4,962.533 16/1996 Krueger Et Al...307 Multi-Level Multimedia Security

Total Page:16

File Type:pdf, Size:1020Kb

4,962.533 16/1996 Krueger Et Al...307 Multi-Level Multimedia Security USOO5369702A United States Patent 19 11 Patent Number: 5,369,7029 9 Shanton 45 Date of Patent: Nov. 29, 1994 54 DISTRIBUTED CRYPTOGRAPHIC OBJECT 5,204,961 4/1993 Barlow ............................... 380/4X METHOD OTHER PUBLICATIONS 75 Inventor: M. Greg Shanton, Fairfax, Va. Massey, "An Introduction to Contemporary Cryptol 73 Assignee: TECSEC Incorporated, Vienna, Va. ogy,” Proceeding of the IEEE, May 1988, pp. 533-549. a Schneier, “Untangling Public-Key Cryptography,” Dr. 21 Appl. No.: 138,857 Dobb's Journal, May 1992, pp. 16-28. 22 Filed: Oct. 18, 1993 Primary Examiner-Bernarr E. Gregory 51) Int. C. ............................................... H04L 9/00 Attorney, Agent, or Firm-Thomas M. Champagne; Jon 52 U.S. C. ........................................... 380/4; 380/9, L. Roberts 380/21: 380/23;380/56,346/8353.340/825.34 380/25; 380/28; 380/49; 57 ABSTRACT 58 Field of Search ..................... 380/4, 9, 21, 23, 25, A system for increasing the security of a computer 380/28, 30, 43, 49, 50, 340/825.31, 825.34 system, while giving an individual user a large amount 56 Ref Ci of flexibility and power. To give users the most power 56) eferences Cited and flexibility, a standard object that has the capability U.S. PATENT DOCUMENTS to embed objects is used. To allow users even more 4,218,582 8/1980 Hellman et al. ...................... 380/30 flexibility, a standard object tracking mechanism is used 4,405,829 9/1983 Rivest et al. .......................... 380/30 that allows users to distribute multiple encrypted em 4,424,414 1/1984 Hellman et al. ...................... 380/30 bedded objects to other individuals in a single se E. 3. I real a - a 3. crypted object. By effecting compartmentalization of 4555,082 9/1990 Hattorietal.".455/33.3 every object by label attributes and algorithm attributes, 4,962.533 16/1996 Krueger et al... .307 multi-level multimedia security is achieved. 4,984,272 1/1991 McIlroy et al........................ 380/25 5,052,040 9/1991 Preston et al. .......................... 380/4 15 Claims, 8 Drawing Sheets O 8 6 OBJECT CONTAINER CIPHERTEXT EBEDDING OBJEC ATA CBEC MECHANISM EPORARY EBEDED CBEC OOKEYMAN I-LEVE I-MEDIA SECURITY INTERFACE OOKEYMAN OBJECT EPORARY PREVIEW PLAN EXT S DATA OBEC ECRYPT OOKEYMAN AUTO-APPLICATION INTERFACE AUTHENCATED PLAINTEXT APPLICATION CBECT DATA OBJEC U.S. Patent Nov. 29, 1994 Sheet 1 of 8 5,369,702 O 8 6 CONTAINER CIPHER EXT OBJECT OBJECT DATA OBJECT ES TEMPORARY EMBEDDED OBJECT OOKEYMAN MULTI-LEVEL MULTI-MEDIA SECURITY INTERFACE 6 2 OOKEYMAN OBJECT TEMPORARY PLAIN TEXT Pre DATA OBJECT DECRYPT 4 OOKEYMAN AUTO-APPLICATION INTERFACE 8 AUTHENTICATED APPLICATION PLAIN TEXT OBJECT DATA OBJECT FIG. U.S. Patent Nov. 29, 1994 Sheet 2 of 8 5,369,702 CONTAINER CIPHER TEXT OBJECT TEMPORARY OBJEC DATA OBJECT ES EE STANDARD FILE ASSOCIATION OOKEYMAN OOKEYMAN GET OBJECT TEMPORARY OBJECT PATH PREVIEW OECRYPT DATA OBJECT MATCH DATA OBJECT TO APPROPRIATE APPLICATION OBJECT AUTHENTICATED APPLICATION PLAIN TEXT OBJECT DATA OBJECT FIG. 2 U.S. Patent Nov. 29, 1994 Sheet 3 of 8 5,369,702 ( LEVE 5 LEVE 4 (s LEVE 4 LEVE A LEVEL 3 LEVEL 3 LEVEL 2 LEVEL FIG. 3 U.S. Patent Nov. 29, 1994 Sheet 4 of 8 5,369,702 U.S. Patent Nov. 29, 1994 Sheet 6 of 8 5,369,702 &) &) & &) & & &) @ & &) U.S. Patent Nov. 29, 1994 Sheet 8 of 8 5,369,702 HEJM0dNOIIWIS §NIHBHNI9NGTIMIO & NOIIWHI?INIWOW &) 103HIONI 5,369,702 1. 2 the algorithm used to encrypt and decrypt plain text DISTRIBUTED CRYPTOGRAPHIC OBJECT objects. Thus, a user who wants to encrypt an object or METHOD decrypt an object must first access the key manager so that an encryption algorithm may be chosen. FIELD OF THE INVENTION Simple encryption of data being communicated be The present invention relates generally to a system tween two points only provides one level of security, that can be used to restrict access to computer data. In however. Encryption limits data communication to particular, the system of the present invention restricts those who have the key. Anyone who has the key is access in a flexible way, identifying objects for restric privy to any communication at any location. That is, if tion and nesting restriction requirements through the 0. a group of people are working on a particular project, use of embedded objects. they will all presumably share a key for decrypting information relating to the project. Some of the project BACKGROUND OF THE INVENTION group may be working in one location, while the rest of While the specter of “spies' eagerly trying to obtain the group may be located in a distant city. If one mem the defense information of various countries is very 15 ber of the group wants to send a communication to a much still present in the defense and intelligence com particular member in the other city, the key will afford munity, an equally massive threat now exists from tech him no protection because everyone in the project nological or commercial “spies' who desire to obtain shares the same key. Likewise, if someone wants to commercial and technical information from competing communicate a message to a subset of the group, for companies. These agents use sophisticated means simi 20 example, only to management personnel, this key would lar to those used by the defense and intelligence com again provide her with no extra security. In another munity in order to obtain commercially valuable infor case, someone may want to send a message that is capa mation that reveals the plans and commercial activities ble of being read only at a particular computer terminal, of competitors thereby allowing the aggressor company or of being printed only at a particular printer. In these to obtain a competitive advantage in the marketplace. 25 Theft of commercially valuable information is a very and other cases, multilevel multimedia key access, or real and ever present threat. individual keys issued to each person, would provide a To combat this type of commercial spying, various solution, albeit one that is quite unwieldy, inflexible, and complex systems have evolved to protect company difficult to manage by a security officer or key adminis proprietary information. These systems involve physi 30 trator. cal controls over personnel as well as over the data A secure method of labelling files or messages that flowing in and out of a company. For example, most are sent from a sending user to a receiving user over a computer systems used within companies require a pass network can provide a level of protection in addition to word to be entered before the system can be accessed. It cryptographic protection. A file "label' for purposes of is frequently the case that confidential or company 35 this invention means a series of letters or numbers, proprietary information must be passed electronically which may or may not be encrypted, separate from but from one location to another in order to convey that associated with the sending of a message, which identi information within the company in a timely fashion. fies the person, location, equipment, and/or organiza Such electronic communication is easily susceptible to tion which is permitted to receive the associated mes interception if not protected in some other form. Sage. Using a secure labelling regimen, a network man Cryptographic systems have evolved to fill the needs ager or user can be assured that only those messages of companies and individuals wanting to protect the meant for a certain person, group of persons, and/or proprietary commercial information of a company from location(s) are in fact received, decrypted, and read by competitors and those who generally should not have the intended receiver. Thus, a sending user can specify that information. 