|
|
|
|
|
|
|
|
| ( 1 of 1 ) |
| United States Patent | 5,361,359 |
| Tajalli , et al. | November 1, 1994 |
A system and method for auditing and controlling the use of a computer. An operating system and selected programs and data , referred to as approved applications and approved data , are stored on a protected media which cannot be modified by any ordinary user or application program, regardless of operating system privilege. The protected media can be modified by the operating system, as well as by an administrator using a trusted path mechanism. The trusted path mechanism establishes a reliable communication channel between the administrator and the computer system. The present invention may be configured to collect user audit data concerning user activity and system status and to write the audit data to the protected media. Also, the present invention may be configured to limit execution of application programs to the approved applications.
| Inventors: | Tajalli; Homayoon (Ellicott City, MD), Badger; Mark L. (Rockville, MD), Dalva; David I. (Rockville, MD), Walker; Stephen T. (Glenwood, MD) |
|---|---|
| Assignee: |
Trusted Information Systems, Inc.
(Glenwood,
MD)
|
| Family ID: | 25469909 |
| Appl. No.: | 07/937,424 |
| Filed: | August 31, 1992 |
| Current U.S. Class: | 726/23; 340/5.74 |
| Current CPC Class: | G06F 21/51 (20130101); G06F 2211/007 (20130101); G06F 2211/009 (20130101); G06F 2221/2101 (20130101); G06F 2221/2111 (20130101); G06F 2221/2141 (20130101) |
| Current International Class: | G06F 1/00 (20060101); G06F 21/00 (20060101); H04L 009/00 () |
| Field of Search: | ;395/650,700 ;364/969.4,969.3,246.6,246.9 |
| 3827029 | July 1974 | Schlotterer et al. |
| 4200770 | April 1980 | Hellman et al. |
| 4757533 | July 1988 | Allen et al. |
| 4885789 | December 1989 | Burger et al. |
| 4918653 | April 1990 | Johri et al. |
| 5012515 | April 1991 | McVitie |
| 5032979 | July 1991 | Hecht et al. |
| 5224160 | June 1993 | Paulini et al. |
| 5263147 | November 1993 | Francisco et al. |
| 5272754 | December 1993 | Boerbert |
| 0325776A2 | Aug 1989 | EP | |||
| 0432333A1 | Jun 1991 | EP | |||
| 0468625A2 | Jan 1992 | EP | |||
IBM Technical Disclosure Bulletin, vol. 34, No. 8, Jan. 1992, New York, US; pp. 214-215; Mechanism for Trusted Computing Base Isolation. . Final Evaluation Report, Secure Communications Processor (SCOMP), Release 2.1, CSC-EPL-85/001, 1985. . Saydjari, et al., Locking Computers Securely, 10th National Computer Security Conference Proceedings, 21-24 Sep. 1987. . Maria M. King, Identifying and Controlling Undesirable Program Behaviors, 14th National Computer Security Conference, Oct. 1-4, 1991, Omni Shoreham Hotel, Washington, D.C. . Russell Davis, PRC, Inc., Peeling the Viral Onion, 14th National Computer Security Conference, Oct. 1-4, 1991, Omni Shoreham Hotel, Washington, D.C. . Final Evaluation Report of International Business Machines Corporation, VM/SP with RACF, 28 Sep. 1989, National Computer Security Center, CSC-EPL-89/005. . Final Evaluation Report of Unisys Corporation, OS 1100, Sep. 27, 1989, National Computer Security Center, CSC-EPL-89/004. . Final Evaluation Report of Digital Equipment Corporation, VAX/VMS Version 4.3, 30 Jul. 1986, National Computer Security Center, CSC-EPL-86/004. . Final Evaluation Report of Trusted Information Systems Incorporated, Trusted Xenix, 22 Jan. 1991, National Computer Security Center, CSC-EPL-91/003, C-Evaluation No. 01-92. . Operating Systems by H. M. Deitel pp. 535, 541, 542, 1990. . Unix System Security by Rik Farrow, 1990, pp. 9-12, 55, 56, 203-205.. |
|
|