×

Lattice scheduler method for reducing the impact of covert-channel countermeasures

  • US 5,574,912 A
  • Filed: 05/04/1990
  • Issued: 11/12/1996
  • Est. Priority Date: 05/04/1990
  • Status: Expired due to Term
First Claim
Patent Images

1. A machine executed method of sequentially allocating the availability of a computer system resource among a plurality of consumers to inhibit use of the resource as a covert communications channel,each said consumer having a respective class that is a member of plurality of classes organized according to a partial ordering scheme wherein a first class A is in a dominance relationship with a second class B,said method comprising the steps of:

  • (a) defining a scheduling cycle comprising a plurality of sequentially ordered time slots, each said time slot having a respective beginning time and ending time;

    (b) assigning at least one said class (designated as class X) to a said time slot (designated as time slot X);

    (c) at the beginning of said time slot X, making said resource available for use by a class-X consumer in said class X (subject to termination of said availability at the ending time of said time slot X); and

    (d) if said class-X consumer, referred to as consumer C0, gives up the resource prior to the ending time of said time slot X, then making said resource available for use by a plurality of consumers, referred to as consumers C1 through CN, where N may be any integer greater than 1, in one or more classes that dominate said class X (subject to termination of said availability at the ending time of said time slot X) in a sequence wherein the class of any consumer Ci, i being any integer from 1 to N, dominates the class of the immediately preceding consumer Ci-1 in said sequence such that consumers in classes not dominating class X are prevented from using said resource during the period after the consumer C0 gives up the resource and before the end of time slot X unless a covert-channel counter-measure is performed, thereby inhibiting the use of the resource as a covert communications channel.

View all claims
  • 3 Assignments
Timeline View
Assignment View
    ×
    ×