45 label conditions that limit access to the transmitted Encryption of data is therefore a critical requirement message. For example, many people within a company in denying access to confidential information from those may have the key necessary to read a data file that a who are not so authorized. Cryptographic "keys” are sender may transmit from his computer terminal to an essential part of the information encryption process. other terminals at another site within his company. The The cryptographic key, or "key' for short, is a se 50 sender may, however, wish to restrict reception to quence of letters, numbers, or bytes of information those persons present at a particular terminal. By em which are manipulated by a cryptographic algorithm to ploying a secure labelling technique in addition to en transform data from plain (readable) text to a series of cryption, the sender can be assured that people having unintelligible text or signals known as encrypted or the correct key to decrypt the message but working at cipher text. The key is then used by the receiver of the 55 different terminals will not receive or be allowed to cipher text to decrypt the message back to plain text. access the communication. Access may be limited to However, for two people to communicate successfully particular people as well. using keys, each must use the same key, assuming that A system such as that described above is disclosed in the same encryption/decryption algorithm is used on U.S. patent application Ser. No. 08/009,741, filed Jan. both ends of the communication. 27, 1993, the specification of which is incorporated by Various methods have evolved to manage the distri reference herein. bution of keys. Such methods of distribution are collec A system that can limit access on an object level tively referred to as "key management'. The function would be more flexible and would offer still more pro of key management is to perform the process of generat tection.
Recommended publications
  • Curriculum Vitae
    CURRICULUM VITAE Amr El Sayed Abdel Latif PERSONAL DATA Address :The American University in Cairo, Social Research Center, P.O. BOX 2511, Cairo, Egypt. Phone (202) 2763-5157 (Home ) (202) 2615-1405 (Work ) (20100)373-2775 (Mob) Birth date : Nov. 17.1970 Nationality : Egyptian E-mail: [email protected] EDUCATION Oct 1996 Cairo University Oct 1997 Institute of Statistical Studies and Research. Qualifying studies for master degree Oct 1994 Cairo University May 1996 Institute of Statistical Studies and Research. Diploma in demography Sept 1988 Cairo University May 1993 Faculty of Science BS - Mathematical Statistics (Very Good) WORK EXPERIENCE Official Work May 1997 The American University In Cairo To date Social Research Center Officer, Research, Field & Training Amr el sayed 1 July 1993 Cairo Demography Center May 1997 Research Assistant June 1996 Saudi Arabia Sept 1996 Project of planning, Abha Data coordination and analysis Experience I have an intensive experience in working (as data analyst, using the SPSS) with Demographic and Health Survey (DHS) and the Maternal and Child Health Surveys (PAPCHILD) Data files of Egypt and other countries, as well to design data entry programs and worked as data analysis trainer in many workshops. Teaching classes - Teaching SPSS, Stata and Spectrum classes to the participants in the "Research Methods Workshop”, from 2000 till 2017. - Teaching SPSS Classes in the following: - The Social Fund for Development - Yemen, 2006. - Faculty of Economics and Political Sciences - Cairo University, 2010.
    [Show full text]
  • Como Entender As Denúncias De Vigilantismo Global
    PROTEÇÃO DE DADOS A BITCOIN e-SAÚDE na União Europeia pode derrubar os EUA e privacidade no Brasil o instituto nupef é uma organização sem fi ns Uma publicação do Instituto Nupef • outubro / 2013 • www.politics.org.br de lucro dedicada à refl exão, análise, produção de conhecimento e formação, principalmente centradas em questões relacionadas às tecnologias da informação e Comunicação (tiCs) e suas relações políticas com os direitos humanos, a democracia, o desenvolvimen- to sustentável e a justiça social. além de realizar cursos, eventos, desenvolver pesquisas e estudos de caso, o nupef edita a politiCs, a rets (revista do terceiro setor) e mantém o projeto tiwa – provedor de serviços internet voltado exclusivamente para instituições sem fi ns lucrativos – resultado de um trabalho iniciado há 21 anos, com a criação do alternex (o pri- meiro provedor de serviços internet aberto ao público no Brasil). o tiwa é um provedor comprometido prioritariamente com a pri- vacidade e a segurança dos dados das entidades associadas; com a garantia de sua liberdade de expressão; com o uso de software livre e de plataformas abertas não-proprietárias. Tecnologias e pessoas com defi ciência: questão política rua sorocaba 219, 501 | parte | Botafogo | CeP 22271-110 | rio de Janeiro | rJ | Brasil Como entender telefone/fax +55 (21) 3259-0370 | www.nupef.org.br as denúncias de vigilantismo global nº16 EDITOR CARLOS A. AFONSO CAPA, PROJETO GRÁFICO E DIAGRAMAÇÃO MONTE DESIGN DISTRIBUIÇÃO VIVIANE GOMES Índice TRADUÇÕES RICARDO SILVEIRA 02 >Como entender as denúncias Esta é uma publicação do Instituto Nupef. de vigilantismo global Versão digitalizada disponível em www.politics.org.br e no sítio do Nupef - www.nupef.org.br Pedro Antonio Dourado de Rezende Para enviar sugestões, críticas ou outros comentários: [email protected] >10 Rua Sorocaba, 219 | 501 - parte | Botafogo | 22271-110 Sugestões relativas às políticas públicas brasileiras sobre Rio de Janeiro RJ Brasil | telefone +55 21 2527-0294 tecnologias assistivas para pessoas com deficiência visual Apoio: Fernando H.
    [Show full text]
  • Closed Systems January 1St, 2021
    1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 Enhanced DR-DOS 7.01.07 2005 2006 2007 2008 2009 2010 2011 Enhanced DR-DOS 7.01.08 2012 2013 2014 2015 2016 2017 2018 2019 2020 FreeDOS alpha 0.05 DR-DOS/OpenDOS 7.01.01 march 6, 2005 july 21, 2011 FreeDOS FreeDOS alpha 0.1 FreeDOS alpha 0.2 FreeDOS beta 0.3 FreeDOS beta 0.4 FreeDOS beta 0.5 FreeDOS beta 0.6 FreeDOS beta 0.7 FreeDOS beta 0.8 july 2002 FreeDOS beta 0.9 FreeDOS 1.0 FreeDOS 1.1 january 12, 1998 april 21, 1999 FreeDOS 1.2 DR-DOS 3.41 june 29, 1994 march 25, 1998 october 28, 1998 april 9, 2000 august 10, 2000 march 18, 2001 september 7, 2001 april 7, 2002 september 28, 2004 september 3, 2006 january 2, 2012 december 25, 2016 DOS Plus 1.0 DOS Plus 2.01 DR-DOS 3.31 DR-DOS 5.0 DR-DOS 6.0 Novell DOS 7.0 OpenDOS 7.01 Caldera DR-OpenDOS 7.02 DR-DOS 7.04 DR-DOS 7.05 DR-DOS 8.0 DR-DOS 8.1 1985 may 28, 1988 june 1989 may 1990 december 1993 february 1997 december 1997 Caldera DR-DOS 7.02 DR-DOS 7.03 november 30, 1999 october 2005 september 1991 march 1998 january 6, 1999 august 19, 1999 march 30, 2004 Xbox Xbox Xbox Xbox 360 (announced) Xbox Xbox 360 Xbox One (beta) (announced) november 15, 2001 (announced) march 9, 2000 may 12, 2005 november 22, 2005 november 22, 2013 october 1999 january 6, 2001 Windows Embedded for Point of Service Windows Server 2008 Foundation april 1, 2009 MS-DOS 1.24 MS-DOS 1.25 MS-DOS 2.01 MS-DOS 2.11 MS-DOS 3.05 MS-DOS 3.3 MS-DOS 3.3 MS-DOS 3.31 MS-DOS 4.01 MS-DOS 5.0 MS-DOS 5.0a MS-DOS
    [Show full text]
  • Windows Phone 8.1 Enterprise Device Management Protocol
    Windows Phone 8.1 Enterprise Device Management Protocol Version: Windows Phone 8.1 GDR2 Last updated: February 1, 2016 Proprietary Notice © 2015 Microsoft. All rights reserved. This document is provided “as-is”. Information and views expressed in this document, including URL and other Internet website references, may change without notice. You bear the risk of using it. Some examples depicted herein are provided for illustration only and are fictitious. No real association or connection is intended or should be inferred. This document does not provide you with any legal rights to any intellectual property in any Microsoft product. You may copy and use this document for your internal, reference purposes. This document is confidential and proprietary to Microsoft. It is disclosed and can be used only pursuant to a non-disclosure agreement. Contents Windows Phone 8.1 Enterprise Device Management Protocol ......................................................................................... 1 Summary .................................................................................................................................................................................................. 1 Connecting to the management infrastructure (enrollment) ............................................................................................. 2 Conceptual flow ................................................................................................................................................................................ 2
    [Show full text]
  • N.S.A. Able to Foil Basic Safeguards of Privacy on Web - Nytimes.Com
    N.S.A. Able to Foil Basic Safeguards of Privacy on Web - NYTimes.com http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryp... HOME PAGE TODAY'S PAPER VIDEO MOST POPULAR U.S. Edition Try a Digital Subscription Log In Register Now Help Search All NYTimes.com U.S. WORLD U.S. N.Y. / REGION BUSINESS TECHNOLOGY SCIENCE HEALTH SPORTS OPINION ARTS STYLE TRAVEL JOBS REAL ESTATE AUTOS POLITICS EDUCATION TEXAS N.S.A. Able to Foil Basic Safeguards of Privacy on Web Log in to see what your friends are sharing Log In With Facebook on nytimes.com. Privacy Policy | What’s By NICOLE PERLROTH , JEFF LARSON and SCOTT SHANE This? Published: September 5, 2013 1466 Comments The National Security Agency is winning its long-running secret war FACEBOOK What’s Popular Now on encryption, using supercomputers, technical trickery, court orders TWITTER On Syria Vote, Doug Stanhope’s and behind-the-scenes persuasion to undermine the major tools Trust, but Verify ‘Beer Hall GOOGLE+ Putsch,’ a protecting the privacy of everyday communications in the Internet Stand-Up Album SAVE age, according to newly disclosed documents. E-MAIL Enlarge This Image The agency has circumvented or SHARE cracked much of the encryption, or MOST E-MAILED MOST VIEWED PRINT digital scrambling, that guards global 1. Harvard Business School Case Study: commerce and banking systems, REPRINTS Gender Equity protects sensitive data like trade secrets and medical records, and automatically secures the 2. 3 Quiet Museums in Rome e-mails, Web searches, Internet chats and phone calls of Associated Press Americans and others around the world, the documents This undated photo released by the show.
    [Show full text]
  • Digital Review of Asia Pacific 2007-2008
    DIGITAL REVIEW of ri LA V i. L I 2007 2008 REPORTS ON 31 ECONOMIES 2 SUB-REGIONAL ASSOCIATIONS ICT4D in Asia Pacific: An Overview of Emerging Issues Mobile and Wireless Technologies for Development in Asia Pacific The Role of ICTs in Risk Communication in Asia Pacific I Localization in Asia Pacific I I Key Policy Issues in I Intellectual Property and Technology in Asia Pacific I State and Evolution of ICTs: A Tale of Two Asias ARCHIV 127081 www.digital-review.org DIGITAL REVIEW of Asia acjfic 2007-2008 I Supplementary news, reports and analyses are available for download at: http ://www. digital-review. org DIGITAL REVIEW of As 2007—2008 <dirAP> CHIEF EDIToR: Felix Librero CONTRIBUTING AUTHORS: ASSOCIATE EDITOR: Patricia B. Arinto Frederick John Abo Salman Malik EDITORIAL BOARD: Musa Abu Hassan Muhammad Aimal Marjan Ilyas Ahmed Jamshed Masood Danny Butt Zorayda Ruth Andam Ram Mohan Claude-Yves Charron Lkhagvasuren Ariunaa Charles Mok Suchit Nanda Batpurev Batchuluun Rapin Mudiardjo Maria Ng Lee Hoon Axel Bruns Frederick Noronha Milagros Rivera Danny Butt Them Oo Rajesh Sreenivasan Donny B.U. Sushil Pandey Knshnamurthy Sriramesh Elizabeth V. Cardoza Adam Peake Jian Yan Wang Claude-Yves Charron Phonpasit Phissamay Kapil Chawla Gopi Pradhan Masoud Davarinejad Ananya Raihan Deng Jianguo Naomi Robinson Massood Saffari Hj Abd Rahim Derus Lorraine Carlos Joâo Câncio Freitas Salazar George Sciadas John Fung Basanta Shrestha Atanu Garai Abhishek Singh Goh Seow Hiong Rajesh Sreenivasan Lelia Green Krishnamurthy Sriramesh Nalaka Gunawardene Tan
    [Show full text]
  • Copyrighted Material
    74593bindex.fm Page 335 Friday, January 11, 2008 9:25 AM Index A overview of, 69–70 ABOUT_command, PowerShell, 188 policies and system management. See policies, access management, new features, 205 Active Directory ACLs (access control lists) read-only domain controllers, 81–82 Active Directory auditing, 73 restartable AD Domain Service, 87–88 iSCSI using, 64 roles, 79–84 security settings for, 218 TS Remote App deployment using, 275 system ACLs, 73, 204 Windows Deployment Services requiring, ACPI (Advanced Configuration and Power 49–51 Interface) 2.0, 11 AD CS (Active Directory Certificate Services), 80, ACT (Application Compatibility Toolkit) 5.0 82–83 deployment with, 41 AD DS (Active Directory Domain Service) overview of, 36–38 creating domain controller, 76–77 using shimming engines, 311 integrated authorization with, 79–80 actions, specifying Task Scheduler, 174–175 restartable, 87–88 Activate Server wizard, 287–288 TS Web Access with, 281 Active Directory. See AD (Active Directory) AD DS Installation wizard, 76–79 Active Directory Application Mode (ADAM), 84 AD FS (Active Directory Federation Services), 82 Active Directory Certificate Services (AD CS), 82 AD RMS (Active Directory Rights Management Active Directory Domain Services detail panel, Services), 223–224 Server Manager, 157–158 ADAM (Active Directory Application Mode), 81 Active Directory Federation Services (AD FS), 82 Add Features wizard, 241, 247–249 Active Directory Rights Management Services (AD Add Print Driver wizard, 233 RMS), 223–224 Add Printer wizard, 230 Active
    [Show full text]
  • PDF Download Microsoft Windows 7 1St Edition Pdf Free Download
    MICROSOFT WINDOWS 7 1ST EDITION PDF, EPUB, EBOOK Gary B Shelly | 9781439081075 | | | | | Microsoft Windows 7 1st edition PDF Book Have more questions? Touch, type, click, or pen—choose whatever fits your style. Microsoft Windows family. Archived from the original on February 9, Windows Vista was released on November 30, to business customers - consumer versions followed on January 30, One of the more notable new features was the addition of Internet Connection Sharing , a form of network address translation , allowing several machines on a LAN Local Area Network to share a single Internet connection. Follow Microsoft Windows. Windows Server Blog. Please select an option. PCs originally built with Windows 7 are running year-old technology. Windows Server R2, an update of Windows Server , was released to manufacturing on December 6, This book will serve as a reference and guide for those who want to utilize Windows 7. One major difference between Vista and earlier versions of Windows, Windows 95 and later, is that the original start button was replaced with the Windows icon in a circle called the Start Orb. Back up your files and photos Save your personal files and photos to OneDrive or to an external hard drive. Here's our review of the OS". On October 26, , Microsoft released Windows 8 to the public. You are connected as. The Win32 API had three levels of implementation: the complete one for Windows NT, a subset for Chicago originally called Win32c missing features primarily of interest to enterprise customers at the time such as security and Unicode support, and a more limited subset called Win32s which could be used on Windows 3.
