The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Feb. 23, 2021

Filed:

Sep. 26, 2018
Applicant:

L3 Technologies, Inc., New York, NY (US);

Inventors:

Glenn Coleman, Berwyn, PA (US);

Peter Martz, Marlton, NJ (US);

Kenneth Moritz, Lansdowne, PA (US);

Assignee:

L3 Technologies, Inc., New York, NY (US);

Attorney:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
H04L 29/06 (2006.01); G06F 21/44 (2013.01); G06F 21/53 (2013.01);
U.S. Cl.
CPC ...
H04L 63/0876 (2013.01); G06F 21/44 (2013.01); G06F 21/53 (2013.01); H04L 63/08 (2013.01); H04L 63/107 (2013.01); H04L 63/20 (2013.01); H04L 63/0218 (2013.01); H04L 63/0227 (2013.01); H04L 63/205 (2013.01);
Abstract

Methods and systems are disclosed for endpoint protection and authentication schemes for a host computer system having an internet isolation system. A first host computer system may include a first memory space and a second memory space. The first memory space may be configured to enable storage and operation of a workspace configured to execute a first set of one or more applications and processes running on an operating system of the first host computer system. The second memory space may be configured to enable storage and operation of a second set of one or more applications and processes associated with an isolated computing environment (e.g., a sandboxed computing environment) configured to run on the operating system. When the first host computer system is connected to a network that is known or associated with a predetermined security policy, the first host computer system may instantiate a predetermined security policy configuration.


Find Patent Forward Citations

Loading…