System and method for controlling the use of a computer

Boots – shoes – and leggings

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

364DIG2, 3649187, 34082531, H04L 900

Patent

active

053613597

ABSTRACT:
A system and method for auditing and controlling the use of a computer. An operating system and selected programs and data , referred to as approved applications and approved data , are stored on a protected media which cannot be modified by any ordinary user or application program, regardless of operating system privilege. The protected media can be modified by the operating system, as well as by an administrator using a trusted path mechanism. The trusted path mechanism establishes a reliable communication channel between the administrator and the computer system. The present invention may be configured to collect user audit data concerning user activity and system status and to write the audit data to the protected media. Also, the present invention may be configured to limit execution of application programs to the approved applications.

REFERENCES:
patent: 3827029 (1974-07-01), Schlotterer et al.
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4757533 (1988-07-01), Allen et al.
patent: 4885789 (1989-12-01), Burger et al.
patent: 4918653 (1990-04-01), Johri et al.
patent: 5012515 (1991-04-01), McVitie
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5224160 (1993-06-01), Paulini et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5272754 (1993-12-01), Boerbert
IBM Technical Disclosure Bulletin, vol. 34, No. 8, Jan. 1992, New York, US; pp. 214-215; Mechanism for Trusted Computing Base Isolation.
Final Evaluation Report, Secure Communications Processor (SCOMP), Release 2.1, CSC-EPL-85/001, 1985.
Saydjari, et al., Locking Computers Securely, 10th National Computer Security Conference Proceedings, 21-24 Sep. 1987.
Maria M. King, Identifying and Controlling Undesirable Program Behaviors, 14th National Computer Security Conference, Oct. 1-4, 1991, Omni Shoreham Hotel, Washington, D.C.
Russell Davis, PRC, Inc., Peeling the Viral Onion, 14th National Computer Security Conference, Oct. 1-4, 1991, Omni Shoreham Hotel, Washington, D.C.
Final Evaluation Report of International Business Machines Corporation, VM/SP with RACF, 28 Sep. 1989, National Computer Security Center, CSC-EPL-89/005.
Final Evaluation Report of Unisys Corporation, OS 1100, Sep. 27, 1989, National Computer Security Center, CSC-EPL-89/004.
Final Evaluation Report of Digital Equipment Corporation, VAX/VMS Version 4.3, 30 Jul. 1986, National Computer Security Center, CSC-EPL-86/004.
Final Evaluation Report of Trusted Information Systems Incorporated, Trusted Xenix, 22 Jan. 1991, National Computer Security Center, CSC-EPL-91/003, C-Evaluation No. 01-92.
Operating Systems by H. M. Deitel pp. 535, 541, 542, 1990.
Unix System Security by Rik Farrow, 1990, pp. 9-12, 55, 56, 203-205.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

System and method for controlling the use of a computer does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with System and method for controlling the use of a computer, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for controlling the use of a computer will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1807934

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.