AU2001253049A1 - Protected execution environments within a computer system - Google Patents

Protected execution environments within a computer system

Info

Publication number
AU2001253049A1
AU2001253049A1 AU2001253049A AU5304901A AU2001253049A1 AU 2001253049 A1 AU2001253049 A1 AU 2001253049A1 AU 2001253049 A AU2001253049 A AU 2001253049A AU 5304901 A AU5304901 A AU 5304901A AU 2001253049 A1 AU2001253049 A1 AU 2001253049A1
Authority
AU
Australia
Prior art keywords
computer system
execution environments
protected execution
protected
environments
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
AU2001253049A
Inventor
Sarel Kobus Jooste
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dell Marketing LP
Original Assignee
Everdream Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Everdream Corp filed Critical Everdream Corp
Publication of AU2001253049A1 publication Critical patent/AU2001253049A1/en
Abandoned legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment
AU2001253049A 2000-04-07 2001-03-29 Protected execution environments within a computer system Abandoned AU2001253049A1 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09545286 2000-04-07
US09/545,286 US6941470B1 (en) 2000-04-07 2000-04-07 Protected execution environments within a computer system
PCT/US2001/010441 WO2001077811A1 (en) 2000-04-07 2001-03-29 Protected execution environments within a computer system

Publications (1)

Publication Number Publication Date
AU2001253049A1 true AU2001253049A1 (en) 2001-10-23

Family

ID=24175615

Family Applications (1)

Application Number Title Priority Date Filing Date
AU2001253049A Abandoned AU2001253049A1 (en) 2000-04-07 2001-03-29 Protected execution environments within a computer system

Country Status (3)

Country Link
US (5) US6941470B1 (en)
AU (1) AU2001253049A1 (en)
WO (1) WO2001077811A1 (en)

