ATE240549T1 - Techniken zum gewähren des zugriffs durch eine kontextsperre in einem gerät mit kleinem platzbedarf unter verwendung von laufzeitumgebungsprivilegien - Google Patents
Techniken zum gewähren des zugriffs durch eine kontextsperre in einem gerät mit kleinem platzbedarf unter verwendung von laufzeitumgebungsprivilegienInfo
- Publication number
- ATE240549T1 ATE240549T1 AT00904413T AT00904413T ATE240549T1 AT E240549 T1 ATE240549 T1 AT E240549T1 AT 00904413 T AT00904413 T AT 00904413T AT 00904413 T AT00904413 T AT 00904413T AT E240549 T1 ATE240549 T1 AT E240549T1
- Authority
- AT
- Austria
- Prior art keywords
- context
- techniques
- small space
- runtime environment
- granting access
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2153—Using hardware token as a secondary aspect
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
- Details Of Garments (AREA)
- Surgical Instruments (AREA)
- Length Measuring Devices With Unspecified Measuring Means (AREA)
- Devices For Executing Special Programs (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09/235,155 US6922835B1 (en) | 1999-01-22 | 1999-01-22 | Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges |
PCT/US2000/001238 WO2000043878A1 (en) | 1999-01-22 | 2000-01-20 | Techniques for permitting access across a context barrier on a small footprint device using run time environment privileges |
Publications (1)
Publication Number | Publication Date |
---|---|
ATE240549T1 true ATE240549T1 (de) | 2003-05-15 |
Family
ID=22884320
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AT00904413T ATE240549T1 (de) | 1999-01-22 | 2000-01-20 | Techniken zum gewähren des zugriffs durch eine kontextsperre in einem gerät mit kleinem platzbedarf unter verwendung von laufzeitumgebungsprivilegien |
Country Status (9)
Country | Link |
---|---|
US (1) | US6922835B1 (de) |
EP (1) | EP1163579B1 (de) |
JP (2) | JP5132853B2 (de) |
KR (1) | KR100716699B1 (de) |
CN (1) | CN1316360C (de) |
AT (1) | ATE240549T1 (de) |
AU (1) | AU771765B2 (de) |
DE (2) | DE1163579T1 (de) |
WO (1) | WO2000043878A1 (de) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6633984B2 (en) * | 1999-01-22 | 2003-10-14 | Sun Microsystems, Inc. | Techniques for permitting access across a context barrier on a small footprint device using an entry point object |
FR2797968B1 (fr) * | 1999-08-24 | 2001-10-12 | Schlumberger Systems & Service | Dispositif et procede de chargement de commandes dans une carte a circuit integre |
JP4055393B2 (ja) | 2001-10-30 | 2008-03-05 | ソニー株式会社 | データ処理装置およびその方法とプログラム |
DE10324384B3 (de) * | 2003-05-28 | 2004-11-04 | Giesecke & Devrient Gmbh | Behandlung eines Fehlerereignisses bei der Installation eines Anwendungsprogramms in einem tragbaren Datenträger |
JP2005050286A (ja) * | 2003-07-31 | 2005-02-24 | Fujitsu Ltd | ネットワークノードマシンおよび情報ネットワークシステム |
EP1522923A3 (de) | 2003-10-08 | 2011-06-22 | STMicroelectronics SA | Architektur eines simultanen Multithreadprozessors (SMT) |
FR2864398A1 (fr) * | 2003-12-23 | 2005-06-24 | France Telecom | Terminal de telecommunication a deux espaces d'execution |
FR2864658B1 (fr) * | 2003-12-30 | 2006-02-24 | Trusted Logic | Controle d'acces aux donnees par verification dynamique des references licites |
US8087031B2 (en) | 2006-01-09 | 2011-12-27 | Oracle America, Inc. | Method and apparatus for data transfer between isolated execution contexts |
JP4627266B2 (ja) * | 2006-02-16 | 2011-02-09 | 株式会社日立ソリューションズ | 未知のマルウェアによる情報漏洩防止システム |
US20080309665A1 (en) * | 2007-06-13 | 2008-12-18 | 3D Systems, Inc., A California Corporation | Distributed rapid prototyping |
