Boots – shoes – and leggings
Patent
1988-01-28
1990-04-17
Eng, David Y.
Boots, shoes, and leggings
34082531, 3649187, 36494996, H04L 900
Patent
active
049186531
ABSTRACT:
The trusted path mechanism invention guarantees that data typed by a user on a terminal keyboard is protected from any intrusion by unauthorized programs. It allows a user to create a non-forgeable and non-penetrable communication path between the user's terminal and the trusted operating system software. The user can create a trusted path by simply pressing a key, called the Secure Attention Key (SAK), on the terminal keyboard. This operation can be called when the user logs into the system in order to be sure that the user is communicating with the real login program and not a Trojan horse program masquerading as a login program, which could steal the user's password. After the user establishes the trusted path, he can enter his critical data, such as a password, and can be sure that his critical data is not being stolen by an intruder's program. Then, after the user logs out, he can be sure that the trusted path has actually logged him out of the system so that a Trojan horse program is not capable of continuing the session started by the user.
REFERENCES:
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4310720 (1982-01-01), Check
patent: 4430728 (1984-02-01), Beitel et al.
patent: 4531023 (1985-07-01), Levine
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4677546 (1987-06-01), Freeman
patent: 4694396 (1987-09-01), Weisshaar et al.
patent: 4742447 (1988-05-01), Duvall et al.
patent: 4754395 (1988-06-01), Weisshaar et al.
T. A. Berson, et al., "KSOS--Development Methodology for a Secure Operating System", Proc. of the Natl. Comp. Conf., vol. 48, AFIPS Press, 1979, Montvale, N.J., pp. 365-372.
S. Kramer, "Linus IV--An Experiment in Computer Security", Proc. of the 1984 Symposium on Security and Privacy, Oakland, Calif., Apr. 1984, pp. 24-33.
G. J. Popek, et al., "UCLA Secure Unix", Proc. of the Natl. Comp. Conf., vol. 48, AFIPS Press, 1979, Montvale, N.J., pp. 355-364.
V. D. Gligor, et al., "On the Design and Implementation of Secure Xenix Workstations", IEEE Symposium on Security, 4/86, pp. 102-117.
Johri Abhai
Luckenbaugh Gary L.
Eng David Y.
Hoel John E.
International Business Machines - Corporation
LandOfFree
Trusted path mechanism for an operating system does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Trusted path mechanism for an operating system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trusted path mechanism for an operating system will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-1057908