Families Citing this family (72)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6941470B1 (en) * 2000-04-07 2005-09-06 Everdream Corporation Protected execution environments within a computer system
US20030115458A1 (en) * 2001-12-19 2003-06-19 Dongho Song Invisable file technology for recovering or protecting a computer file system
CN1308812C (en) * 2002-04-29 2007-04-04 上海广电信息产业股份有限公司 Method of controlling user's downloading of softwave from Internet
US7165260B2 (en) * 2002-06-12 2007-01-16 Fsl, L.L.C. Layered computing systems and methods for insecure environments
US8843903B1 (en) * 2003-06-11 2014-09-23 Symantec Corporation Process tracking application layered system
US20040158741A1 (en) * 2003-02-07 2004-08-12 Peter Schneider System and method for remote virus scanning in wireless networks
GB0311537D0 (en) * 2003-05-20 2003-06-25 Safa John Controlling write access of an application to a storage medium
US7028156B1 (en) 2003-07-01 2006-04-11 Veritas Operating Corporation Use of read data tracking and caching to recover from data corruption
US7028139B1 (en) 2003-07-03 2006-04-11 Veritas Operating Corporation Application-assisted recovery from data corruption in parity RAID storage using successive re-reads
US7487495B2 (en) * 2004-04-19 2009-02-03 Lumension Security, Inc. Generic framework for runtime interception and execution control of interpreted languages
WO2005106678A1 (en) 2004-04-30 2005-11-10 Research In Motion Limited System and method of operation control on an electronic device
US7690033B2 (en) * 2004-09-28 2010-03-30 Exobox Technologies Corp. Electronic computer system secured from unauthorized access to and manipulation of data
WO2006101549A2 (en) 2004-12-03 2006-09-28 Whitecell Software, Inc. Secure system for allowing the execution of authorized computer program code
GB0513375D0 (en) 2005-06-30 2005-08-03 Retento Ltd Computer security
US8045958B2 (en) 2005-11-21 2011-10-25 Research In Motion Limited System and method for application program operation on a wireless device
US9600661B2 (en) * 2005-12-01 2017-03-21 Drive Sentry Limited System and method to secure a computer system by selective control of write access to a data storage medium
US10503418B2 (en) 2005-12-01 2019-12-10 Drive Sentry Limited System and method to secure a computer system by selective control of write access to a data storage medium
US7664924B2 (en) 2005-12-01 2010-02-16 Drive Sentry, Inc. System and method to secure a computer system by selective control of write access to a data storage medium
US7757269B1 (en) 2006-02-02 2010-07-13 Mcafee, Inc. Enforcing alignment of approved changes and deployed changes in the software change life-cycle
DE602006006787D1 (en) 2006-02-27 2009-06-25 Research In Motion Ltd Method for personalizing a standardized IT policy
US7895573B1 (en) * 2006-03-27 2011-02-22 Mcafee, Inc. Execution environment file inventory
US8528087B2 (en) * 2006-04-27 2013-09-03 Robot Genius, Inc. Methods for combating malicious software
US20080016571A1 (en) * 2006-07-11 2008-01-17 Larry Chung Yao Chang Rootkit detection system and method
US20080028086A1 (en) * 2006-07-27 2008-01-31 Chetuparambil Madhu K Method and Apparatus for Preserving Isolation of Web Applications when Executing Fragmented Requests
US7908589B2 (en) * 2006-08-29 2011-03-15 Sap Ag Deployment
US7827528B2 (en) 2006-08-29 2010-11-02 Sap Ag Delta layering
US20080071555A1 (en) * 2006-08-29 2008-03-20 Juergen Sattler Application solution proposal engine
US7823124B2 (en) * 2006-08-29 2010-10-26 Sap Ag Transformation layer
US8131644B2 (en) 2006-08-29 2012-03-06 Sap Ag Formular update
US7912800B2 (en) 2006-08-29 2011-03-22 Sap Ag Deduction engine to determine what configuration management scoping questions to ask a user based on responses to one or more previous questions
US8065661B2 (en) 2006-08-29 2011-11-22 Sap Ag Test engine
US7966599B1 (en) 2006-08-29 2011-06-21 Adobe Systems Incorporated Runtime library including a virtual file system
US7831637B2 (en) * 2006-08-29 2010-11-09 Sap Ag System on the fly
US20080082517A1 (en) * 2006-08-29 2008-04-03 Sap Ag Change assistant
US7831568B2 (en) 2006-08-29 2010-11-09 Sap Ag Data migration
US20080059630A1 (en) * 2006-08-29 2008-03-06 Juergen Sattler Assistant
US20080127082A1 (en) * 2006-08-29 2008-05-29 Miho Emil Birimisa System and method for requirements-based application configuration
DE102006049646B3 (en) * 2006-10-20 2008-06-19 Siemens Ag Method and sending device for the secure creation and sending of an electronic message, and method and receiving device for secure receiving and processing of an electronic message
US8332929B1 (en) 2007-01-10 2012-12-11 Mcafee, Inc. Method and apparatus for process enforced configuration management
US9424154B2 (en) 2007-01-10 2016-08-23 Mcafee, Inc. Method of and system for computer system state checks
US8095517B2 (en) * 2007-02-08 2012-01-10 Blue Coat Systems, Inc. Method and system for policy-based protection of application data
US8347358B2 (en) * 2007-06-25 2013-01-01 Microsoft Corporation Open enhanced federation security techniques
US8490160B2 (en) * 2007-10-04 2013-07-16 Microsoft Corporation Open federation security techniques with rate limits
US9626511B2 (en) * 2008-08-26 2017-04-18 Symantec Corporation Agentless enforcement of application management through virtualized block I/O redirection
US8135659B2 (en) 2008-10-01 2012-03-13 Sap Ag System configuration comparison to identify process variation
US9767273B2 (en) 2008-11-26 2017-09-19 Red Hat, Inc. Reliably terminating processes in a system with confined execution environments
US8479256B2 (en) * 2008-11-26 2013-07-02 Red Hat, Inc. Merging mandatory access control (MAC) policies in a system with multiple execution containers
US8396893B2 (en) * 2008-12-11 2013-03-12 Sap Ag Unified configuration of multiple applications
US8255429B2 (en) 2008-12-17 2012-08-28 Sap Ag Configuration change without disruption of incomplete processes
US8510838B1 (en) * 2009-04-08 2013-08-13 Trend Micro, Inc. Malware protection using file input/output virtualization
US8590003B2 (en) 2009-06-15 2013-11-19 Microsoft Corporation Controlling access to resources by hosted entities
US8584087B2 (en) * 2009-12-11 2013-11-12 Sap Ag Application configuration deployment monitor
US8180893B1 (en) * 2010-03-15 2012-05-15 Symantec Corporation Component-level sandboxing
US8938800B2 (en) 2010-07-28 2015-01-20 Mcafee, Inc. System and method for network level protection against malicious software
US8925101B2 (en) 2010-07-28 2014-12-30 Mcafee, Inc. System and method for local protection against malicious software
US8966590B2 (en) 2010-08-17 2015-02-24 Facebook, Inc. Managing social network accessibility based on age
US10574630B2 (en) 2011-02-15 2020-02-25 Webroot Inc. Methods and apparatus for malware threat research
US9112830B2 (en) 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
US9594881B2 (en) 2011-09-09 2017-03-14 Mcafee, Inc. System and method for passive threat detection using virtual memory inspection
US8713668B2 (en) 2011-10-17 2014-04-29 Mcafee, Inc. System and method for redirected firewall discovery in a network environment
US8739272B1 (en) 2012-04-02 2014-05-27 Mcafee, Inc. System and method for interlocking a host and a gateway
CN102662741B (en) * 2012-04-05 2014-04-02 华为技术有限公司 Method, device and system for realizing virtual desktop
US8973146B2 (en) 2012-12-27 2015-03-03 Mcafee, Inc. Herd based scan avoidance system in a network environment
US9253035B2 (en) * 2013-02-21 2016-02-02 International Business Machines Corporation Reducing switch state size in flow-based networks
US9027078B1 (en) * 2013-05-28 2015-05-05 Symantec Corporation Systems and methods for enforcing data loss prevention policies on sandboxed applications
US9489513B1 (en) * 2013-06-25 2016-11-08 Symantec Corporation Systems and methods for securing computing devices against imposter processes
CN105580023B (en) 2013-10-24 2019-08-16 迈克菲股份有限公司 The malicious application of agency's auxiliary in network environment prevents
US10073957B2 (en) * 2013-10-31 2018-09-11 Xiaomi Inc. Method and terminal device for protecting application program
KR20150070890A (en) * 2013-12-17 2015-06-25 삼성전자주식회사 File Processing Method And Electronic Device supporting the same
US9866589B1 (en) * 2014-12-17 2018-01-09 Airwatch Llc Management of actions initiated by applications in client devices
US20230251842A1 (en) * 2022-01-13 2023-08-10 Vmware, Inc. Application installation on a remote desktop using local installation files
CN116975002B (en) * 2023-09-22 2023-12-26 麒麟软件有限公司 Method for protecting open file under domestic Linux operating system

