FIG. 3 illustrates a graphical view 300 of the data flows of connecting the self-correcting secure computer system 100 (shown in FIG. 1) to a persistent memory 135 (shown in FIG. 1) in accordance with one embodiment of the disclosure.
In the exemplary embodiment, a user 205 is using an SCS computer device 210. The user 205 activates the boot sequence 305 of the SCS computer device 210. The SCS computer device 210 loads the initial configuration 310 of the trusted operating system. In the exemplary embodiments, the trusted operating system is stored on ROM device 105 (shown in FIG. 1) and the initial configuration is loaded onto RAM device 110 (shown in FIG. 1). The operating system runs 315 using the RAM device 110 and allows the user 205 to perform activities 320 on the SCS computer device 210. Examples of activities include, but are not limited to, word processing, playing video games, and network access 325. Network access 325 allows the user 205 to access a network 215, such as the Internet 125 (shown in FIG. 1).
The SCS computer device 210 receives a request for access 330 to persistent storage, such as persistent memory 135 (shown in FIG. 1). The SCS computer device 210 disables network access 335 and prevents any future access to the network 215. After disabling network access 335, the SCS computer device 210 grants 340 the user 205 access to the persistent memory 135.