AR036214A1 - Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capa - Google Patents
Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capaInfo
- Publication number
- AR036214A1 AR036214A1 ARP020103051A ARP020103051A AR036214A1 AR 036214 A1 AR036214 A1 AR 036214A1 AR P020103051 A ARP020103051 A AR P020103051A AR P020103051 A ARP020103051 A AR P020103051A AR 036214 A1 AR036214 A1 AR 036214A1
- Authority
- AR
- Argentina
- Prior art keywords
- application
- storage area
- access
- limiting
- file structure
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/14—Protection against unauthorised use of memory or access to memory
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
- G06F21/80—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors
- G06F21/805—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data in storage media based on magnetic or optical technology, e.g. disks with sectors using a security table for the storage sub-system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Memory System Of A Hierarchy Structure (AREA)
Abstract
El acceso de una aplicación a un almacenamiento es limitado a una base de uno por cada aplicación. A la aplicación se le otorga acceso a una porción de almacenamiento. La aplicación puede manipular dicha porción del almacenamiento mediante la creación de diferentes estructuras de archivos en dicha porción, modificando, leyendo y escribiendo en archivos contenidos en la misma. A la aplicación se le niega el acceso al área de almacenamiento fuera de la porción otorgada. De forma similar, otras aplicaciones almacenadas en el área de almacenamiento siguen un paradigma similar. En una forma de realización, el área de almacenamiento es una estructura de archivos jerárquica y las aplicaciones son almacenadas como hijos en la estructura de archivos. Las aplicaciones, sin embargo, son mapeadas para indicar que cada una está almacenada en la raíz de la estructura de archivos para evitar el acceso a otras áreas de la estructura de archivos. En otra forma de realización, la estructura de archivos soporta un directorio compartido en el cual múltiples aplicaciones están mapeadas, como también, como un directorio raíz pero en otro drive.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US31217701P | 2001-08-13 | 2001-08-13 |
Publications (1)
Publication Number | Publication Date |
---|---|
AR036214A1 true AR036214A1 (es) | 2004-08-18 |
Family
ID=23210217
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
ARP020103051A AR036214A1 (es) | 2001-08-13 | 2002-08-13 | Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capa |
Country Status (16)
Country | Link |
---|---|
US (1) | US7921287B2 (es) |
EP (1) | EP1417602A4 (es) |
JP (2) | JP2005500608A (es) |
KR (1) | KR100538659B1 (es) |
CN (1) | CN1307581C (es) |
AR (1) | AR036214A1 (es) |
BR (1) | BR0211917A (es) |
CA (1) | CA2457617A1 (es) |
HK (1) | HK1070442A1 (es) |
IL (1) | IL160395A0 (es) |
MX (1) | MXPA04002494A (es) |
NZ (1) | NZ531200A (es) |
PE (1) | PE20030375A1 (es) |
RU (1) | RU2307388C2 (es) |
TW (1) | TWI236298B (es) |
WO (1) | WO2003017682A2 (es) |
Families Citing this family (78)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040123147A1 (en) * | 2002-12-19 | 2004-06-24 | Christopher White | Control of security or ease-of-use sensitivity for a wireless communication device |
AU2003303260A1 (en) * | 2002-12-20 | 2004-07-14 | Koninklijke Philips Electronics N.V. | Method for dividing user storage space of an optical disc, optical disc having divided storage space, and method and device for storing information |
GB0311537D0 (en) * | 2003-05-20 | 2003-06-25 | Safa John | Controlling write access of an application to a storage medium |
CN100363855C (zh) * | 2003-07-04 | 2008-01-23 | 诺基亚有限公司 | 密钥存储管理方法、装置及其系统 |
WO2005036404A2 (en) * | 2003-10-13 | 2005-04-21 | Koninklijke Philips Electronics N.V. | Storage allocation per application |
