Trusted path mechanism for an operating system

Boots – shoes – and leggings

Patent

Rate now

  [ 0.00 ] – not rated yet Voters 0   Comments 0

Details

34082531, 3649187, 36494996, H04L 900

Patent

active

049186531

ABSTRACT:
The trusted path mechanism invention guarantees that data typed by a user on a terminal keyboard is protected from any intrusion by unauthorized programs. It allows a user to create a non-forgeable and non-penetrable communication path between the user's terminal and the trusted operating system software. The user can create a trusted path by simply pressing a key, called the Secure Attention Key (SAK), on the terminal keyboard. This operation can be called when the user logs into the system in order to be sure that the user is communicating with the real login program and not a Trojan horse program masquerading as a login program, which could steal the user's password. After the user establishes the trusted path, he can enter his critical data, such as a password, and can be sure that his critical data is not being stolen by an intruder's program. Then, after the user logs out, he can be sure that the trusted path has actually logged him out of the system so that a Trojan horse program is not capable of continuing the session started by the user.

REFERENCES:
patent: 4218738 (1980-08-01), Matyas et al.
patent: 4227253 (1980-10-01), Ehrsam et al.
patent: 4310720 (1982-01-01), Check
patent: 4430728 (1984-02-01), Beitel et al.
patent: 4531023 (1985-07-01), Levine
patent: 4652990 (1987-03-01), Pailen et al.
patent: 4677546 (1987-06-01), Freeman
patent: 4694396 (1987-09-01), Weisshaar et al.
patent: 4742447 (1988-05-01), Duvall et al.
patent: 4754395 (1988-06-01), Weisshaar et al.
T. A. Berson, et al., "KSOS--Development Methodology for a Secure Operating System", Proc. of the Natl. Comp. Conf., vol. 48, AFIPS Press, 1979, Montvale, N.J., pp. 365-372.
S. Kramer, "Linus IV--An Experiment in Computer Security", Proc. of the 1984 Symposium on Security and Privacy, Oakland, Calif., Apr. 1984, pp. 24-33.
G. J. Popek, et al., "UCLA Secure Unix", Proc. of the Natl. Comp. Conf., vol. 48, AFIPS Press, 1979, Montvale, N.J., pp. 355-364.
V. D. Gligor, et al., "On the Design and Implementation of Secure Xenix Workstations", IEEE Symposium on Security, 4/86, pp. 102-117.

LandOfFree

Say what you really think

Search LandOfFree.com for the USA inventors and patents. Rate them and share your experience with other people.

Rating

Trusted path mechanism for an operating system does not yet have a rating. At this time, there are no reviews or comments for this patent.

If you have personal experience with Trusted path mechanism for an operating system, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Trusted path mechanism for an operating system will most certainly appreciate the feedback.

Rate now

     

Profile ID: LFUS-PAI-O-1057908

  Search
All data on this website is collected from public sources. Our data reflects the most accurate information available at the time of publication.