Systems and Methods for Enhanced Security in Wireless Communication
First Claim
1. A method of operating an End Instrument (EI) in a first security mode defined by a first security policy, comprising:
- intercepting calls to an operating system kernel;
for each call, determining whether the call is allowed under the first security policy; and
passing calls to the operating system kernel only when allowed by the first security policy.
3 Assignments
0 Petitions
Accused Products
Abstract
A communication system having a policy server coupled to a communications network for managing secure communication with and among end instruments (EI). The EI comprises a memory, and a processor coupled to the memory with processor-executable instructions, including instructions for an operating system kernel; and instructions for a protection core that monitors operations of the operating system kernel in accordance with a security policy for the EI. Security policies can intercept calls to an operating system kernel and for each call, determining whether the call is allowed under the security policy(ies). Policies are stored in a policy library and transmitted to an EI over a wireless communication network.
126 Citations
25 Claims
-
1. A method of operating an End Instrument (EI) in a first security mode defined by a first security policy, comprising:
-
intercepting calls to an operating system kernel; for each call, determining whether the call is allowed under the first security policy; and passing calls to the operating system kernel only when allowed by the first security policy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12)
-
-
13. A method of managing the security posture of a plurality of End Instruments (EIs) over a wireless communication network, comprising:
-
storing a plurality of security policies in a security policy library; and transmitting all or a portion of at least one security policy to at least one EI over the wireless communication network. - View Dependent Claims (14, 15, 16, 17)
-
-
18. A communication system, comprising:
-
a policy server coupled to a communications network; and an end instrument (EI) configured to communicate with the server over the communications network, wherein the EI comprises; a memory; and a processor coupled to the memory and configured with processor-executable instructions, including; instructions for an operating system kernel; and instructions for a protection core that monitors operations of the operating system kernel in accordance with a security policy. - View Dependent Claims (19, 20, 21, 22, 23, 24, 25)
-
Specification