US7076637B2 (en) * | 2003-10-29 | 2006-07-11 | Qualcomm Inc. | System for providing transitions between operating modes of a device |
US7814554B1 (en) * | 2003-11-06 | 2010-10-12 | Gary Dean Ragner | Dynamic associative storage security for long-term memory storage devices |
US7257580B2 (en) * | 2004-02-24 | 2007-08-14 | International Business Machines Corporation | Method, system, and program for restricting modifications to allocations of computational resources |
JP2005352908A (ja) | 2004-06-11 | 2005-12-22 | Ntt Docomo Inc | 移動通信端末及びデータアクセス制御方法 |
US20060107327A1 (en) * | 2004-11-16 | 2006-05-18 | Sprigg Stephen A | Methods and apparatus for enforcing application level restrictions on local and remote content |
US20060242067A1 (en) * | 2004-12-21 | 2006-10-26 | Fabrice Jogand-Coulomb | System for creating control structure for versatile content control |
US8504849B2 (en) * | 2004-12-21 | 2013-08-06 | Sandisk Technologies Inc. | Method for versatile content control |
US8051052B2 (en) * | 2004-12-21 | 2011-11-01 | Sandisk Technologies Inc. | Method for creating control structure for versatile content control |
US20060242066A1 (en) * | 2004-12-21 | 2006-10-26 | Fabrice Jogand-Coulomb | Versatile content control with partitioning |
TW200700991A (en) * | 2004-12-21 | 2007-01-01 | Sandisk Corp | Control structure for versatile content control and method using structure |
US20060242151A1 (en) * | 2004-12-21 | 2006-10-26 | Fabrice Jogand-Coulomb | Control structure for versatile content control |
US8601283B2 (en) * | 2004-12-21 | 2013-12-03 | Sandisk Technologies Inc. | Method for versatile content control with partitioning |
WO2006069312A2 (en) * | 2004-12-21 | 2006-06-29 | Sandisk Corporation | System for creating control structure for versatile content control |
CN101120352B (zh) | 2004-12-21 | 2010-10-06 | 桑迪士克股份有限公司 | 用于保护存储在存储设备中的数据的方法和设备 |
US20070168292A1 (en) * | 2004-12-21 | 2007-07-19 | Fabrice Jogand-Coulomb | Memory system with versatile content control |
US7797727B1 (en) | 2005-01-31 | 2010-09-14 | Hewlett-Packard Development Company, L.P. | Launching an application in a restricted user account |
US8108691B2 (en) * | 2005-02-07 | 2012-01-31 | Sandisk Technologies Inc. | Methods used in a secure memory card with life cycle phases |
US8321686B2 (en) * | 2005-02-07 | 2012-11-27 | Sandisk Technologies Inc. | Secure memory card with life cycle phases |
US8423788B2 (en) * | 2005-02-07 | 2013-04-16 | Sandisk Technologies Inc. | Secure memory card with life cycle phases |
US8627068B1 (en) * | 2005-04-29 | 2014-01-07 | Hewlett-Packard Development Company, L. P. | Selecting access authorities |
US8849968B2 (en) | 2005-06-20 | 2014-09-30 | Microsoft Corporation | Secure and stable hosting of third-party extensions to web services |
US7805470B2 (en) * | 2005-06-23 | 2010-09-28 | Emc Corporation | Methods and apparatus for managing the storage of content in a file system |
US7748031B2 (en) * | 2005-07-08 | 2010-06-29 | Sandisk Corporation | Mass storage device with automated credentials loading |
US8074288B2 (en) * | 2005-07-15 | 2011-12-06 | Microsoft Corporation | Isolation of application-specific data within a user account |
US20070056042A1 (en) * | 2005-09-08 | 2007-03-08 | Bahman Qawami | Mobile memory system for secure storage and delivery of media content |
US8966284B2 (en) * | 2005-09-14 | 2015-02-24 | Sandisk Technologies Inc. | Hardware driver integrity check of memory card controller firmware |
US20070061597A1 (en) * | 2005-09-14 | 2007-03-15 | Micky Holtzman | Secure yet flexible system architecture for secure devices with flash mass storage memory |
JP5112327B2 (ja) | 2005-11-17 | 2013-01-09 | コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ | 独自仕様のデータを管理するシステム |
US7921303B2 (en) | 2005-11-18 | 2011-04-05 | Qualcomm Incorporated | Mobile security system and method |
