HARDWARE VIRTUALIZED ISOLATION FOR ENSURING SECURITY Russian patent published in 2021 - IPC G06F21/53 H04L12/46 

Abstract RU 2755880 C2

FIELD: computer technology.

SUBSTANCE: invention relates to the field of computer technology. Method for protecting a host device performed by a host operating system executed in the host device contains stages at which it is detected that an application executed in the host operating system is trying to access a network resource that is accessible to the host device through a network; as a reaction to the detection that the application is trying to access the network resource, it is determined whether the network resource is an untrusted network resource; as a reaction to the determination that the network resource is the untrusted network resource: a container is activated that is isolated from the host operating system, wherein the container is made with the possibility to execute an application version, and the untrusted network resource is transferred to the container, thereby allowing the application version executed in the container to access the untrusted network resource; and as a reaction to the determination that access to the untrusted network resource is completed, the container is suspended.

EFFECT: ensuring the security of the host device from malicious attacks.

26 cl, 7 dwg, 1 tbl

Similar patents RU2755880C2

Title Year Author Number
SYSTEM AND METHOD OF VIRTUALISING GRAPHIC SUBSYSTEMS 2005
  • Blit Dehvid R.
RU2406128C2
PROCESSING OF CONTENT FOR APPLICATIONS 2012
  • Risni Devid L. Ml.
  • Grekhem Skott B.
  • Zhurden Matias
  • Iskin Sermet
  • Ross Devid Endryu
RU2626658C2
METHOD OF PROVIDING SAFE EXECUTION OF SCRIPT FILE 2014
  • Ladikov Andrej Vladimirovich
  • Solodovnikov Andrej Jurevich
RU2584507C1
SECURE AND STABLE HOSTING OF THIRD-PARTY EXTENSIONS TO WEB SERVICES 2006
  • Khant Galen K.
  • Larus Dzhejms R.
  • Gounares Aleksander Dzh.
  • Ehndres Rejmond E.
RU2424556C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
RU2672712C2
MOBILE COMMUNICATION DEVICE AND METHOD FOR OPERATION THEREOF 2014
  • Stern Allon Dzh.
  • Khejli Dzhon
RU2673969C2
METHOD OF AUTHORISING OPERATION TO BE PERFORMED ON TARGETED COMPUTING DEVICE 2014
  • Stern Allon Dzh.
RU2675902C2
MANAGING STATE OF ALLOCATED HARDWARE IN VIRTUAL MACHINES 2007
  • Ouni Ehdrian Dzh.
  • Tornton Ehndrju Dzhon
  • Oshins Dzhejkob
RU2429530C2
RANSOMWARE MITIGATION IN INTEGRATED ISOLATED APPLICATIONS 2020
  • Schwartz, Jonathan David
  • Tarnouskaya, Anastasiya
RU2807463C2
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES 2007
  • Medvinskij Gennadij
  • Ilak Kristian
  • Khagiu Kostin
  • Parsonz Dzhon Eh.
  • Fatkhalla Mokhamed Ehmad Ehl' Din
  • Lich Pol Dzh.
  • Kamel' Tarek Bukhaa Ehl'-Din Makhmud
RU2439692C2

RU 2 755 880 C2

Authors

Pai, Navin Narayan

Jeffries, Charles G.

Viswanathan, Giridhar

Schultz, Benjamin M.

Smith, Frederick J.

Reuther, Lars

Ebersol, Michael B.

Diaz Cuellar, Gerardo

Pashov, Ivan Dimitrov

Gaddehosur, Poornananda R.

Pulapaka, Hari R.

Rao, Vikram Mangalore

Dates

2021-09-22Published

2017-05-25Filed