Boots – shoes – and leggings
Patent
1992-08-31
1994-11-01
Shaw, Gareth D.
Boots, shoes, and leggings
364DIG2, 3649187, 34082531, H04L 900
Patent
active
053613597
ABSTRACT:
A system and method for auditing and controlling the use of a computer. An operating system and selected programs and data , referred to as approved applications and approved data , are stored on a protected media which cannot be modified by any ordinary user or application program, regardless of operating system privilege. The protected media can be modified by the operating system, as well as by an administrator using a trusted path mechanism. The trusted path mechanism establishes a reliable communication channel between the administrator and the computer system. The present invention may be configured to collect user audit data concerning user activity and system status and to write the audit data to the protected media. Also, the present invention may be configured to limit execution of application programs to the approved applications.
REFERENCES:
patent: 3827029 (1974-07-01), Schlotterer et al.
patent: 4200770 (1980-04-01), Hellman et al.
patent: 4757533 (1988-07-01), Allen et al.
patent: 4885789 (1989-12-01), Burger et al.
patent: 4918653 (1990-04-01), Johri et al.
patent: 5012515 (1991-04-01), McVitie
patent: 5032979 (1991-07-01), Hecht et al.
patent: 5224160 (1993-06-01), Paulini et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5272754 (1993-12-01), Boerbert
IBM Technical Disclosure Bulletin, vol. 34, No. 8, Jan. 1992, New York, US; pp. 214-215; Mechanism for Trusted Computing Base Isolation.
Final Evaluation Report, Secure Communications Processor (SCOMP), Release 2.1, CSC-EPL-85/001, 1985.
Saydjari, et al., Locking Computers Securely, 10th National Computer Security Conference Proceedings, 21-24 Sep. 1987.
Maria M. King, Identifying and Controlling Undesirable Program Behaviors, 14th National Computer Security Conference, Oct. 1-4, 1991, Omni Shoreham Hotel, Washington, D.C.
Russell Davis, PRC, Inc., Peeling the Viral Onion, 14th National Computer Security Conference, Oct. 1-4, 1991, Omni Shoreham Hotel, Washington, D.C.
Final Evaluation Report of International Business Machines Corporation, VM/SP with RACF, 28 Sep. 1989, National Computer Security Center, CSC-EPL-89/005.
Final Evaluation Report of Unisys Corporation, OS 1100, Sep. 27, 1989, National Computer Security Center, CSC-EPL-89/004.
Final Evaluation Report of Digital Equipment Corporation, VAX/VMS Version 4.3, 30 Jul. 1986, National Computer Security Center, CSC-EPL-86/004.
Final Evaluation Report of Trusted Information Systems Incorporated, Trusted Xenix, 22 Jan. 1991, National Computer Security Center, CSC-EPL-91/003, C-Evaluation No. 01-92.
Operating Systems by H. M. Deitel pp. 535, 541, 542, 1990.
Unix System Security by Rik Farrow, 1990, pp. 9-12, 55, 56, 203-205.
Badger Mark L.
Dalva David I.
Tajalli Homayoon
Walker Stephen T.
Richey Michael T.
Shaw Gareth D.
Trusted Information Systems, Inc.
LandOfFree
System and method for controlling the use of a computer does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with System and method for controlling the use of a computer, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and System and method for controlling the use of a computer will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1807934