US 12,231,445 B2
Security monitoring at operating system kernel level
James Fahrny, Parker, CO (US); and Kyong Park, Woodbine, MD (US)
Assigned to Comcast Cable Communications, LLC, Philadelphia, PA (US)
Filed by Comcast Cable Communications, LLC, Philadelphia, PA (US)
Filed on Oct. 18, 2023, as Appl. No. 18/489,727.
Application 18/489,727 is a continuation of application No. 16/991,592, filed on Aug. 12, 2020, granted, now 11,831,659.
Application 16/991,592 is a continuation of application No. 15/047,138, filed on Feb. 18, 2016, granted, now 10,771,478, issued on Sep. 8, 2020.
Prior Publication US 2024/0048573 A1, Feb. 8, 2024
This patent is subject to a terminal disclaimer.
Int. Cl. H04L 9/40 (2022.01); G06F 21/53 (2013.01); G06F 21/54 (2013.01); G06F 21/55 (2013.01); G06F 21/57 (2013.01); G06F 21/64 (2013.01); H04L 9/32 (2006.01); H04W 12/06 (2021.01)
CPC H04L 63/1416 (2013.01) [G06F 21/53 (2013.01); G06F 21/54 (2013.01); G06F 21/552 (2013.01); G06F 21/554 (2013.01); G06F 21/57 (2013.01); G06F 21/64 (2013.01); H04L 9/3239 (2013.01); H04L 63/0823 (2013.01); H04L 63/101 (2013.01); H04W 12/06 (2013.01); G06F 2221/2141 (2013.01); H04L 63/126 (2013.01)] 51 Claims
OG exemplary drawing
 
1. A method comprising:
storing, by a computing device, encrypted data indicative of a plurality of privileges associated with a process accessing a plurality of resources of the computing device;
based on the process attempting to access a first resource of the plurality of resources of the computing device, determining, using the encrypted data, that the process is privileged to access the first resource; and
allowing, based on the determining that the process is privileged, the process to access the first resource.