PROVISION FOR PROTECTED INPUT INTO SYSTEM WITH HIGHLY RELIABLE PROGRAM EXECUTION ENVIRONMENT Russian patent published in 2009 - IPC G06F21/22 H04L9/32 

Abstract RU 2365988 C2

FIELD: information technology.

SUBSTANCE: invention relates to computer engineering, and generally to computer security. The method of providing for protected input comprises stages on which: a data stream entered by a user is received from a trusted input device in a second program execution environment; the received stream is sent from the second program execution environment to a protected program execution environment; determination is made of whether the protected program execution environment is in standard input mode; the initial data stream entered by the user is sent to the protected program execution environment based on the input mode of the latter; if the protected environment is in standard input mode, then at least the first part of data entered by the user is sent to the second program execution environment; determination is made of whether the data entered by the user contain user instruction for highly reliable input mode (NIM) and if so, and the protected program execution environment is not in highly reliable input mode, the protected program execution environment is switched to highly reliable input mode.

EFFECT: increased security level of computers.

38 cl, 6 dwg

Similar patents RU2365988C2

Title Year Author Number
MAINTENANCE OF SECURE INPUT AND OUTPUT FOR ENTRUSTED AGENT IN SYSTEM WITH HIGHLY RELIABLE ENVIRONMENT OF PROGRAMS EXECUTION 2004
  • Uillmehn Brajan M.
  • Chu Kristin M.
  • Rej Kennet D.
  • Roberts Pol K.
RU2365045C2
INTEGRATION OF HIGHLY RELIABLE FUNCTIONS INTO APPLICATION THROUGH APPLICATION DISSECTION 2004
  • Rej Kennet D.
  • Pejnado Markus
  • Inglend Pol
  • Kurien Tkhekktkhalakhal Varugis
RU2367006C2
AUTHENTICITY DISPLAY FROM HIGHLY RELIABLE MEDIUM TO NON-SECURE MEDIUM 2004
  • Uilmehn Brajan Mark
  • Inglend Pol
  • Rej Kennet D.
  • Kaplan Kejt
  • Kurien Varugis
  • Marr Majkl Dehvid
RU2390836C2
PRESENTATION OF GRAPHICAL USER INTERFACE IN SYSTEM WITH HIGHLY PROTECTED EXECUTION MEDIUM 2004
  • Uillman Brajan M.
  • Ch'Ju Kristin M.
  • Avrakham Idan
  • Roberts Pol K.
RU2376631C2
METHOD FOR AUTOMATIC ADJUSTMENT OF SECURITY MEANS 2012
  • Zajtsev Oleg Vladimirovich
RU2514137C1
PROMOTION OF INTERACTION FOR SYSTEM SERVICE REQUEST FOR HARDWARE-PROTECTED APPLICATIONS 2012
  • Baumann Endryu A.
  • Khant Galen K.
  • Pejnado Markus
RU2621001C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING ENCRYPTION KEY 2017
  • Novak, Mark, F.
RU2756048C2
ADDRESSING TRUSTED EXECUTION ENVIRONMENT USING SIGNATURE KEY 2017
  • Novak, Mark, F.
RU2756040C2
ON-LINE COMMERCIAL TRANSACTIONS 2006
  • Dzhonson Brjus Eh.
  • Vebster-Lehm Chung
RU2402814C2
SYSTEM AND METHOD FOR PROTECTION FROM NON-TRUSTED SYSTEM CONTROL MODE CODE BY MEANS OF REDIRECTION OF SYSTEM MANAGEMENT MODE INTERRUPT AND CREATION OF VIRTUAL MACHINE CONTAINER 2003
  • Satton Ii Dzhejms
  • Graurok Dehvid
  • Ulig Richard
  • Pojsner Dehvid
  • Glu Ehndrju
  • Kholl Klifford
  • Smit Iii Lorens
  • Nejger Gilbert
  • Kozukh Majkl
  • Dzhordzh Robert
  • Berdzhess Brehdli
RU2313126C2

RU 2 365 988 C2

Authors

Chu Kristin M.

Jamamoto Khirofumi

Avrakhehm Idan

Paff Dzhon E.

Roberts Pol K.

Dates

2009-08-27Published

2004-10-22Filed