Information security – Monitoring or scanning of software or data including attack...
Reexamination Certificate
2006-07-17
2009-06-16
Lipman, Jacob (Department: 2434)
Information security
Monitoring or scanning of software or data including attack...
C713S166000, C703S021000, C703S022000
Reexamination Certificate
active
07549165
ABSTRACT:
A trusted computer system that offers Linux® compatibility and supports contemporary hardware speeds. It is designed to require no porting of common applications which run on Linux, to be easy to develop for, and to allow the use of a wide variety of modern development tools. The system is further designed to meet or exceed the Common Criteria EAL-5 or higher rating through incorporation of required security features, as well as a very high level of assurance for handling data at a wide range of sensitivity (e.g., classification) levels in a wide range of operational environments. This is achieved through the implementation of a well-layered operating system which has been designed from the ground up to enforce security, but which also supports Linux operating system functions and methods.
REFERENCES:
patent: 5230069 (1993-07-01), Brelsford et al.
patent: 5263147 (1993-11-01), Francisco et al.
patent: 5504814 (1996-04-01), Miyahara
patent: 5521849 (1996-05-01), Adelson et al.
patent: 5603014 (1997-02-01), Woodring et al.
patent: 5628017 (1997-05-01), Kimmerly et al.
patent: 6182218 (2001-01-01), Saito
patent: 6490626 (2002-12-01), Edwards et al.
patent: 6496847 (2002-12-01), Bugnion et al.
patent: 6782424 (2004-08-01), Yodaiken
patent: 2002/0069369 (2002-06-01), Tremain
patent: 2004/0098473 (2004-05-01), Yodaiken
Biba, K.J., “Integrity Considerations for Secure Computer Systems,” Apr. 1977, The Mitre Corporation, Bedford, Massachusetts (Contract No. F19628-75-C-0001).
Department of Defense Standard, “Department of Defense Trusted Computer System Evaluation Criteria,” Dec. 26, 1985.
The Mitre Corporation, Bedford, Massachusetts, “Secure Computer System: Unified Exposition and Multics Interpretation,” Mar. 1976.
“Technical Rational Behind CSC-STD-003-85: Computer Security Requirements—Guidance for Applying the Department of Defense Trusted Computer System Evaluation Criteria in Specific Environments,” Jun. 25, 1985.
Ata John G.
Barbieri Paul A.
Engen Dwight B.
Focke Michael W.
Knoke James E.
BAE Systems Information Technology Inc.
Greenberg & Traurig, LLP
Lipman Jacob
LandOfFree
Trusted operating system with emulation and process isolation does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Trusted operating system with emulation and process isolation, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trusted operating system with emulation and process isolation will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-4064768