CN101430650B (zh) * | 2007-11-07 | 2013-02-06 | 国际商业机器公司 | 用于事务内存的方法和设备 |
US8807440B1 (en) | 2010-12-17 | 2014-08-19 | Google Inc. | Routing secure element payment requests to an alternate application |
US8352749B2 (en) | 2010-12-17 | 2013-01-08 | Google Inc. | Local trusted services manager for a contactless smart card |
US8335921B2 (en) | 2010-12-17 | 2012-12-18 | Google, Inc. | Writing application data to a secure element |
US8171525B1 (en) | 2011-09-15 | 2012-05-01 | Google Inc. | Enabling users to select between secure service providers using a central trusted service manager |
US8255687B1 (en) | 2011-09-15 | 2012-08-28 | Google Inc. | Enabling users to select between secure service providers using a key escrow service |
US8313036B1 (en) | 2011-09-16 | 2012-11-20 | Google Inc. | Secure application directory |
US8850557B2 (en) | 2012-02-29 | 2014-09-30 | International Business Machines Corporation | Processor and data processing method with non-hierarchical computer security enhancements for context states |
US8385553B1 (en) | 2012-02-28 | 2013-02-26 | Google Inc. | Portable secure element |
US8429409B1 (en) | 2012-04-06 | 2013-04-23 | Google Inc. | Secure reset of personal and service provider information on mobile devices |
Family Cites Families (40)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPS61177585A (ja) | 1985-02-04 | 1986-08-09 | Toshiba Corp | 携帯用電子装置密封体 |
EP0192232B1 (de) * | 1985-02-18 | 1993-11-18 | Nec Corporation | Datenverarbeitungsgerät |
US4816654A (en) | 1986-05-16 | 1989-03-28 | American Telephone And Telegraph Company | Improved security system for a portable data carrier |
JP2514954B2 (ja) | 1987-03-13 | 1996-07-10 | 三菱電機株式会社 | Icカ−ド |
JPH01277993A (ja) | 1988-04-28 | 1989-11-08 | Toshiba Corp | 携帯可能電子装置 |
JPH02156357A (ja) | 1988-12-08 | 1990-06-15 | Fujitsu Ltd | プログラム破壊防止方法 |
US5057997A (en) | 1989-02-13 | 1991-10-15 | International Business Machines Corp. | Interruption systems for externally changing a context of program execution of a programmed processor |
US5204663A (en) | 1990-05-21 | 1993-04-20 | Applied Systems Institute, Inc. | Smart card access control system |
ATE100229T1 (de) | 1990-07-20 | 1994-01-15 | Siemens Nixdorf Inf Syst | Verfahren zur verhinderung unzulaessiger abweichungen vom ablaufprotokoll einer anwendung bei einem datenaustauschsystem. |
JP3007425B2 (ja) | 1991-02-14 | 2000-02-07 | 凸版印刷 株式会社 | Icカード |
US5204897A (en) | 1991-06-28 | 1993-04-20 | Digital Equipment Corporation | Management interface for license management system |
DE4126213C2 (de) | 1991-08-08 | 2000-06-15 | Deutsche Telekom Ag | Chipkarte für mehrere Diensteanbieter |
FR2683357A1 (fr) | 1991-10-30 | 1993-05-07 | Philips Composants | Microcircuit pour carte a puce a memoire programmable protegee. |
JPH05224956A (ja) * | 1992-02-14 | 1993-09-03 | Nippon Telegr & Teleph Corp <Ntt> | プロセス間メッセージ通信方法 |
WO1994010657A1 (en) | 1992-10-26 | 1994-05-11 | Intellect Australia Pty. Ltd. | Host and user transaction system |
US5446901A (en) * | 1993-06-30 | 1995-08-29 | Digital Equipment Corporation | Fault tolerant distributed garbage collection system and method for collecting network objects |
US5649118A (en) | 1993-08-27 | 1997-07-15 | Lucent Technologies Inc. | Smart card with multiple charge accounts and product item tables designating the account to debit |
US5544246A (en) | 1993-09-17 | 1996-08-06 | At&T Corp. | Smartcard adapted for a plurality of service providers and for remote installation of same |
US5432924A (en) * | 1993-12-15 | 1995-07-11 | Microsoft Corporation | Method and system for selectively applying an appropriate object ownership model |
