Real-Time Module Protection
First Claim
Patent Images
1. A method for securing an electronic device, comprising:
- trapping an attempt to access a secured system resource of the electronic device;
determining a module associated with the attempt, the module comprising a plurality of distinct subsections;
determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt;
based on the determination of the module and the determination of the subsection, accessing a security rule to determine whether to allow the attempted access; and
handling the attempt based on the security rule.
10 Assignments
0 Petitions
Accused Products
Abstract
Technologies for securing an electronic device include trapping an attempt to access a secured system resource of the electronic device, determining a module associated with the attempt, determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt, accessing a security rule to determine whether to allow the attempted access based on the determination of the module and the determination of the subsection, and handling the attempt based on the security rule. The module includes a plurality of distinct subsections.
-
Citations
30 Claims
-
1. A method for securing an electronic device, comprising:
-
trapping an attempt to access a secured system resource of the electronic device; determining a module associated with the attempt, the module comprising a plurality of distinct subsections; determining a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt; based on the determination of the module and the determination of the subsection, accessing a security rule to determine whether to allow the attempted access; and handling the attempt based on the security rule. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. At least one machine readable storage medium, comprising computer-executable instructions carried on the computer readable medium, the instructions readable by a processor, the instructions, when read and executed, for causing the processor to:
-
trap an attempt to access a secured system resource of an electronic device; determine a module associated with the attempt, the module comprising a plurality of distinct subsections; determine a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt; based on the determination of the module and the determination of the subsection, access a security rule to determine whether to allow the attempted access; and handle the attempt based on the security rule. - View Dependent Claims (12, 13, 14, 15, 16, 17, 18, 19, 20)
-
-
21. A system for securing an electronic device, comprising:
-
a memory; a processor; a secured system resource; and one or more security agents including instructions resident in the memory and operable for execution by the processor, wherein the security agents are configured to; trap an attempt to access the secured system resource; determine a module associated with the attempt, the module comprising a plurality of distinct subsections; determine a subsection of the module associated with the attempt, the subsection including a memory location associated with the attempt; based on the determination of the module and the determination of the subsection, access a security rule to determine whether to allow the attempted access; and handle the attempt based on the security rule. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification