摘要 |
<p>A computer system includes a peripheral device (215) and a processing unit (110). The processing unit (110) is adapted to execute a driver (240) for interfacing with the peripheral device (215) in a standard mode of operation and an authentication agent (90) in a privileged mode of operation, wherein the authentication agent (90) includes program instructions adapted to authenticate the driver (240). The peripheral device (215) may comprise a communications device, such as a software modem (50). A method for identifying security violations in a computer system (100) includes executing a driver (240) in a standard processing mode of a processi</p> |