Data security verification for data transfers between...

Information security – Policy

Reexamination Certificate

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

C726S022000

Reexamination Certificate

active

07631342

ABSTRACT:
A trusted computer system that offers Linux® compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e.g., classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.

REFERENCES:
patent: 5230069 (1993-07-01), Brelsford et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5504814 (1996-04-01), Miyahara
patent: 5521849 (1996-05-01), Adelson et al.
patent: 5590266 (1996-12-01), Carson et al.
patent: 5603014 (1997-02-01), Woodring et al.
patent: 5628017 (1997-05-01), Kimmerly et al.
patent: 6182218 (2001-01-01), Saito
patent: 6351817 (2002-02-01), Flyntz
patent: 6490626 (2002-12-01), Edwards et al.
patent: 6496847 (2002-12-01), Bugnion et al.
patent: 6782424 (2004-08-01), Yodaiken
patent: 2003/0196108 (2003-10-01), Kung
Biba, K.J., “Integrity Considerations for Secure Computer Systems,” Apr. 1977, The Mitre Corporation, Bedford, Massachusetts (Contract No. F19628-75-C-0001).
Department of Defense Standard, “Department of Defense Trusted Computer System Evaluation Criteria,” Dec. 26, 1985.
The Mitre Corporation, Bedford, Massachusetts, “Secure Computer System: Unified Exposition and Multics Interpretation,” Mar. 1976.
“Technical Rational Behind CSC-STD-003-85: Computer Security Requirements—Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments,” Jun. 25, 1985.
Intel Corporation, Intel Architecture Software Developer's Manual vol. 3: System Programming, 1999, Chapter 4.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Data security verification for data transfers between... does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Data security verification for data transfers between..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data security verification for data transfers between... will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-4144751

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.