Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Integration of high-assurance features into an application through application factoring

A technology of applications, members, applied in the field of computing, which can solve problems such as how applications can use two environments.

Inactive Publication Date: 2005-04-27
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the mere fact that two operating systems can exist side by side does not resolve the question of how a given application utilizes both environments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Integration of high-assurance features into an application through application factoring
  • Integration of high-assurance features into an application through application factoring
  • Integration of high-assurance features into an application through application factoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] review

[0019] The present invention provides a mechanism that allows an application to be divided or "decomposed" into secure and non-secure components, and to allow these components to work together to provide an integrated user experience with respect to the application. For example, a word processing program can be divided into a non-secure component that performs most of the layout, editing, printing, spell checking, grammar checking, etc. functions associated with a word processor, and a non-secure component that enables the display and Edited security components. Non-secure components can run in common, open environments, such as typical commercial operating systems. A secure component may run in a high-assurance environment that allows certain types of software to run with a high assurance that the software will behave correctly. The present invention provides various features in relation to this situation. First, the present invention provides a user expe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Application factoring or partitioning is used to integrate secure features into a conventional application. An application's functionality is partitioned into two sets according to whether a given action does, or does not, involve the handling of sensitive data. Separate software objects (processors) are created to perform these two sets of actions. A trusted processor handles secure data and runs in a high-assurance environment. When another processor encounters secure data, that data is sent to the trusted processor. The data is wrapped in such a way that allows it to be routed to the trusted processor, and prevents the data from being deciphered by any entity other than the trusted processor. An infrastructure is provided that wraps objects, routes them to the correct processor, and allows their integrity to be attested through a chain of trust leading back to base component that is known to be trustworthy.

Description

technical field [0001] The present invention relates generally to the field of computing, and in particular provides a mechanism to support the partitioning and decomposition of applications in a manner that allows operations requiring trusted or secure measures to be integrated into common, non-secure software. Background technique [0002] In computing, there is a tension between systems that offer a high degree of security on the one hand, and systems that offer a large number of functional features and high scalability on the other. Security in computing depends on the ability to understand and predict the behavior of computer systems (that is, the behavior of software and hardware) with a high degree of certainty—that is, to ensure that systems do not behave differently through inadvertent misuse or deliberate attack It behaves the way it was designed. For example, a computer system designed to protect copyrighted material from being copied can only be trusted in so fa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/24G06F1/00G06F3/00G06F9/44G06F9/45G06F9/46G06F12/14G06F15/76G06F17/00G06F21/00G06F21/22
CPCG06F21/53G06F8/40
Inventor K·D·雷M·佩纳多P·英格兰德T·V·库里恩
Owner MICROSOFT TECH LICENSING LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products