- Menlo Park CA, US Scott A. Oberg - Paso Robles CA, US Christopher S. Lockett - Santa Clara CA, US Hassen Saidi - Menlo Park CA, US Jeffrey E. Casper - San Carlos CA, US Michael Deleo - Paso Robles CA, US
International Classification:
G06F 21/00
US Classification:
726 1
Abstract:
A policy arbitration system manages the fundamental communications and isolation between executable components and shared system resources of a computing device, and controls the use of the shared resources by the executable components. Some versions of the policy arbitration system operate on a virtualized mobile computing device to dynamically compile and implement policy rules that are issued periodically by multiple different independent execution environments that are running on the computing device. Semi-dynamic policy changes allow for context enabled policy changes that enforce the desired system and component “purpose” while simultaneously denying the “anti-purpose”.
- Menlo Park CA, US Scott A. Oberg - Paso Robles CA, US Christopher S. Lockett - Santa Clara CA, US Sean M. Forsberg - San Luis Obispo CA, US Jeffrey E. Casper - San Carlos CA, US
International Classification:
G06F 21/60 G06F 9/54
US Classification:
726 1, 719318, 726 16
Abstract:
A domain manager system as disclosed herein can control the selective activation of multiple independently-operable execution environments or domains on a computing device in accordance with one or more policies. In some embodiments, activation of a domain may at least temporarily transform a general purpose computing device into a specific purpose computing device or “appliance” by disabling use of one or more shared system resources by other domains.
- Menlo Park CA, US Christopher S. Lockett - Santa Clara CA, US Sean Forsberg - San Luis Obispo CA, US Hassen Saidi - Menlo Park CA, US Jeffrey E. Casper - San Carlos CA, US
International Classification:
G06F 21/51
US Classification:
726 22
Abstract:
An integrity verification subsystem can verify the integrity of software and firmware modules on a computing device at load time and/or at run time, independently of any operating systems that may be installed on the computing device. Some versions of the integrity verification subsystem can operate in physical and/or virtualized system environments, including virtualized mobile device architectures.