The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jan. 19, 2016

Filed:

Jan. 25, 2012
Applicants:

Gianni Tedesco, Cambridge, GB;

Anushree Pole, San Jose, CA (US);

Andrew Southgate, Cambridge, GB;

Ian Pratt, Cambridge, GB;

Vikram Kapoor, Cupertino, CA (US);

Gaurav Banga, Cupertino, CA (US);

Inventors:

Gianni Tedesco, Cambridge, GB;

Anushree Pole, San Jose, CA (US);

Andrew Southgate, Cambridge, GB;

Ian Pratt, Cambridge, GB;

Vikram Kapoor, Cupertino, CA (US);

Gaurav Banga, Cupertino, CA (US);

Assignee:

Bromium, Inc., Cupertino, CA (US);

Attorneys:
Primary Examiner:
Assistant Examiner:
Int. Cl.
CPC ...
G06F 21/24 (2006.01); G06F 21/00 (2013.01); G06F 21/53 (2013.01); G06F 21/62 (2013.01); G06F 21/74 (2013.01);
U.S. Cl.
CPC ...
G06F 21/00 (2013.01); G06F 21/53 (2013.01); G06F 21/62 (2013.01); G06F 21/74 (2013.01); G06F 2221/2143 (2013.01);
Abstract

Approaches for preventing unauthorized access of sensitive data within an operating system (OS), e.g., a guest OS used by a virtual machine. Dummy data may be written over physical locations on disk where sensitive data is stored, thereby preventing a malicious program from accessing the sensitive data. Alternately, a delete operation may be performed on sensitive data within an OS, and thereafter the OS is converted into a serialized format to expunge the deleted data. The serialized OS is converted into a deserialized form to facilitate its use. Optionally, a data structure may be updated to identify where sensitive data is located within an OS. When a request to access a portion of the OS is received, the data structure is consulted to determine whether the requested portion contains sensitive data, and if so, dummy data is returned to the requestor without consulting the requested portion of the OS.


Find Patent Forward Citations

Loading…