System and method for an endpoint hardware assisted network firewall in a security environment
First Claim
Patent Images
1. A method comprising:
- receiving, at a tamper resistant environment on a host from a virtualization environment of the host, information associated with an application executing on the host;
receiving a traffic flow at the tamper resistant environment from the application, wherein the tamper resistant environment is separated from an operating system of the host;
creating a modified traffic flow by applying a security token to the received traffic flow and by adding the information to the received traffic flow; and
sending the modified traffic flow to a server.
13 Assignments
0 Petitions
Accused Products
Abstract
A method is provided in one example embodiment and includes receiving a traffic flow at a tamper resistant environment from an application, where the tamper resistant environment is separated from a host operating system. The method also includes applying a security token to the traffic flow and sending the traffic flow to a server. In specific embodiments, a security module may add information about the application to traffic flow. A trapping module may monitor for a memory condition and identify the memory condition. The trapping module may also, responsive to identifying the memory condition, initiate a virtual environment for the application, and check the integrity of the traffic flow.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a tamper resistant environment on a host from a virtualization environment of the host, information associated with an application executing on the host; receiving a traffic flow at the tamper resistant environment from the application, wherein the tamper resistant environment is separated from an operating system of the host; creating a modified traffic flow by applying a security token to the received traffic flow and by adding the information to the received traffic flow; and sending the modified traffic flow to a server. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. At least one non-transitory computer-readable medium that includes code for execution and when executed by a processor is operable to perform operations comprising:
-
receiving, at a tamper resistant environment on a host from a virtualization environment on the host, information associated with an application executing on the host; receiving a traffic flow at the tamper resistant environment from the application, wherein the tamper resistant environment is separated from an operating system of the host; creating a modified traffic flow by applying a security token to the received traffic flow and by adding the information to the received traffic flow; and sending the modified traffic flow to a server. - View Dependent Claims (10, 11, 12, 13, 14, 18, 19, 20)
-
-
15. An apparatus, comprising:
-
a memory element configured to store data; a processor operable to execute instructions associated with the data; and a security engine configured to interface with the memory element and the processor to; receive, from a virtualization environment of a host, information associated with an application executing on the host; receive a traffic flow at the tamper resistant environment from the application, wherein the tamper resistant environment is separated from an operating system of the host; create a modified traffic flow by applying a security token to the received traffic flow and by adding the information to the received traffic flow; and send the modified traffic flow to a server. - View Dependent Claims (16, 17)
-
Specification