US5481715A (en) | 1993-12-15 | 1996-01-02 | Sun Microsystems, Inc. | Method and apparatus for delegated communications in a computer system using trusted deputies |
ATE152539T1 (de) | 1994-02-08 | 1997-05-15 | Belle Gate Invest Bv | Datenauswechselsystem mit tragbaren datenverarbeitungseinheiten |
US5594227A (en) | 1995-03-28 | 1997-01-14 | Microsoft Corporation | System and method for protecting unauthorized access to data contents |
EP0819274B1 (de) | 1995-04-07 | 2002-11-06 | DreamTechnologies Co., Ltd. | Verfahren und vorrichtung zur ausführung eines anwendungsprogramms |
CA2173695A1 (en) * | 1995-04-14 | 1996-10-15 | Panagiotis Kougiouris | Method and system for providing interoperability among processes written to execute on different operating systems |
DK0757336T3 (da) * | 1995-08-04 | 2001-03-19 | Belle Gate Invest B V | Data-Udvekslings-System omfattende bærbare databehandlingsenheder |
US5768385A (en) | 1995-08-29 | 1998-06-16 | Microsoft Corporation | Untraceable electronic cash |
US5721781A (en) | 1995-09-13 | 1998-02-24 | Microsoft Corporation | Authentication system and method for smart card transactions |
DE19536169A1 (de) * | 1995-09-29 | 1997-04-03 | Ibm | Multifunktionale Chipkarte |
FR2743910B1 (fr) | 1996-01-19 | 1998-02-27 | Solaic Sa | Procede de mise en oeuvre d'un programme securise dans une carte a microprocesseur et carte a microprocesseur comportant un programme securise |
US5742756A (en) | 1996-02-12 | 1998-04-21 | Microsoft Corporation | System and method of using smart cards to perform security-critical operations requiring user authorization |
US5781723A (en) | 1996-06-03 | 1998-07-14 | Microsoft Corporation | System and method for self-identifying a portable information device to a computing unit |
ES2184066T3 (es) | 1996-10-25 | 2003-04-01 | Schlumberger Systems & Service | Uso de un lenguaje de programacion de alto nivel con microcontrolador. |
US5884316A (en) * | 1996-11-19 | 1999-03-16 | Microsoft Corporation | Implicit session context system with object state cache |
US6575372B1 (en) | 1997-02-21 | 2003-06-10 | Mondex International Limited | Secure multi-application IC card system having selective loading and deleting capability |
CA2288824A1 (en) | 1997-03-24 | 1998-10-01 | Marc B. Kekicheff | A system and method for a multi-application smart card which can facilitate a post-issuance download of an application onto the smart card |
US6220510B1 (en) | 1997-05-15 | 2001-04-24 | Mondex International Limited | Multi-application IC card with delegation feature |
US6564995B1 (en) | 1997-09-19 | 2003-05-20 | Schlumberger Malco, Inc. | Smart card application-selection |
US6212633B1 (en) * | 1998-06-26 | 2001-04-03 | Vlsi Technology, Inc. | Secure data communication over a memory-mapped serial communications interface utilizing a distributed firewall |
US6349336B1 (en) | 1999-04-26 | 2002-02-19 | Hewlett-Packard Company | Agent/proxy connection control across a firewall |
US6292874B1 (en) | 1999-10-19 | 2001-09-18 | Advanced Technology Materials, Inc. | Memory management method and apparatus for partitioning homogeneous memory and restricting access of installed applications to predetermined memory ranges |
-
1999
- 1999-01-22 US US09/235,155 patent/US6922835B1/en not_active Expired - Lifetime
-
2000
- 2000-01-20 CN CNB008029903A patent/CN1316360C/zh not_active Expired - Lifetime
- 2000-01-20 KR KR1020017009171A patent/KR100716699B1/ko active IP Right Grant
- 2000-01-20 AT AT00904413T patent/ATE240549T1/de not_active IP Right Cessation
