SYSTEM AND METHOD FOR PROVIDING A SECURED OPERATING SYSTEM EXECUTION ENVIRONMENT
First Claim
1. A system for launching a security architecture, comprising:
- an electronic device comprising a processor and one or more operating systems;
a security agent configured to;
execute at a level below all operating systems of the electronic device accessing a resource;
intercept a request to access the resource of the electronic device, the request originating from the operational level of one of one or more operating systems of the electronic device; and
determine if the request is indicative of malware; and
a launching module comprising;
a secured launching agent configured to launch the security agent; and
a boot manager configured to boot the secured launching agent before booting the one or more operating systems.
11 Assignments
0 Petitions
Accused Products
Abstract
In one embodiment, a system for launching a security architecture includes an electronic device comprising a processor and one or more operating systems, a security agent, and a launching module. The launching module comprises a boot manager and a secured launching agent. The boot manager is configured to boot the secured launching agent before booting the operating systems, and the secured launching agent is configured to load a security agent. The security agent is configured to execute at a level below all operating systems of the electronic device, intercept a request to access a resource of the electronic device, the request originating from the operational level of one of one or more operating systems of the electronic device, and determine if a request is indicative of malware. In some embodiments, the secured launching agent may be configured to determine whether the security agent is infected with malware prior to loading the security agent.
-
Citations
60 Claims
-
1. A system for launching a security architecture, comprising:
-
an electronic device comprising a processor and one or more operating systems; a security agent configured to; execute at a level below all operating systems of the electronic device accessing a resource; intercept a request to access the resource of the electronic device, the request originating from the operational level of one of one or more operating systems of the electronic device; and determine if the request is indicative of malware; and a launching module comprising; a secured launching agent configured to launch the security agent; and a boot manager configured to boot the secured launching agent before booting the one or more operating systems. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A method for launching a security architecture, comprising:
-
booting a secured launching agent before booting one or more operating systems of an electronic device; launching a security agent, wherein the security agent is configured to execute at a level below all of the one or more operating systems of the electronic device accessing the resource; intercepting, by the security agent, a request to access the resource of the electronic device, the request originating from the operational level of one of the one or more operating systems of the electronic device; and determining if the request is indicative of malware. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. A non-transitory computer-readable medium encoded with logic, the logic, when executed by a processor, configured to:
-
boot a secured launching agent before booting one or more operating systems of an electronic device; launch a security agent, wherein the security agent is configured to execute at a level below all of the one or more operating systems of the electronic device accessing the resource; intercept, by the security agent, a request to access the resource of the electronic device, the request originating from the operational level of one of the one or more operating systems of the electronic device; and determine if the request is indicative of malware. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60)
-
Specification