Family Cites Families (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5075884A (en) * 1987-12-23 1991-12-24 Loral Aerospace Corp. Multilevel secure workstation
DE3934713A1 (en) * 1989-10-18 1991-04-25 Bayer Ag METHOD FOR DYING LEATHER
GB9003890D0 (en) 1990-02-21 1990-04-18 Rodime Plc Method and apparatus for controlling access to and corruption of information in computer systems
US5367682A (en) 1991-04-29 1994-11-22 Steven Chang Data processing virus protection circuitry including a permanent memory for storing a redundant partition table
AU3777593A (en) 1992-02-26 1993-09-13 Paul C. Clark System for protecting computers via intelligent tokens or smart cards
US5361358A (en) 1992-08-07 1994-11-01 International Business Machines Corporation System and method for installing program code for operation from multiple bootable operating systems
US5390324A (en) 1992-10-02 1995-02-14 Compaq Computer Corporation Computer failure recovery and alert system
US5826012A (en) 1995-04-21 1998-10-20 Lettvin; Jonathan D. Boot-time anti-virus and maintenance facility
US5579478A (en) * 1995-05-16 1996-11-26 Hewlett-Packard Company System administration module for an operating system affords graded restricted access privileges
US5708812A (en) * 1996-01-18 1998-01-13 Microsoft Corporation Method and apparatus for Migrating from a source domain network controller to a target domain network controller
US5761428A (en) * 1996-07-05 1998-06-02 Ncr Corporation Method and aparatus for providing agent capability independent from a network node
US5974567A (en) 1997-06-20 1999-10-26 Compaq Computer Corporation Ghost partition
US5944820A (en) 1997-10-15 1999-08-31 Dell U.S.A., L.P. Modifiable partition boot record for a computer memory device
US6038563A (en) 1997-10-31 2000-03-14 Sun Microsystems, Inc. System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects
US6085191A (en) 1997-10-31 2000-07-04 Sun Microsystems, Inc. System and method for providing database access control in a secure distributed network
US5999978A (en) 1997-10-31 1999-12-07 Sun Microsystems, Inc. Distributed system and method for controlling access to network resources and event notifications
US6016536A (en) 1997-11-13 2000-01-18 Ye-Te Wu Method for backing up the system files in a hard disk drive
US6026402A (en) 1998-01-07 2000-02-15 Hewlett-Packard Company Process restriction within file system hierarchies
US6266774B1 (en) 1998-12-08 2001-07-24 Mcafee.Com Corporation Method and system for securing, managing or optimizing a personal computer
US6941470B1 (en) 2000-04-07 2005-09-06 Everdream Corporation Protected execution environments within a computer system
US7543655B2 (en) * 2004-02-10 2009-06-09 Gregg Nathan Buchl Selective position control system and method

