Protect operating system configuration values
An operating system and action technology, applied in micro-control devices, platform integrity maintenance, computer security devices, etc., can solve problems such as difficult to protect computers
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] This article discusses securing operating system configuration values. During the process of booting a device, a set of configuration values used by at least a portion of the device's operating system or operating systems (and optionally including one or more configuration values used by components of the device's pre-operating system environment) configuration value) is checked against the device's policy. If the configuration value satisfies the policy, then allow the operating system to run on the device, but if the configuration value does not satisfy the policy, take one or more appropriate actions (e.g., do not run the operating system described above, changing the value described, etc.). The policy is stored in a manner that prevents unauthorized modification by the operating system and other applications running on the computing device. However, one or more policy issuers may update the policy, allowing the policy to change over time.
[0013] This articl...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
