Method and system achieving individualized protected space in an operating system

a technology of operating system and protected space, applied in the direction of specific access rights, multi-programming arrangements, instruments, etc., can solve the problems of bringing the entire machine down, the potential for crashing the machine, and the problem of unable to fully recover, so as to achieve the reconfigurability of the ace architecture and the effect of ensuring and reliably monitoring

Inactive Publication Date: 2010-07-29
QST HLDG L L C
View PDF21 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0008]Through the present invention, all elements outside a system's own code for operating, e.g., all the stacks, abstraction layers, and device drivers, can be readily and reliably monitored. In this manner, the vulnerability present in most current operating systems due to unchecked access below the demarcation line is successfully overcome. Further, the reconfigurability of the ACE architecture allows the approach to adjust as desired with additions / changes to an operating system environment. These and other advantages will become readily apparent from the following detailed description and accompanying drawings.

Problems solved by technology

While the typical structure provides a well-understood model for an operating system, some problems remain.
One such problem is the potential for crashing the machine once access below the demarcation line 60 is achieved.
For example, bugs in programs that are written for performing processes below the demarcation line, e.g., device drivers that interact with the hardware abstraction layer, protocol stacks between the kernel and the applications, etc., can bring the entire machine down.
While some protection is provided in operating systems with the generation of exceptions in response to certain illegal actions, such as memory address violations or illegal instructions, which trigger the kernel and kill the application raising the exception, there exists an inability by operating systems to protect against the vulnerability to fatal access.
Relying on software to perform such checks reduces the ability to limit the amount of software that is trusted.
A hardware solution would be preferable, but, heretofore, has been prohibitive due to the level of instantaneous hardware machine generation that would be necessary.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system achieving individualized protected space in an operating system
  • Method and system achieving individualized protected space in an operating system
  • Method and system achieving individualized protected space in an operating system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013]The present invention relates to achieving individualized protected space in an operating system via an adaptive computing engine (ACE). The following description is presented to enable one of ordinary skill in the art to make and use the invention and is provided in the context of a patent application and its requirements. Various modifications to the preferred embodiment and the generic principles and features described herein will be readily apparent to those skilled in the art. Thus, the present invention is not intended to be limited to the embodiment shown but is to be accorded the widest scope consistent with the principles and features described herein.

[0014]In a preferred embodiment, the processing core of an embedded system is achieved through an adaptive computing engine (ACE). A more detailed discussion of the aspects of an ACE are provided in co-pending U.S. patent application Ser. No. 10 / 384,486, entitled ADAPTIVE INTEGRATED CIRCUITRY WITH HETEROGENEOUS AND RECON...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Aspects for achieving individualized protected space in an operating system are provided. The aspects include performing on demand hardware instantiation via an ACE (an adaptive computing engine), and utilizing the hardware for monitoring predetermined software programming to protect an operating system.

Description

FIELD OF THE INVENTION[0001]The present invention relates to robust operating system protection.BACKGROUND OF THE INVENTION[0002]As is generally understood in computing environments, an operating system (O / S) acts as the layer between the hardware and the software providing several important functions. For example, the functionality of an O / S includes device management, process management, communication between processes, memory management, and file systems. Further, certain utilities are standard for operating systems that allow common tasks to be performed, such as file access and organization operations and process initiation and termination.[0003]Within the O / S, the kernel is responsible for all other operations and acts to control the operations following the initialization functions performed by the O / S upon boot-up. The traditional structure of a kernel is a layered system. Some operating systems use a micro-kernel to minimize a size of the kernel while maintaining a layered ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/00
CPCG06F9/468G06F21/53G06F15/7867
Inventor MASTER, PAUL L.
Owner QST HLDG L L C
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products