- 2000-01-20 WO PCT/US2000/001238 patent/WO2000043878A1/en active IP Right Grant
- 2000-01-20 JP JP2000595238A patent/JP5132853B2/ja not_active Expired - Lifetime
- 2000-01-20 AU AU26176/00A patent/AU771765B2/en not_active Expired
- 2000-01-20 DE DE1163579T patent/DE1163579T1/de active Pending
- 2000-01-20 EP EP00904413A patent/EP1163579B1/de not_active Expired - Lifetime
- 2000-01-20 DE DE60002687T patent/DE60002687T2/de not_active Expired - Lifetime
-
2012
- 2012-09-14 JP JP2012202985A patent/JP5483768B2/ja not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
JP5132853B2 (ja) | 2013-01-30 |
WO2000043878A1 (en) | 2000-07-27 |
JP2013030175A (ja) | 2013-02-07 |
AU771765B2 (en) | 2004-04-01 |
US6922835B1 (en) | 2005-07-26 |
DE1163579T1 (de) | 2003-03-06 |
EP1163579A1 (de) | 2001-12-19 |
CN1351728A (zh) | 2002-05-29 |
CN1316360C (zh) | 2007-05-16 |
KR20010101622A (ko) | 2001-11-14 |
JP2002535772A (ja) | 2002-10-22 |
JP5483768B2 (ja) | 2014-05-07 |
DE60002687D1 (de) | 2003-06-18 |
EP1163579B1 (de) | 2003-05-14 |
DE60002687T2 (de) | 2004-03-25 |
AU2617600A (en) | 2000-08-07 |
KR100716699B1 (ko) | 2007-05-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
ATE240549T1 (de) | Techniken zum gewähren des zugriffs durch eine kontextsperre in einem gerät mit kleinem platzbedarf unter verwendung von laufzeitumgebungsprivilegien | |
DE60011615D1 (de) | Techniken zum erlauben von zugang durch eine kontextsperre in einem kleinen gerät unter verwendung von globalen datenstrukturen | |
ATE253236T1 (de) | Techniken zum gewähren des zugriffs durch eine kontextsperre in einem gerät mit kleinem platzbedarf unter verwendung von einem eingangspunktobjekt | |
DE60010433D1 (de) | Verfahren zur durchführung von sicherheitvorgaben in einem kleingerät unter verwendung von einer kontextsperre | |
EP0825511B1 (de) | Verfahren und Vorrichtung für sichere Verarbeitung | |
BRPI0705637A (pt) | dispositivos, métodos e sistema para conceder o acesso, tendo-se como base as credenciais, com base no novo dispositivo eletrÈnico inteligente | |
ATE404932T1 (de) | Sicheres management von lizenzen | |
ATE518180T1 (de) | Verfahren und system zum sicheren ausführen von unzuverlässigem inhalt | |
KR980004069A (ko) | 프로그램 코드 배포 방법 및 컴퓨터 시스템 | |
CN109960879B (zh) | 一种基于不可信ip核的系统级芯片安全设计方法 | |
ATE386290T1 (de) | Zugriffsystem und -verfahren zum geschützten inhalt in einem berechtigungverwaltungssystem | |
GB2599331A (en) | Distribution of security credentials | |
CN102983969A (zh) | 一种操作系统的安全登录系统及安全登录方法 | |
CN106682490B (zh) | Cfl人工免疫计算机模型建设方法 | |
CN105740044B (zh) | 一种缩减宿主型虚拟化软件可信计算基的方法 | |
CN1241116C (zh) | 一种保护计算机网络安全的方法 | |
Fong | Viewer's discretion: Host security in mobile code systems | |
Peters et al. | Software separation in measuring instruments through security concepts and separation kernels | |
Huang et al. | MSIPS: Multi-tiered security IPs architecture for secure SoC design | |
Li et al. | A design of trusted operating system based on linux | |
Park et al. | Core Container Security Frameworks | |
Vassena | Verifying Information Flow Control Libraries | |
Cowan | Open and Closed Software Security Redux | |
Jiaxuan et al. | Control Technology of Kernel Resource Isolation for Power Intelligent IoT Terminal Operating System | |
Gu et al. | Modeling TCG-based secure systems with colored petri nets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
UEP | Publication of translation of european patent specification |
Ref document number: 1163579 Country of ref document: EP |
|
REN | Ceased due to non-payment of the annual fee |