AU2001253049A1 - Protected execution environments within a computer system - Google Patents
Protected execution environments within a computer systemInfo
- Publication number
- AU2001253049A1 AU2001253049A1 AU2001253049A AU5304901A AU2001253049A1 AU 2001253049 A1 AU2001253049 A1 AU 2001253049A1 AU 2001253049 A AU2001253049 A AU 2001253049A AU 5304901 A AU5304901 A AU 5304901A AU 2001253049 A1 AU2001253049 A1 AU 2001253049A1
- Authority
- AU
- Australia
- Prior art keywords
- computer system
- execution environments
- protected execution
- protected
- environments
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US09545286 | 2000-04-07 | ||
US09/545,286 US6941470B1 (en) | 2000-04-07 | 2000-04-07 | Protected execution environments within a computer system |
PCT/US2001/010441 WO2001077811A1 (en) | 2000-04-07 | 2001-03-29 | Protected execution environments within a computer system |
Publications (1)
Publication Number | Publication Date |
---|---|
AU2001253049A1 true AU2001253049A1 (en) | 2001-10-23 |
Family
ID=24175615
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
AU2001253049A Abandoned AU2001253049A1 (en) | 2000-04-07 | 2001-03-29 | Protected execution environments within a computer system |
Country Status (3)
Country | Link |
---|---|
US (5) | US6941470B1 (en) |
AU (1) | AU2001253049A1 (en) |
WO (1) | WO2001077811A1 (en) |
Families Citing this family (72)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6941470B1 (en) * | 2000-04-07 | 2005-09-06 | Everdream Corporation | Protected execution environments within a computer system |
US20030115458A1 (en) * | 2001-12-19 | 2003-06-19 | Dongho Song | Invisable file technology for recovering or protecting a computer file system |
CN1308812C (en) * | 2002-04-29 | 2007-04-04 | 上海广电信息产业股份有限公司 | Method of controlling user's downloading of softwave from Internet |
US7165260B2 (en) * | 2002-06-12 | 2007-01-16 | Fsl, L.L.C. | Layered computing systems and methods for insecure environments |
US8843903B1 (en) * | 2003-06-11 | 2014-09-23 | Symantec Corporation | Process tracking application layered system |
US20040158741A1 (en) * | 2003-02-07 | 2004-08-12 | Peter Schneider | System and method for remote virus scanning in wireless networks |
GB0311537D0 (en) * | 2003-05-20 | 2003-06-25 | Safa John | Controlling write access of an application to a storage medium |
US7028156B1 (en) | 2003-07-01 | 2006-04-11 | Veritas Operating Corporation | Use of read data tracking and caching to recover from data corruption |
US7028139B1 (en) | 2003-07-03 | 2006-04-11 | Veritas Operating Corporation | Application-assisted recovery from data corruption in parity RAID storage using successive re-reads |
US7487495B2 (en) * | 2004-04-19 | 2009-02-03 | Lumension Security, Inc. | Generic framework for runtime interception and execution control of interpreted languages |
WO2005106678A1 (en) | 2004-04-30 | 2005-11-10 | Research In Motion Limited | System and method of operation control on an electronic device |
US7690033B2 (en) * | 2004-09-28 | 2010-03-30 | Exobox Technologies Corp. | Electronic computer system secured from unauthorized access to and manipulation of data |
WO2006101549A2 (en) | 2004-12-03 | 2006-09-28 | Whitecell Software, Inc. | Secure system for allowing the execution of authorized computer program code |
GB0513375D0 (en) | 2005-06-30 | 2005-08-03 | Retento Ltd | Computer security |
US8045958B2 (en) | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
US9600661B2 (en) * | 2005-12-01 | 2017-03-21 | Drive Sentry Limited | System and method to secure a computer system by selective control of write access to a data storage medium |
US10503418B2 (en) | 2005-12-01 | 2019-12-10 | Drive Sentry Limited | System and method to secure a computer system by selective control of write access to a data storage medium |
US7664924B2 (en) | 2005-12-01 | 2010-02-16 | Drive Sentry, Inc. | System and method to secure a computer system by selective control of write access to a data storage medium |
