Unlock instant, AI-driven research and patent intelligence for your innovation.

Protect operating system configuration values

An operating system and action technology, applied in micro-control devices, platform integrity maintenance, computer security devices, etc., can solve problems such as difficult to protect computers

Active Publication Date: 2016-12-14
MICROSOFT TECH LICENSING LLC
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Currently it is still difficult to protect computers from such malicious programs

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protect operating system configuration values
  • Protect operating system configuration values
  • Protect operating system configuration values

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] This article discusses securing operating system configuration values. During the process of booting a device, a set of configuration values ​​used by at least a portion of the device's operating system or operating systems (and optionally including one or more configuration values ​​used by components of the device's pre-operating system environment) configuration value) is checked against the device's policy. If the configuration value satisfies the policy, then allow the operating system to run on the device, but if the configuration value does not satisfy the policy, take one or more appropriate actions (e.g., do not run the operating system described above, changing the value described, etc.). The policy is stored in a manner that prevents unauthorized modification by the operating system and other applications running on the computing device. However, one or more policy issuers may update the policy, allowing the policy to change over time.

[0013] This articl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

In a pre-operating system environment of a device, a policy identifying configuration settings for the operating system is obtained prior to loading and running the operating system on the device. The operating system itself is prevented from changing this policy, but may be changed by components of the pre-OS environment under certain circumstances. This policy is compared to configuration values ​​used by the operating system, and if the configuration values ​​satisfy the policy, the operating system is allowed to boot with the configuration values. However, if the configuration does not satisfy the policy, then responsive action is taken.

Description

technical field [0001] The present invention generally relates to the technical field of operating system security. Background technique [0002] Computers are becoming increasingly interconnected via various networks, such as the Internet. While this connectivity allows users to access a variety of services and data, this connectivity is not free from its own problems. One such problem is that this connectivity can allow malicious programs to run on these computers. These malicious programs can perform various unwanted actions, such as launching attacks on other computers, sending private data to other users' computers, preventing a user from being able to use his or her computer, and so on. It is currently still difficult to protect a computer from such malicious programs. Contents of the invention [0003] This Summary is provided to introduce a selection of concepts in a simplified form that are further described below in the Detailed Description. This Summary is n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/56G06F21/51
CPCG06F21/575G06F9/24G06F21/50
Inventor S.D.安德森D.J.林斯利M.B.G.奈斯特伦D.M.麦艾弗R.K.斯皮格尔
Owner MICROSOFT TECH LICENSING LLC
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More