Abstract: User interaction with multiple domains is facilitated while preventing cross-domain transfer of data from those domains. A compositioning domain facilitates this interaction in a secure manner in which cross-domain transfer of data is prevented. This includes obtaining pixel information from the domains via one or more read-only communication paths, providing a user interface to the user, which includes providing a display buffer including at least some of the pixel information obtained from each domain of the domains for display to the user, and maintaining an in-focus domain state. The in-focus domain state indicates which domain of the domains is currently in-focus. User input from the user based on the user interface is provided by a user input handler directly to the currently in-focus domain indicated by the in-focus domain state absent transfer of the user input to the compositioning domain.
Abstract: Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions.
Type:
Grant
Filed:
June 23, 2010
Date of Patent:
July 2, 2013
Assignee:
Assured Information Security, Inc.
Inventors:
Ryan Matthew Wilson, Joseph James Sharkey, Michael Joseph Sieffert
Abstract: A method for locating a target wireless device is disclosed. At least one directional antenna is swept through a field of view at each of a plurality of sensing locations. A position is determined for each of the plurality of sensing locations. During the sweep at each of the plurality of sensing locations, a set of signal strength data for the target wireless device and a set of bearing information are collected. A plurality of lines of bearing are determined, one from each of the plurality of sensing locations to the target wireless device, based on the determined position, the collected set of signal strength data, and bearing information for each of the plurality of sensing locations. A target location of the target wireless device is determined based on an intersection of at least two lines of bearing from the plurality of lines of bearing.
Type:
Grant
Filed:
May 26, 2009
Date of Patent:
January 17, 2012
Assignee:
Assured Information Security, Inc.
Inventors:
Richard Michael Gloo, Jacob Michael Baker, Alexander James Williams, Jason S. Lashure, Robert James Durham, Nicholas Lawrence Owens
Abstract: Methods for reducing the impact of malware during a booting sequence for an interrupt driven computing device are disclosed. One or more parameters associated with an interrupt vector table (IVT) are manipulated to force the computing device into a clean state following a system level portion of the booting sequence. In another embodiment, occurring prior to the loading of an operating system or a call to a non-returnable main( ) function, one or more unused interrupt vectors in an IVT are replaced. A function filter is implemented for one or more interrupt vectors in the IVT to disallow unnecessary interrupt functions from being executed. One or more required interrupt vector functions are replaced with one or more corresponding custom vector functions. One or more memory locations are wiped if the one or more memory locations do not hold at least a portion of the IVT and/or the interrupt vector functions.
Type:
Application
Filed:
June 23, 2010
Publication date:
December 29, 2011
Applicant:
Assured Information Security, Inc.
Inventors:
Ryan Matthew WILSON, Joseph James Sharkey, Michael Joseph Sieffert