specification