Invention Grant
- Patent Title: Securing an endpoint in a computer network
-
Application No.: US15874915Application Date: 2018-01-19
-
Publication No.: US10693909B2Publication Date: 2020-06-23
- Inventor: Kuo-Chun Chen , Wei-Hsiang Hsiung , Sheng-Tung Hsu , Fadly Yahaya
- Applicant: International Business Machines Corporation
- Applicant Address: US NY Armonk
- Assignee: International Business Machines Corporation
- Current Assignee: International Business Machines Corporation
- Current Assignee Address: US NY Armonk
- Agent Jeffrey S. LaBaw; David H. Judson
- Main IPC: H04L29/06
- IPC: H04L29/06 ; G06F21/60 ; H04L9/08 ; H04L9/30 ; G06F8/65 ; G06F9/455

Abstract:
A computer network endpoint is secured to prevent information leak or other compromise by instantiating in memory first, second and third security zones. With respect to an authorized user, the first zone is readable and writable, the second zone is read-only, and the third zone is neither readable nor writable. System information (e.g., applications, libraries, policies, etc.) are deployed into the first zone from the second zone. When sensitive data is generated in the first zone, e.g., when a secure communication session is established using a cryptographic key, the sensitive data is transferred from the first zone to the third zone, wherein it is immune from information leak or other compromise. The sensitive information is transferable from the third zone to one or more external having a need to know that information. Because information does not pass directly from the first security zone to the external systems, the endpoint is secured against information leak or other attack.
Public/Granted literature
- US20190230120A1 Securing an endpoint in a computer network Public/Granted day:2019-07-25
Information query