US7757269B1 (en) | 2006-02-02 | 2010-07-13 | Mcafee, Inc. | Enforcing alignment of approved changes and deployed changes in the software change life-cycle |
DE602006006787D1 (en) | 2006-02-27 | 2009-06-25 | Research In Motion Ltd | Method for personalizing a standardized IT policy |
US7895573B1 (en) * | 2006-03-27 | 2011-02-22 | Mcafee, Inc. | Execution environment file inventory |
US8528087B2 (en) * | 2006-04-27 | 2013-09-03 | Robot Genius, Inc. | Methods for combating malicious software |
US20080016571A1 (en) * | 2006-07-11 | 2008-01-17 | Larry Chung Yao Chang | Rootkit detection system and method |
US20080028086A1 (en) * | 2006-07-27 | 2008-01-31 | Chetuparambil Madhu K | Method and Apparatus for Preserving Isolation of Web Applications when Executing Fragmented Requests |
US7908589B2 (en) * | 2006-08-29 | 2011-03-15 | Sap Ag | Deployment |
US7827528B2 (en) | 2006-08-29 | 2010-11-02 | Sap Ag | Delta layering |
US20080071555A1 (en) * | 2006-08-29 | 2008-03-20 | Juergen Sattler | Application solution proposal engine |
US7823124B2 (en) * | 2006-08-29 | 2010-10-26 | Sap Ag | Transformation layer |
US8131644B2 (en) | 2006-08-29 | 2012-03-06 | Sap Ag | Formular update |
US7912800B2 (en) | 2006-08-29 | 2011-03-22 | Sap Ag | Deduction engine to determine what configuration management scoping questions to ask a user based on responses to one or more previous questions |
US8065661B2 (en) | 2006-08-29 | 2011-11-22 | Sap Ag | Test engine |
US7966599B1 (en) | 2006-08-29 | 2011-06-21 | Adobe Systems Incorporated | Runtime library including a virtual file system |
US7831637B2 (en) * | 2006-08-29 | 2010-11-09 | Sap Ag | System on the fly |
US20080082517A1 (en) * | 2006-08-29 | 2008-04-03 | Sap Ag | Change assistant |
US7831568B2 (en) | 2006-08-29 | 2010-11-09 | Sap Ag | Data migration |
US20080059630A1 (en) * | 2006-08-29 | 2008-03-06 | Juergen Sattler | Assistant |
US20080127082A1 (en) * | 2006-08-29 | 2008-05-29 | Miho Emil Birimisa | System and method for requirements-based application configuration |
DE102006049646B3 (en) * | 2006-10-20 | 2008-06-19 | Siemens Ag | Method and sending device for the secure creation and sending of an electronic message, and method and receiving device for secure receiving and processing of an electronic message |
US8332929B1 (en) | 2007-01-10 | 2012-12-11 | Mcafee, Inc. | Method and apparatus for process enforced configuration management |
US9424154B2 (en) | 2007-01-10 | 2016-08-23 | Mcafee, Inc. | Method of and system for computer system state checks |
US8095517B2 (en) * | 2007-02-08 | 2012-01-10 | Blue Coat Systems, Inc. | Method and system for policy-based protection of application data |
US8347358B2 (en) * | 2007-06-25 | 2013-01-01 | Microsoft Corporation | Open enhanced federation security techniques |
US8490160B2 (en) * | 2007-10-04 | 2013-07-16 | Microsoft Corporation | Open federation security techniques with rate limits |
US9626511B2 (en) * | 2008-08-26 | 2017-04-18 | Symantec Corporation | Agentless enforcement of application management through virtualized block I/O redirection |
US8135659B2 (en) | 2008-10-01 | 2012-03-13 | Sap Ag | System configuration comparison to identify process variation |
US9767273B2 (en) | 2008-11-26 | 2017-09-19 | Red Hat, Inc. | Reliably terminating processes in a system with confined execution environments |
US8479256B2 (en) * | 2008-11-26 | 2013-07-02 | Red Hat, Inc. | Merging mandatory access control (MAC) policies in a system with multiple execution containers |
US8396893B2 (en) * | 2008-12-11 | 2013-03-12 | Sap Ag | Unified configuration of multiple applications |
US8255429B2 (en) | 2008-12-17 | 2012-08-28 | Sap Ag | Configuration change without disruption of incomplete processes |
US8510838B1 (en) * | 2009-04-08 | 2013-08-13 | Trend Micro, Inc. | Malware protection using file input/output virtualization |
US8590003B2 (en) | 2009-06-15 | 2013-11-19 | Microsoft Corporation | Controlling access to resources by hosted entities |
US8584087B2 (en) * | 2009-12-11 | 2013-11-12 | Sap Ag | Application configuration deployment monitor |