    [Show full text]
  • Closed Systems January 1St, 2021
    1980 1981 QDOS 0.1 86-DOS 0.3 86-DOS 1.0 PC-DOS 1.00 august 1980 december 1980 april 1981 august 12, 1981 Interface Manager (development) september 1981 Closed Systems January 1st, 2021 Éric Lévénez 2000-2021 <http://www.levenez.com/windows/> 1982 1983 MS-DOS 1.24 MS-DOS 1.25 MS-DOS 2.01 MS-DOS 2.11 june 1982 july 1982 may 1983 december 1983 MS-DOS 2.12 1983 PC-DOS 1.10 PC-DOS 2.0 PC-DOS 2.10 june 1982 march 1983 october 1983 Windows (announced) november 10, 1983 1984 1985 DOS Plus 1.0 1985 MS-DOS 3.05 november 1984 PC-DOS 3.0 PC-DOS 3.10 august 1984 november 1984 Windows 1.0 Windows 1.01 november 20, 1985 1985 1986 1987 DOS Plus 2.01 MS-DOS 3.3 MS-DOS 3.3 MS-DOS 3.31 (announced) august 1987 november 1987 april 2, 1987 PC-DOS 3.20 PC-DOS 3.30 january 1986 april 1987 Windows 2.0 Windows 1.03 Windows 2.0 1986 (announced) april 2, 1987 december 9, 1987 Windows /386 Windows /386 2.0 (announced) december 9, 1987 april 2, 1987 PC-MOS 1.02 PC-MOS/386 5.01 1987 february 1987 MS OS/2 1.0 (CP/DOS) april 2, 1987 1988 1989 DR-DOS 3.31 DR-DOS 3.41 may 28, 1988 june 1989 MS-DOS 4.01 december 1988 MS-DOS 4.1 1988 PC-DOS 4.0 august 1988 Windows /286 2.1 june 28, 1988 Windows /386 2.1 june 28, 1988 Windows Windows N-Ten Windows NT (alpha) (alpha) (alpha) november 1988 january 1989 april 1989 OS/2 1.1 SE OS/2 1.1 EE OS/2 1.2 (Trimaran) 1989 (Sloop) october 31, 1988 october 1989 1990 1991 DR-DOS 5.0 DR-DOS 6.0 may 1990 september 1991 MS-DOS 5.0 june 1991 Windows 3.0 Windows 3.0 (+ Multimedia Extensions) may 22, 1990 october 20, 1991 Windows NT (announced)
    [Show full text]
  • Microsoft Windows Cairo Product Planning
    Microsoft® Windows Cairo Product Planning Product Requirements Ao’vanced Systems Bus:wess Unit Program Ma/zagement Version 7 March S, 1993 Distribution: L~m~ted to Microsoft Advanced Systems © Copyr~ht Microsoft ~ion, 1993 All Rights Reserved Microsoft Confidential Note: This is a product p~annlng clocument for a software system tha! is st~ll in development. Some of the intom~atiofl in this ~ument~n may be inaccurate or may not be an accurate representatio~ of the functionality of the final retail product. Microsoft assumes no responsibility for any damages that nught occur either directly or indirectly from these inaccuracies. MS 004281 rPlaintiff,s Exhibit-~ CONFIDENTIAL 5542 Comes V. Microsoft Contents I. ProductCa~’s Ove~w~w ~mon . Gres LobdeL!................................................................................................................... ................................................................................................ I I T~ge~ ~ ..................................................................................................................... U~ ~ ~ B~fi~ ...........................................................................................2 ~ A~ ..........................................................................................................6 S~ .........................................................................................................................? ~ P~ ..........................................................................................................8 ~
    [Show full text]
  • Closed Systems February 8, 2003
