Personal computer internet security system
First Claim
1. A software application stored as a computer program encoded onto memory installable on a personal computer, wherein the computer program comprises executable instructions for:
- an isolated operating environment; and
a secondary operating system functional within the isolated operating environment on the personal computer,wherein primary data files of the personal computer are prevented from being accessed by malicious code from an external data source.
1 Assignment
0 Petitions
Accused Products
Abstract
A software application installable on a personal computer protects the computer'"'"'s primary data files from being accessed by malicious code (e.g., viruses, worms and trojans) imported from an external data source, such as the Internet. A master file serves as the image from which all other software code and functions are derived. Activation of the master image file establishes a secondary operating environment (isolation bubble) in which a secondary operating system including a browser and any other desired applications are installed and run. Access permissions for communications between the computer at large (primary operating system) and the secondary operating system to prevent any access to the files on the primary operating system from any operations originating from the secondary operation system. Activation of the secondary operating system is required before any connection to the Internet (or other external data source) is enabled.
11 Citations
20 Claims
-
1. A software application stored as a computer program encoded onto memory installable on a personal computer, wherein the computer program comprises executable instructions for:
-
an isolated operating environment; and a secondary operating system functional within the isolated operating environment on the personal computer, wherein primary data files of the personal computer are prevented from being accessed by malicious code from an external data source. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14)
-
-
15. A method for securing a personal computer system from intrusion from an external data source comprising:
-
requesting a connection with an external data source from a primary operating system; and accessing the external data source using a secondary operating system from within an isolated operating environment functioning separate from the primary operating system; wherein the isolated operating environment comprises at least one input/output (I/O) connection with the external data source, wherein the external data source is limited to operation within the isolated operating environment, and wherein the personal computer system is secured from malicious code contained in a file downloaded from the external data source. - View Dependent Claims (16, 17, 18, 19)
-
-
20. A computer readable medium storing instructions installable on a personal computer for protecting primary data files of the personal computer from being accessed by malicious code by an external data source, the instructions comprising functionality to:
-
provide an isolated operating environment comprising a secondary operating system, wherein the secondary operating system functions separate from a primary operating system (POS) on the personal computer; provide primary operating system permission codes to limit access to a node coupled to an external data source to the isolated operating environment under control of the secondary operating system; initiate an external data source interface session via the node within the isolated operating environment; allocate a memory space and a temporary data storage space to the secondary operating system for the duration of the session; and establish connectivity with the external data source via the node under control of the secondary operating system to isolate operative communication with the external data source to the isolated operating environment to protect the personal computer from malicious code derived from the external data source.
-
Specification