System and method for securing virtual computing environments

一种环境、计算机的技术

Inactive Publication Date: 2013-10-23
TEMPORAL DEFENSE SYST
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the course of developing this ubiquitous network, the security of the computer devices and the networks connecting them is completely inadequate, leaving most systems vulnerable to cyber attacks and computer viruses
[0005] The problem with current computing device and network security is that measures to adequately prevent unauthorized processes from accessing the machine and preventing unauthorized code from running on the system are insufficient because the breadth and complexity of the code base cannot be controlled by current state-of-the-art Best Practices for Protection of Computing Environments
As a result, an overwhelming number of system security patches exist, with more unusable every day

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for securing virtual computing environments
  • System and method for securing virtual computing environments
  • System and method for securing virtual computing environments

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The present invention is designed to create a transient computing environment where usage of authorized processes occurs in a robust, stable computing environment and usage of unauthorized processes experiences an unfriendly, unstable, ever-changing computing environment. Furthermore, the present invention provides a mechanism for obscuring, obfuscating or obfuscating system specifications to unauthorized or compromised computing processes and their controllers (either a person or a remote agent who initiates or controls the process).

[0029] Furthermore, the present invention provides a technique for integrity verification of virtual and physical system instances that detects system compromise. In addition, the present invention provides a method of isolating an infected system to prevent virus propagation, preventing access to mission-critical commands, and a method of profiling that demonstrates, or warns of, viruses, The fact that unauthorized spy code or unauthori...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A computer implemented method includes introducing unpredictable temporal disruptions to the operating states of an authorized process and an unauthorized process. The authorized process is migrated to a virtual machine to avoid the unpredictable temporal disruptions while the unauthorized process is subject to the unpredictable temporal disruptions and thereby experiences an unstable environment that induces operating faults.

Description

[0001] Related Application Cross Reference [0002] This application claims U.S. Provisional Patent Application No. 61, entitled "Temporal Compu-ting System and Method for Securing Virtual Computing Environments," filed October 31, 2010 / 408, the priority of 607, the contents of which are incorporated herein by reference. technical field [0003] The present invention relates to computer security. More specifically, the present invention relates to protecting computer devices and networks from unauthorized access and use. Background technique [0004] With the rapid increase in system complexity brought about by the rapid evolution of computing technology to meet the market demands of highly competitive industries, today's computing devices and networks are extremely insecure. Security has been added as an afterthought in most commercial installations and networks because engineering attention and resources have traditionally been focused on functional and innovatively sol...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/22G06F9/44G06F21/55G06F21/56
CPCG06F21/56G06F21/55G06F21/64G06F21/554G06F2009/45587
Inventor 马克·罗尼尔·塔克
Owner TEMPORAL DEFENSE SYST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products