18045228. GENERATING ALERTS FOR UNEXPECTED KERNEL MODULES simplified abstract (HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP)

From WikiPatents
Revision as of 03:52, 16 April 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

GENERATING ALERTS FOR UNEXPECTED KERNEL MODULES

Organization Name

HEWLETT PACKARD ENTERPRISE DEVELOPMENT LP

Inventor(s)

Geoffrey Ndu of Bristol (GB)

[[:Category:Gustavo Kn�ppe of Porto Alegre (BR)|Gustavo Kn�ppe of Porto Alegre (BR)]][[Category:Gustavo Kn�ppe of Porto Alegre (BR)]]

GENERATING ALERTS FOR UNEXPECTED KERNEL MODULES - A simplified explanation of the abstract

This abstract first appeared for US patent application 18045228 titled 'GENERATING ALERTS FOR UNEXPECTED KERNEL MODULES

Simplified Explanation

The abstract of the patent application describes a process where an operating system kernel determines a hash digest for a kernel module in response to a request to load it. The kernel module is associated with a name, and the kernel checks if an expected kernel module list contains an entry with the name and hash digest. If the entry is not found, an alert is generated.

  • The process involves an operating system kernel determining a hash digest for a kernel module.
  • The kernel module is linked to a specific name.
  • The operating system kernel checks if the expected kernel module list contains an entry with the name and hash digest.
  • If the entry is not found in the list, an alert associated with the kernel module is generated.

Potential Applications

This technology could be applied in secure loading and verification of kernel modules in operating systems.

Problems Solved

This technology helps ensure the integrity and authenticity of kernel modules by verifying their hash digests before loading them.

Benefits

- Enhanced security by verifying kernel modules before loading. - Prevention of unauthorized or malicious kernel modules from being loaded.

Potential Commercial Applications

"Secure Kernel Module Loading and Verification Technology for Operating Systems"

Possible Prior Art

There may be prior art related to secure loading and verification of software modules in operating systems, but specific examples are not provided in this context.

Unanswered Questions

How does this technology impact system performance?

The abstract does not mention the potential impact on system performance when implementing this process.

Are there any compatibility issues with different operating systems?

The abstract does not address whether this process is compatible with various operating systems or if there are any limitations in implementation.


Original Abstract Submitted

A process includes, responsive to a request to load a kernel module, determining, by an operating system kernel, a hash digest for the kernel module. The kernel module is associated with a name. The process includes determining, by the operating system kernel, whether an expected kernel module list contains an entry that contains the name and associates the name with the hash digest. The process includes, responsive to the determination of whether the expected kernel module list contains the entry, generating, by the operating system kernel, an alert that is associated with the kernel module.