US8180893B1 (en) * | 2010-03-15 | 2012-05-15 | Symantec Corporation | Component-level sandboxing |
US8938800B2 (en) | 2010-07-28 | 2015-01-20 | Mcafee, Inc. | System and method for network level protection against malicious software |
US8925101B2 (en) | 2010-07-28 | 2014-12-30 | Mcafee, Inc. | System and method for local protection against malicious software |
US8966590B2 (en) | 2010-08-17 | 2015-02-24 | Facebook, Inc. | Managing social network accessibility based on age |
US10574630B2 (en) | 2011-02-15 | 2020-02-25 | Webroot Inc. | Methods and apparatus for malware threat research |
US9112830B2 (en) | 2011-02-23 | 2015-08-18 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
US9594881B2 (en) | 2011-09-09 | 2017-03-14 | Mcafee, Inc. | System and method for passive threat detection using virtual memory inspection |
US8713668B2 (en) | 2011-10-17 | 2014-04-29 | Mcafee, Inc. | System and method for redirected firewall discovery in a network environment |
US8739272B1 (en) | 2012-04-02 | 2014-05-27 | Mcafee, Inc. | System and method for interlocking a host and a gateway |
CN102662741B (en) * | 2012-04-05 | 2014-04-02 | 华为技术有限公司 | Method, device and system for realizing virtual desktop |
US8973146B2 (en) | 2012-12-27 | 2015-03-03 | Mcafee, Inc. | Herd based scan avoidance system in a network environment |
US9253035B2 (en) * | 2013-02-21 | 2016-02-02 | International Business Machines Corporation | Reducing switch state size in flow-based networks |
US9027078B1 (en) * | 2013-05-28 | 2015-05-05 | Symantec Corporation | Systems and methods for enforcing data loss prevention policies on sandboxed applications |
US9489513B1 (en) * | 2013-06-25 | 2016-11-08 | Symantec Corporation | Systems and methods for securing computing devices against imposter processes |
CN105580023B (en) | 2013-10-24 | 2019-08-16 | 迈克菲股份有限公司 | The malicious application of agency's auxiliary in network environment prevents |
US10073957B2 (en) * | 2013-10-31 | 2018-09-11 | Xiaomi Inc. | Method and terminal device for protecting application program |
KR20150070890A (en) * | 2013-12-17 | 2015-06-25 | 삼성전자주식회사 | File Processing Method And Electronic Device supporting the same |
US9866589B1 (en) * | 2014-12-17 | 2018-01-09 | Airwatch Llc | Management of actions initiated by applications in client devices |
US20230251842A1 (en) * | 2022-01-13 | 2023-08-10 | Vmware, Inc. | Application installation on a remote desktop using local installation files |
CN116975002B (en) * | 2023-09-22 | 2023-12-26 | 麒麟软件有限公司 | Method for protecting open file under domestic Linux operating system |
Family Cites Families (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5075884A (en) * | 1987-12-23 | 1991-12-24 | Loral Aerospace Corp. | Multilevel secure workstation |
DE3934713A1 (en) * | 1989-10-18 | 1991-04-25 | Bayer Ag | METHOD FOR DYING LEATHER |
GB9003890D0 (en) | 1990-02-21 | 1990-04-18 | Rodime Plc | Method and apparatus for controlling access to and corruption of information in computer systems |
US5367682A (en) | 1991-04-29 | 1994-11-22 | Steven Chang | Data processing virus protection circuitry including a permanent memory for storing a redundant partition table |
AU3777593A (en) | 1992-02-26 | 1993-09-13 | Paul C. Clark | System for protecting computers via intelligent tokens or smart cards |
US5361358A (en) | 1992-08-07 | 1994-11-01 | International Business Machines Corporation | System and method for installing program code for operation from multiple bootable operating systems |
US5390324A (en) | 1992-10-02 | 1995-02-14 | Compaq Computer Corporation | Computer failure recovery and alert system |
US5826012A (en) | 1995-04-21 | 1998-10-20 | Lettvin; Jonathan D. | Boot-time anti-virus and maintenance facility |
US5579478A (en) * | 1995-05-16 | 1996-11-26 | Hewlett-Packard Company | System administration module for an operating system affords graded restricted access privileges |