US7664924B2 (en) * | 2005-12-01 | 2010-02-16 | Drive Sentry, Inc. | System and method to secure a computer system by selective control of write access to a data storage medium |
US9600661B2 (en) * | 2005-12-01 | 2017-03-21 | Drive Sentry Limited | System and method to secure a computer system by selective control of write access to a data storage medium |
US10503418B2 (en) | 2005-12-01 | 2019-12-10 | Drive Sentry Limited | System and method to secure a computer system by selective control of write access to a data storage medium |
US20100153671A1 (en) * | 2005-12-01 | 2010-06-17 | Drive Sentry Inc. | System and method to secure a computer system by selective control of write access to a data storage medium |
US7917715B2 (en) * | 2006-01-28 | 2011-03-29 | Tallman Jr Leon C | Internet-safe computer |
US20070234330A1 (en) * | 2006-03-01 | 2007-10-04 | Microsoft Corporation | Prevention of executable code modification |
KR100843075B1 (ko) | 2006-05-29 | 2008-07-03 | 삼성전자주식회사 | 데이터를 관리하는 장치 및 방법 |
US8117441B2 (en) * | 2006-06-20 | 2012-02-14 | Microsoft Corporation | Integrating security protection tools with computer device integrity and privacy policy |
US8613103B2 (en) * | 2006-07-07 | 2013-12-17 | Sandisk Technologies Inc. | Content control method using versatile control structure |
US8245031B2 (en) | 2006-07-07 | 2012-08-14 | Sandisk Technologies Inc. | Content control method using certificate revocation lists |
US20080022395A1 (en) * | 2006-07-07 | 2008-01-24 | Michael Holtzman | System for Controlling Information Supplied From Memory Device |
US8639939B2 (en) * | 2006-07-07 | 2014-01-28 | Sandisk Technologies Inc. | Control method using identity objects |
US8266711B2 (en) * | 2006-07-07 | 2012-09-11 | Sandisk Technologies Inc. | Method for controlling information supplied from memory device |
US20100138652A1 (en) * | 2006-07-07 | 2010-06-03 | Rotem Sela | Content control method using certificate revocation lists |
US8140843B2 (en) * | 2006-07-07 | 2012-03-20 | Sandisk Technologies Inc. | Content control method using certificate chains |
US20080010458A1 (en) * | 2006-07-07 | 2008-01-10 | Michael Holtzman | Control System Using Identity Objects |
US20080072058A1 (en) * | 2006-08-24 | 2008-03-20 | Yoram Cedar | Methods in a reader for one time password generating device |
US20080052524A1 (en) * | 2006-08-24 | 2008-02-28 | Yoram Cedar | Reader for one time password generating device |
WO2008036833A2 (en) * | 2006-09-20 | 2008-03-27 | Drive Sentry, Inc. | Selective control of write access to a data storage medium |
US7921270B2 (en) | 2006-10-05 | 2011-04-05 | Sandisk Il Ltd. | Methods and systems for controlling access to a storage device |
US8423794B2 (en) * | 2006-12-28 | 2013-04-16 | Sandisk Technologies Inc. | Method and apparatus for upgrading a memory card that has security mechanisms for preventing copying of secure content and applications |
US8789063B2 (en) | 2007-03-30 | 2014-07-22 | Microsoft Corporation | Master and subordinate operating system kernels for heterogeneous multiprocessor systems |
US20100122054A1 (en) * | 2008-11-12 | 2010-05-13 | Sandisk Il Ltd. | Copy safe storage |
US9104618B2 (en) * | 2008-12-18 | 2015-08-11 | Sandisk Technologies Inc. | Managing access to an address range in a storage device |
US8220004B2 (en) * | 2009-04-17 | 2012-07-10 | Nokia Corporation | Method, apparatus and computer program product for sharing resources via an interprocess communication |
US8433296B2 (en) | 2009-05-01 | 2013-04-30 | Ryan Hardin | Exclusive delivery of content within geographic areas |
US8271544B2 (en) * | 2009-05-01 | 2012-09-18 | Creative Technology Ltd | Data file having more than one mode of operation |
US8037404B2 (en) | 2009-05-03 | 2011-10-11 | International Business Machines Corporation | Construction and analysis of markup language document representing computing architecture having computing elements |
US8225061B2 (en) | 2009-07-02 | 2012-07-17 | Apple Inc. | Method and apparatus for protected content data processing |
US10305910B2 (en) * | 2010-01-15 | 2019-05-28 | Apple Inc. | Accessing specialized fileserver |
US8931103B2 (en) * | 2011-09-08 | 2015-01-06 | International Business Machines Corporation | Generating security permissions |
CN103106042B (zh) * | 2011-11-14 | 2016-07-06 | 联想(北京)有限公司 | 数据存取方法和电子设备 |
TWI461958B (zh) | 2012-06-22 | 2014-11-21 | Wistron Corp | 應用程式的權限控管方法、電子裝置及電腦可讀取媒體 |
US10073987B2 (en) | 2013-04-02 | 2018-09-11 | Western Digital Technologies, Inc. | Methods and systems for privileged execution support for file system commands on a storage device |
CN103324887B (zh) * | 2013-07-05 | 2016-12-28 | 百度在线网络技术(北京)有限公司 | 移动终端的安全防御装置、方法和移动终端 |
US10275470B2 (en) * | 2013-08-15 | 2019-04-30 | Amazon Technologies, Inc. | Network-backed file system |
US9787685B2 (en) * | 2014-06-24 | 2017-10-10 | Xiaomi Inc. | Methods, devices and systems for managing authority |
CN104156233B (zh) * | 2014-07-21 | 2016-05-18 | 小米科技有限责任公司 | 轻应用离线更新方法、装置及终端 |
US9672026B2 (en) | 2014-07-21 | 2017-06-06 | Xiaomi Inc. | Light app offline updating method, device and terminal |
US10366016B2 (en) | 2016-07-29 | 2019-07-30 | Hewlett-Packard Development Company, L.P. | Access to persistent memory regions of computing devices |
US10552600B2 (en) * | 2016-11-02 | 2020-02-04 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | Securing a media storage device using application authority assignment |
TWI673667B (zh) * | 2017-01-25 | 2019-10-01 | 楊建綱 | 內建智慧安全行動裝置 |
WO2018147827A1 (en) * | 2017-02-07 | 2018-08-16 | Hewlett-Packard Development Company, L.P. | Determining cash drawer access |
EP3407559A1 (en) * | 2017-05-26 | 2018-11-28 | Authentic Vision GmbH | System and method to manage privileges based on the authentication of an uncloneable security device |
Family Cites Families (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5146575A (en) * | 1986-11-05 | 1992-09-08 | International Business Machines Corp. | Implementing privilege on microprocessor systems for use in software asset protection |
CA1323448C (en) * | 1989-02-24 | 1993-10-19 | Terrence C. Miller | Method and apparatus for translucent file system |
US5136712A (en) * | 1989-06-29 | 1992-08-04 | Digital Equipment Corporation | Temporary object handling system and method in an object based computer operating system |
US5128995A (en) * | 1990-07-23 | 1992-07-07 | International Business Machines Corp. | Apparatus and method for loading a system reference diskette image from a system partition in a personal computer system |
FR2683357A1 (fr) * | 1991-10-30 | 1993-05-07 | Philips Composants | Microcircuit pour carte a puce a memoire programmable protegee. |
US5412717A (en) * | 1992-05-15 | 1995-05-02 | Fischer; Addison M. | Computer system security method and apparatus having program authorization information data structures |
US5497494A (en) * | 1993-07-23 | 1996-03-05 | International Business Machines Corporation | Method for saving and restoring the state of a CPU executing code in protected mode |
US5551051A (en) * | 1994-09-20 | 1996-08-27 | Motorola, Inc. | Isolated multiprocessing system having tracking circuit for verifyng only that the processor is executing set of entry instructions upon initiation of the system controller program |
JPH08272625A (ja) * | 1995-03-29 | 1996-10-18 | Toshiba Corp | マルチプログラム実行制御装置及び方法 |
US5761669A (en) * | 1995-06-06 | 1998-06-02 | Microsoft Corporation | Controlling access to objects on multiple operating systems |
JP2000514584A (ja) * | 1996-10-25 | 2000-10-31 | シュルンベルジェ システーム | 高級プログラミング言語を用いたマイクロコントローラ |
JP2000076135A (ja) * | 1998-08-27 | 2000-03-14 | Nippon Telegr & Teleph Corp <Ntt> | プロセッサのメモリ保護方法及びプロセッサのメモリを保護されたicカード |
US6578078B1 (en) * | 1999-04-02 | 2003-06-10 | Microsoft Corporation | Method for preserving referential integrity within web sites |
US6757698B2 (en) * | 1999-04-14 | 2004-06-29 | Iomega Corporation | Method and apparatus for automatically synchronizing data from a host computer to two or more backup data storage locations |
US6347331B1 (en) * | 1999-04-26 | 2002-02-12 | International Business Machines Corporation | Method and apparatus to update a windows registry from a hetrogeneous server |
US6343324B1 (en) * | 1999-09-13 | 2002-01-29 | International Business Machines Corporation | Method and system for controlling access share storage devices in a network environment by configuring host-to-volume mapping data structures in the controller memory for granting and denying access to the devices |
US6430561B1 (en) * | 1999-10-29 | 2002-08-06 | International Business Machines Corporation | Security policy for protection of files on a storage device |
US6823458B1 (en) * | 1999-11-18 | 2004-11-23 | International Business Machines Corporation | Apparatus and method for securing resources shared by multiple operating systems |
US7035825B1 (en) * | 2000-01-04 | 2006-04-25 | E.Piphany, Inc. | Managing relationships of parties interacting on a network |
US7035850B2 (en) * | 2000-03-22 | 2006-04-25 | Hitachi, Ltd. | Access control system |
US7146635B2 (en) * | 2000-12-27 | 2006-12-05 | International Business Machines Corporation | Apparatus and method for using a directory service for authentication and authorization to access resources outside of the directory service |
US20020165986A1 (en) * | 2001-01-22 | 2002-11-07 | Tarnoff Harry L. | Methods for enhancing communication of content over a network |
US20020152262A1 (en) * | 2001-04-17 | 2002-10-17 | Jed Arkin | Method and system for preventing the infringement of intellectual property rights |
US7448077B2 (en) * | 2002-05-23 | 2008-11-04 | International Business Machines Corporation | File level security for a metadata controller in a storage area network |
JP2004029991A (ja) * | 2002-06-24 | 2004-01-29 | Fujitsu Ltd | ファイル処理プログラムおよびファイル処理装置 |
JP4007873B2 (ja) * | 2002-07-09 | 2007-11-14 | 富士通株式会社 | データ保護プログラムおよびデータ保護方法 |
US6931530B2 (en) * | 2002-07-22 | 2005-08-16 | Vormetric, Inc. | Secure network file access controller implementing access control and auditing |
US7143288B2 (en) * | 2002-10-16 | 2006-11-28 | Vormetric, Inc. | Secure file system server architecture and methods |
US20040230753A1 (en) * | 2003-05-16 | 2004-11-18 | International Business Machines Corporation | Methods and apparatus for providing service differentiation in a shared storage environment |
US20050197859A1 (en) * | 2004-01-16 | 2005-09-08 | Wilson James C. | Portable electronic data storage and retreival system for group data |
-
2002
- 2002-08-13 US US10/218,430 patent/US7921287B2/en active Active
- 2002-08-13 PE PE2002000726A patent/PE20030375A1/es not_active Application Discontinuation
- 2002-08-13 BR BR0211917-0A patent/BR0211917A/pt not_active IP Right Cessation
- 2002-08-13 KR KR10-2003-7002130A patent/KR100538659B1/ko active IP Right Grant
- 2002-08-13 AR ARP020103051A patent/AR036214A1/es active IP Right Grant
- 2002-08-13 WO PCT/US2002/025750 patent/WO2003017682A2/en active IP Right Grant
- 2002-08-13 TW TW091118216A patent/TWI236298B/zh active
- 2002-08-13 EP EP02761355A patent/EP1417602A4/en not_active Ceased
- 2002-08-13 IL IL16039502A patent/IL160395A0/xx unknown
- 2002-08-13 JP JP2003521631A patent/JP2005500608A/ja not_active Withdrawn
- 2002-08-13 CA CA002457617A patent/CA2457617A1/en not_active Abandoned
- 2002-08-13 MX MXPA04002494A patent/MXPA04002494A/es active IP Right Grant
- 2002-08-13 NZ NZ531200A patent/NZ531200A/xx not_active IP Right Cessation
- 2002-08-13 CN CNB028198891A patent/CN1307581C/zh not_active Expired - Lifetime
- 2002-08-13 RU RU2004107492/09A patent/RU2307388C2/ru not_active IP Right Cessation
-
2005
- 2005-04-07 HK HK05102896A patent/HK1070442A1/xx not_active IP Right Cessation
-
2010
