NCR Corporation
Secure device for bypassing operating system (OS) security
Last updated:
Abstract:
A portable device having a key is interfaced to a host computing device. The host computing device detects the key on the portable device and authenticates a user for using the key. A boot is forced of the host computing device and during the boot a customized image of an Operating System (OS) for the host computing device is loaded into volatile memory of the host computing device and customized security settings are applied to the OS based on a value of the key.
Status:
Grant
Type:
Utility
Filling date:
30 May 2018
Issue date:
14 Dec 2021