    QDOS 0.1 86-DOS 0.3 86-DOS 1.0 PC-DOS 1.00 august 1980 december 1980 april 1981 august 12, 1981 Interface Manager (development) september 1981 Closed Systems february 8, 2003 Éric Lévénez 2000-2003 <http://www.levenez.com/windows/> MS-DOS 1.24 MS-DOS 1.25 MS-DOS 2.01 MS-DOS 2.11 june 1982 july 1982 may 1983 december 1983 MS-DOS 2.12 1983 PC-DOS 1.10 PC-DOS 2.0 PC-DOS 2.10 june 1982 march 1983 october 1983 Windows (announced) november 10, 1983 MS-DOS 3.05 november 1984 PC-DOS 3.0 PC-DOS 3.10 august 1984 november 1984 Windows 1.0 Windows 1.01 november 20, 1985 1985 MS-DOS 3.3 MS-DOS 3.3 MS-DOS 3.31 (announced) august 1987 november 1987 april 2, 1987 PC-DOS 3.20 PC-DOS 3.30 january 1986 april 1987 Windows 2.0 Windows 1.03 Windows 2.0 1986 (announced) april 2, 1987 december 9, 1987 Windows /386 Windows /386 2.0 (announced) december 9, 1987 april 2, 1987 MS OS/2 1.0 april 2, 1987 MS-DOS 4.01 december 1988 PC-DOS 4.0 august 1988 Windows /286 2.1 june 28, 1988 Windows /386 2.1 june 28, 1988 OS/2 1.1 october 31, 1988 MS-DOS 5.0 june 1991 Windows 3.0 Windows 3.0 (+ Multimedia Extensions) may 22, 1990 october 20, 1991 Windows NT (announced) october 1991 MS-DOS 5.0a MS-DOS 6.0 MS-DOS 6.2 1992 march 30, 1993 november 1993 PC-DOS 5.02 PC-DOS 6.00 august 1992 1993 Windows 4 Chicago Windows 3.1 Windows 3.11 april 6, 1992 (announced) july 4, 1992 Windows for Windows for Workgroups 3.1 Workgroups 3.11 october 27, 1992 november 8, 1993 Windows NT (beta) Windows NT 3.1 november 11, 1992 july 27, 1993 OS/2 2.0 march 1992 MS-DOS 6.21 MS-DOS 6.22 MS-DOS 7.0
    [Show full text]
  • Freescale Powerpoint Template
    July 2009 Leveraging Linux® to Create an Auto Infotainment Platform Sridharan Subramanian Senior Product Manager – Software and Platforms TM Freescale™ and the Freescale logo are trademarks of Freescale Semiconductor, Inc. All other product or service names are the property of their respective owners. © Freescale Semiconductor, Inc. 2009. Abstract ►This session describes the requirements and architecture of creating an auto infotainment solution based on Linux® OS. What are the right components both at the kernel and middleware layer. It also gives details on the Multimedia Automotive Reference Software (MARS) that Freescale is developing on the i.MX platform. Participants will gain insight into the capabilities of the platform that can serve as a foundation for their automotive infotainment systems. Freescale™ and the Freescale logo are trademarks of Freescale Semiconductor, Inc. All other product or TM service names are the property of their respective owners. © Freescale Semiconductor, Inc. 2009. 2 Automotive Telematics and Infotainment Freescale™ and the Freescale logo are trademarks of Freescale Semiconductor, Inc. All other product or TM service names are the property of their respective owners. © Freescale Semiconductor, Inc. 2009. 3 Automotive Telematics ►Automotive Telematics includes: • In-car navigation and guidance systems • Call center services • Car/cell phone integration • Fleet management systems • Satellite radio • Web services • Automotive diagnosis and data collection • Vehicle tracking • In-car entertainment • Future integrations after leaving assembly line Freescale™ and the Freescale logo are trademarks of Freescale Semiconductor, Inc. All other product or TM service names are the property of their respective owners. © Freescale Semiconductor, Inc. 2009. 4 Traditional Infotainment Platforms ►QNX® Neutrino Realtime Operating System ►Microsoft® Auto and Windows® Automotive (CE) ►WindRiver VxWorks® ►RTOS Systems such as MARS Based on Flex OS Freescale™ and the Freescale logo are trademarks of Freescale Semiconductor, Inc.
    [Show full text]