Also Published As

Publication number Publication date
US7444671B2 (en) 2008-10-28
US20050182964A1 (en) 2005-08-18
US6941470B1 (en) 2005-09-06
WO2001077811A1 (en) 2001-10-18
US20050188422A1 (en) 2005-08-25
US7451482B2 (en) 2008-11-11
US7478423B2 (en) 2009-01-13
US7475423B2 (en) 2009-01-06
US20050183137A1 (en) 2005-08-18
US20050188227A1 (en) 2005-08-25

Similar Documents

Publication Publication Date Title
AU2001253049A1 (en) Protected execution environments within a computer system
EP1223498A3 (en) A computer housing
AU2001269811A1 (en) Symbolic definition of a computer system
GB2373607B (en) A computer system
AU2001227597A1 (en) Protection domains for a computer operating system
AU2002212464A1 (en) Computer system
AU4125001A (en) Computer case
AU2001231524A1 (en) Pointing means for a computer
AU3549200A (en) A computer heat-radiation system
AU3752801A (en) A data retail system
AU2002220935A1 (en) A data processing system
GB2373606B (en) A computer system
GB2366012B (en) A computer system
AU2001269332A1 (en) Computer software installation
AU2001225719A1 (en) A computer pointing device
AU2001252367A1 (en) Improvements relating to computer systems
AU4052599A (en) A computer dongle
AU3579801A (en) A data interface system
AU4132500A (en) A computer interface
AU2002212323A1 (en) Computer mouse
AU2001296039A1 (en) Computer
AUPQ128699A0 (en) A scalable computer system
AU4532500A (en) Alarm system comprising a computer
GB0009943D0 (en) Operating a computer system
AUPQ851300A0 (en) A computer mouse