- 2010-03-04 JP JP2010048210A patent/JP2010182319A/ja active Pending
Also Published As
Publication number | Publication date |
---|---|
KR100538659B1 (ko) | 2005-12-26 |
WO2003017682A3 (en) | 2003-11-27 |
EP1417602A2 (en) | 2004-05-12 |
US20030061504A1 (en) | 2003-03-27 |
NZ531200A (en) | 2006-03-31 |
KR20040015702A (ko) | 2004-02-19 |
CN1307581C (zh) | 2007-03-28 |
RU2307388C2 (ru) | 2007-09-27 |
BR0211917A (pt) | 2004-09-28 |
JP2010182319A (ja) | 2010-08-19 |
EP1417602A4 (en) | 2007-08-22 |
MXPA04002494A (es) | 2004-07-30 |
HK1070442A1 (en) | 2005-06-17 |
TWI236298B (en) | 2005-07-11 |
RU2004107492A (ru) | 2005-09-27 |
PE20030375A1 (es) | 2003-04-12 |
CN1564992A (zh) | 2005-01-12 |
IL160395A0 (en) | 2004-07-25 |
JP2005500608A (ja) | 2005-01-06 |
CA2457617A1 (en) | 2003-02-27 |
WO2003017682A2 (en) | 2003-02-27 |
US7921287B2 (en) | 2011-04-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AR036214A1 (es) | Metodo para limitar el acceso de una aplicacion a un area de almacenamiento en un dispositivo, un dispositivo que tiene un area de almacenamiento, un metodo para ejecutar una aplicacion en un dispositivo, un sistema para limitar el acceso de una aplicacion a un area de almacenamiento y un medio capa | |
ES2548149T3 (es) | Sistema de iluminación y procedimiento con SNR mejorada | |
CN104798053B (zh) | 安全区域内的存储器管理 | |
ES2125100T3 (es) | Instalacion de proceso de datos multi-usuarios con proteccion de memoria. | |
TW200720924A (en) | Interfacing systems operating through a logical address space and on a direct data file basis | |
BRPI0703677A (pt) | método para atribuir dados de multimìdia a dispositivos de armazenamento distribuìdo | |
AR052956A1 (es) | Revisiones de consultas utilizando consultas de alta jerarquia conocidas | |
CL2013000041A1 (es) | Un metodo para operar un dispositivo movil que tiene una pluralidad de estados de autenticacion incluyendo un estado de cierre superior y un estado de cierre inferior que comprende recibir una primera entrada de datos solicitando la invocacion de una solicitud de captura e invocar la aplicacion solicitada en el dispositivo | |
BR0303350A (pt) | Dispositivo e método para gravar informação em uma trilha de uma portadora de gravação, e, portadora de gravação | |
ES2721802T3 (es) | Dispositivo de procesamiento de información, dispositivo de registro de información, método de registro de información, programa de registro de información y medio de almacenamiento | |
DE60318111D1 (de) | Dateispeicherbaustein, dateispeicherprogramm und dateispeicherverfahren | |
DE602004003062D1 (de) | Multibit-speicher mit dynamischer referenz-spannungs erzeugung | |
DE60336894D1 (de) | Erfassung von datenmaskenabbildungsinformation | |
WO2007023213A3 (fr) | Procede de configuration d'un espace memoire divise en zones memoire | |
ES2164150T3 (es) | Sistemas de electrocromia en capa delgada y sus componentes. | |
DE50113843D1 (de) | Integrierter Halbleiterspeicher mit redundanter Einheit von Speicherzellen | |
DE502005007010D1 (de) | Durch authentisierung gesicherter zugriff auf einen datenträger mit massenspeicher und chip | |
BR112018001224A2 (pt) | acesso simultâneo em espaço de memória através de interfaces múltiplas | |
ES2541923T3 (es) | Microprocesador o microcontrolador mejorados | |
CN105468661A (zh) | 一种查找elf文件中符号信息的方法及系统 | |
ATE313820T1 (de) | Bereitstellung von informationen in einem automatisierungssystem | |
BR9902375A (pt) | Sistema de gerenciamento de base de dados e método para armazenagem de atributos persistentes e nã0-persistentes | |
Ahern | Sahelanthropus | |
TW200518068A (en) | Multiple layer optical disc, and device for writing such disc | |
DE602005021753D1 (de) | Transaktionstapel für elektronische Geräte mit einem nichtflüchtigen Speicher, der eine begrenzte Anzahl von Schreibzyklen aufweist |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
FG | Grant, registration |