The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Aug. 14, 2018

Filed:

Mar. 17, 2017
Applicant:

Lynx Software Technologies, Inc., San Jose, CA (US);

Inventors:

Edward T. Mooring, Santa Clara, CA (US);

Craig Howard, Belmont, CA (US);

Assignee:
Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 21/52 (2013.01); H04L 29/06 (2006.01); G06F 9/455 (2018.01); H04L 29/00 (2006.01); G06F 9/50 (2006.01);
U.S. Cl.
CPC ...
H04L 63/20 (2013.01); G06F 9/455 (2013.01); G06F 9/45545 (2013.01); G06F 9/45558 (2013.01); G06F 9/50 (2013.01); H04L 29/00 (2013.01); H04L 63/1416 (2013.01); G06F 2009/45587 (2013.01); G06F 2009/45591 (2013.01);
Abstract

Systems, methods, computer readable media and articles of manufacture consistent with innovations herein are directed to computer virtualization, computer security and/or memory access. According to some illustrative implementations, innovations herein may utilize and/or involve a separation kernel hypervisor which may include the use of a guest operating system virtual machine protection domain, a virtualization assistance layer, and/or a instruction execution detection/interception mechanism (which may be proximate in temporal and/or spatial locality to malicious code, but isolated from it). The instruction execution detection/interception mechanism may perform processing, inter alia, for detection and/or notification of, and actions upon by a monitoring guest, code execution by a monitored guest involving predetermined physical memory locations, such as API calls. Such actions may include interception of API calls within the monitored guest and simulation thereof by the monitoring guest or another authorized guest.


Find Patent Forward Citations

Loading…