Abstract:
Avirtualization layer is inserted between (i) an operating system of a computer system, and (ii) at least one ofa memory module and a storage module of thecomputer system. At least one ofread access and write access to at least one portion of theat least one of a memory module and a storage moduleis controlled, with thevirtualization layer. The insertion ofthe virtualization layer is accomplished in an on-the-fly manner (that is, without rebooting the computer system). An additional aspect includes controlling installation of a security program from the virtualization layer.
Abstract:
A peripheral device includes an interface configured to communicate with a computer, the peripheral device; logic configured to perform an integrity verification of an operating system of the computer; and a display configured to display a result of the integrity verification. A method for integrity verification of a computer using a peripheral device includes connecting the peripheral device to the computer; sending a challenge from the device to the computer; computing attestation data using the challenge and information stored in the computer, retrieving the attestation data from the computer by a client program running on the computer; sending the attestation data to the peripheral device; and verifying the attestation data by the peripheral device.
Abstract:
A peripheral device includes an interface configured to communicate with a computer, the peripheral device; logic configured to perform an integrity verification of an operating system of the computer; and a display configured to display a result of the integrity verification. A method for integrity verification of a computer using a peripheral device includes connecting the peripheral device to the computer; sending a challenge from the device to the computer; computing attestation data using the challenge and information stored in the computer, retrieving the attestation data from the computer by a client program running on the computer; sending the attestation data to the peripheral device; and verifying the attestation data by the peripheral device.
Abstract:
A data access control facility is implemented by assigning personally identifying information (PH) classification labels to PH data objects, with each PH data object having one PH classification label assigned thereto. The control facility further includes at least one PH purpose serving function set (PSFS) comprising a list of application functions that read or write PH data objects. Each PH PSFS is also assigned a PH classification label. A PH data object is accessible via an application function of a PTI PSFS having a PH classification label that is identical to or dominant of the PH classification label of the PH object. A user of the control facility is assigned a PH clearance set which contains a list of at least one PH classification label, which is employed in determining whether the user is entitled to access a particular function.