US5708812A (en) * | 1996-01-18 | 1998-01-13 | Microsoft Corporation | Method and apparatus for Migrating from a source domain network controller to a target domain network controller |
US5761428A (en) * | 1996-07-05 | 1998-06-02 | Ncr Corporation | Method and aparatus for providing agent capability independent from a network node |
US5974567A (en) | 1997-06-20 | 1999-10-26 | Compaq Computer Corporation | Ghost partition |
US5944820A (en) | 1997-10-15 | 1999-08-31 | Dell U.S.A., L.P. | Modifiable partition boot record for a computer memory device |
US6038563A (en) | 1997-10-31 | 2000-03-14 | Sun Microsystems, Inc. | System and method for restricting database access to managed object information using a permissions table that specifies access rights corresponding to user access rights to the managed objects |
US6085191A (en) | 1997-10-31 | 2000-07-04 | Sun Microsystems, Inc. | System and method for providing database access control in a secure distributed network |
US5999978A (en) | 1997-10-31 | 1999-12-07 | Sun Microsystems, Inc. | Distributed system and method for controlling access to network resources and event notifications |
US6016536A (en) | 1997-11-13 | 2000-01-18 | Ye-Te Wu | Method for backing up the system files in a hard disk drive |
US6026402A (en) | 1998-01-07 | 2000-02-15 | Hewlett-Packard Company | Process restriction within file system hierarchies |
US6266774B1 (en) | 1998-12-08 | 2001-07-24 | Mcafee.Com Corporation | Method and system for securing, managing or optimizing a personal computer |
US6941470B1 (en) | 2000-04-07 | 2005-09-06 | Everdream Corporation | Protected execution environments within a computer system |
US7543655B2 (en) * | 2004-02-10 | 2009-06-09 | Gregg Nathan Buchl | Selective position control system and method |
-
2000
- 2000-04-07 US US09/545,286 patent/US6941470B1/en not_active Expired - Lifetime
-
2001
- 2001-03-29 WO PCT/US2001/010441 patent/WO2001077811A1/en active Application Filing
- 2001-03-29 AU AU2001253049A patent/AU2001253049A1/en not_active Abandoned
-
2005
- 2005-04-15 US US11/106,942 patent/US7475423B2/en not_active Expired - Lifetime
- 2005-04-15 US US11/106,832 patent/US7478423B2/en not_active Expired - Lifetime
- 2005-04-15 US US11/107,018 patent/US7444671B2/en not_active Expired - Lifetime
- 2005-04-15 US US11/106,951 patent/US7451482B2/en not_active Expired - Lifetime
Also Published As
Publication number | Publication date |
---|---|
US7444671B2 (en) | 2008-10-28 |
US20050182964A1 (en) | 2005-08-18 |
US6941470B1 (en) | 2005-09-06 |
WO2001077811A1 (en) | 2001-10-18 |
US20050188422A1 (en) | 2005-08-25 |
US7451482B2 (en) | 2008-11-11 |
US7478423B2 (en) | 2009-01-13 |
US7475423B2 (en) | 2009-01-06 |
US20050183137A1 (en) | 2005-08-18 |
US20050188227A1 (en) | 2005-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2001253049A1 (en) | Protected execution environments within a computer system | |
EP1223498A3 (en) | A computer housing | |
AU2001269811A1 (en) | Symbolic definition of a computer system | |
GB2373607B (en) | A computer system | |
AU2001227597A1 (en) | Protection domains for a computer operating system | |
AU2002212464A1 (en) | Computer system | |
AU4125001A (en) | Computer case | |
AU2001231524A1 (en) | Pointing means for a computer | |
AU3549200A (en) | A computer heat-radiation system | |
AU3752801A (en) | A data retail system | |
AU2002220935A1 (en) | A data processing system | |
GB2373606B (en) | A computer system | |
GB2366012B (en) | A computer system | |
AU2001269332A1 (en) | Computer software installation | |
AU2001225719A1 (en) | A computer pointing device | |
AU2001252367A1 (en) | Improvements relating to computer systems | |
AU4052599A (en) | A computer dongle | |
AU3579801A (en) | A data interface system | |
AU4132500A (en) | A computer interface | |
AU2002212323A1 (en) | Computer mouse | |
AU2001296039A1 (en) | Computer | |
AUPQ128699A0 (en) | A scalable computer system | |
AU4532500A (en) | Alarm system comprising a computer | |
GB0009943D0 (en) | Operating a computer system | |
AUPQ851300A0 (en) | A computer mouse |