Information security – Policy
Reexamination Certificate
2006-08-30
2009-12-08
Lipman, Jacob (Department: 2434)
Information security
Policy
C726S022000
Reexamination Certificate
active
07631342
ABSTRACT:
A trusted computer system that offers Linux® compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e.g., classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
REFERENCES:
patent: 5230069 (1993-07-01), Brelsford et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5504814 (1996-04-01), Miyahara
patent: 5521849 (1996-05-01), Adelson et al.
patent: 5590266 (1996-12-01), Carson et al.
patent: 5603014 (1997-02-01), Woodring et al.
patent: 5628017 (1997-05-01), Kimmerly et al.
patent: 6182218 (2001-01-01), Saito
patent: 6351817 (2002-02-01), Flyntz
patent: 6490626 (2002-12-01), Edwards et al.
patent: 6496847 (2002-12-01), Bugnion et al.
patent: 6782424 (2004-08-01), Yodaiken
patent: 2003/0196108 (2003-10-01), Kung
Biba, K.J., “Integrity Considerations for Secure Computer Systems,” Apr. 1977, The Mitre Corporation, Bedford, Massachusetts (Contract No. F19628-75-C-0001).
Department of Defense Standard, “Department of Defense Trusted Computer System Evaluation Criteria,” Dec. 26, 1985.
The Mitre Corporation, Bedford, Massachusetts, “Secure Computer System: Unified Exposition and Multics Interpretation,” Mar. 1976.
“Technical Rational Behind CSC-STD-003-85: Computer Security Requirements—Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments,” Jun. 25, 1985.
Intel Corporation, Intel Architecture Software Developer's Manual vol. 3: System Programming, 1999, Chapter 4.
Ata John G.
Barbieri Paul A.
Engen Dwight B.
Focke Michael W.
Knoke James E.
BAE Systems Information Technology Inc.
Greenberg & Traurig, LLP
Lipman Jacob
LandOfFree
Data security verification for data transfers between... does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Data security verification for data transfers between..., we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Data security verification for data transfers between... will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4144751