20240048573. Security Monitoring at Operating System Kernel Level simplified abstract (Comcast Cable Communications, LLC)

From WikiPatents
Jump to navigation Jump to search

Security Monitoring at Operating System Kernel Level

Organization Name

Comcast Cable Communications, LLC

Inventor(s)

James Fahrny of Parker CO (US)

Kyong Park of Woodbine MD (US)

Security Monitoring at Operating System Kernel Level - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240048573 titled 'Security Monitoring at Operating System Kernel Level

Simplified Explanation

The patent application describes methods and apparatus for real-time security monitoring on a computing device. The system defines privileges to access hardware interfaces for each process executing on the device. These privileges are defined in a privileged operating system level that controls root access to the operating system. When a process attempts to access a hardware interface, the system checks the privileges to determine if the process is allowed to access it. If the process is not privileged, an intrusion detection agent terminates the process.

  • The system defines privileges for accessing hardware interfaces for processes on a computing device.
  • Privileges are defined in a privileged operating system level that controls root access.
  • The system checks the privileges when a process attempts to access a hardware interface.
  • If a process is not privileged, an intrusion detection agent terminates the process.

Potential applications of this technology:

  • Real-time security monitoring on computing devices.
  • Preventing unauthorized access to hardware interfaces.
  • Enhancing the security of operating systems.

Problems solved by this technology:

  • Unauthorized access to hardware interfaces by processes.
  • Improving the security of computing devices.
  • Preventing malicious activities by terminating unauthorized processes.

Benefits of this technology:

  • Enhanced security for computing devices.
  • Real-time monitoring and prevention of unauthorized access.
  • Protection against malicious activities and potential threats.


Original Abstract Submitted

methods and apparatus for real-time security monitoring on a computing device are presented. a system may define privileges to access hardware interfaces for each process of a plurality of processes executing on a computing device. the privileges may be defined in a privileged operating system level that controls root access to an operating system. in response to a determination that a process is attempting to access a hardware interface, the system may determine whether the process is privileged to access the hardware interface by checking the privileges. in response to determining that the process is not privileged to access the hardware interface, the intrusion detection agent may terminate the process.