Trusted operating system with emulation and process isolation
First Claim
1. Computer program product stored on tangible computer readable media, the computer program product comprising:
- a trusted operating system executable by a processor on a computing system, the trusted operating system emulating another operating system by allowing an application program written for the other operating system to execute on the trusted operating system without requiring changes to the application program, the trusted operating system further comprising code for enforcing a set of security rules designed to protect a first process from unauthorized access by a second process, the second process having a security level different than that of the first process.
5 Assignments
0 Petitions
Accused Products
Abstract
A trusted computer system that offers Linux® compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e.g., classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
-
Citations
24 Claims
-
1. Computer program product stored on tangible computer readable media, the computer program product comprising:
a trusted operating system executable by a processor on a computing system, the trusted operating system emulating another operating system by allowing an application program written for the other operating system to execute on the trusted operating system without requiring changes to the application program, the trusted operating system further comprising code for enforcing a set of security rules designed to protect a first process from unauthorized access by a second process, the second process having a security level different than that of the first process. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21)
-
22. Computer program product stored on tangib1e computer readable media, the computer program product comprising a trusted operating system executable by a processor on a computing system, the trusted operating system, comprising:
-
an application domain, the application domain permitting trusted and untrusted applications to be executed therein; an operating system services layer, the operating system services layer emulating at least one other operating system by allowing an application program written for the other operating system to execute on the trusted operating system without requiring changes to the application program; and
,a security kernel, the security kernel protecting a first process from unauthorized access by a second process, the second process having a security level different than that of the first process. - View Dependent Claims (23, 24)
-
Specification