BR102013009890A2 - método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador - Google Patents
método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador Download PDFInfo
- Publication number
- BR102013009890A2 BR102013009890A2 BR102013009890A BR102013009890A BR102013009890A2 BR 102013009890 A2 BR102013009890 A2 BR 102013009890A2 BR 102013009890 A BR102013009890 A BR 102013009890A BR 102013009890 A BR102013009890 A BR 102013009890A BR 102013009890 A2 BR102013009890 A2 BR 102013009890A2
- Authority
- BR
- Brazil
- Prior art keywords
- component
- interaction
- components
- source
- security level
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6281—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/105—Multiple levels of security
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Automation & Control Theory (AREA)
- Signal Processing (AREA)
- Mathematical Physics (AREA)
- Databases & Information Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Storage Device Security (AREA)
- Hardware Redundancy (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| GBGB1207404.3A GB201207404D0 (en) | 2012-04-27 | 2012-04-27 | Security system and method for controlling interactions between components of a computer system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| BR102013009890A2 true BR102013009890A2 (pt) | 2017-05-02 |
Family
ID=46330457
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BR102013009890A BR102013009890A2 (pt) | 2012-04-27 | 2013-04-23 | método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador |
Country Status (8)
| Country | Link |
|---|---|
| US (1) | US9122883B2 (https=) |
| JP (1) | JP6183889B2 (https=) |
| CN (1) | CN103377337A (https=) |
| BR (1) | BR102013009890A2 (https=) |
| CA (1) | CA2813425C (https=) |
| DE (1) | DE102013104053A1 (https=) |
| FR (1) | FR2990037B1 (https=) |
| GB (2) | GB201207404D0 (https=) |
Families Citing this family (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| AU2013204965B2 (en) | 2012-11-12 | 2016-07-28 | C2 Systems Limited | A system, method, computer program and data signal for the registration, monitoring and control of machines and devices |
| US9769192B2 (en) | 2014-02-28 | 2017-09-19 | Temporal Defense Systems, Llc | Security evaluation systems and methods |
| US9887984B2 (en) | 2014-10-24 | 2018-02-06 | Temporal Defense Systems, Llc | Autonomous system for secure electric system access |
| US10372946B1 (en) * | 2016-10-17 | 2019-08-06 | Altera Corporation | Systems and methods for configuring a secure computing environment on an integrated circuit |
| CN112948824B (zh) * | 2021-03-31 | 2022-04-26 | 支付宝(杭州)信息技术有限公司 | 一种基于隐私保护的程序通信方法、装置及设备 |
| GB2624643A (en) * | 2022-11-23 | 2024-05-29 | Nchain Licensing Ag | Communication protocol |
Family Cites Families (12)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US4184201A (en) | 1978-04-26 | 1980-01-15 | Sperry Rand Corporation | Integrating processor element |
| CN1149476C (zh) * | 1995-03-16 | 2004-05-12 | 松下电器产业株式会社 | 资源分配装置 |
| US6934859B2 (en) | 2000-06-09 | 2005-08-23 | Northrop Grumman Corporation | Authenticated search engines |
| JP3927376B2 (ja) * | 2001-03-27 | 2007-06-06 | 日立ソフトウエアエンジニアリング株式会社 | データ持ち出し禁止用プログラム |
| US20040139312A1 (en) * | 2003-01-14 | 2004-07-15 | General Instrument Corporation | Categorization of host security levels based on functionality implemented inside secure hardware |
| JP4501156B2 (ja) * | 2004-10-28 | 2010-07-14 | 日本電気株式会社 | 機密モードに応じたアクセスフォルダ切り替え方法、プログラム、及びコンピュータシステム |
| DE102005028663B4 (de) * | 2005-06-15 | 2024-10-24 | Volkswagen Ag | Verfahren und Vorrichtung zum sicheren Kommunizieren einer Komponente eines Fahrzeugs über eine drahtlose Kommunikationsverbindung mit einem externen Kommunikationspartner |
| US20070143601A1 (en) | 2005-12-15 | 2007-06-21 | Arroyo Diana J | System and method for authorizing information flows |
| FR2898445B1 (fr) * | 2006-03-08 | 2008-11-14 | Airbus France Sas | Procede et dispositif de detection de tentatives d'intrusion sur une liaison de communication entre un aeronef et une station sol. |
| US8060744B2 (en) | 2006-03-23 | 2011-11-15 | Harris Corporation | Computer architecture for an electronic device providing single-level secure access to multi-level secure file system |
| CN100539499C (zh) * | 2006-06-02 | 2009-09-09 | 清华大学 | 一种安全的星形局域网计算机系统 |
| US8826366B2 (en) * | 2010-07-15 | 2014-09-02 | Tt Government Solutions, Inc. | Verifying access-control policies with arithmetic quantifier-free form constraints |
-
2012
- 2012-04-27 GB GBGB1207404.3A patent/GB201207404D0/en not_active Ceased
-
2013
- 2013-04-18 US US13/865,518 patent/US9122883B2/en active Active
- 2013-04-18 CA CA2813425A patent/CA2813425C/en not_active Expired - Fee Related
- 2013-04-22 DE DE102013104053A patent/DE102013104053A1/de active Pending
- 2013-04-23 BR BR102013009890A patent/BR102013009890A2/pt active Search and Examination
- 2013-04-24 FR FR1353743A patent/FR2990037B1/fr active Active
- 2013-04-24 JP JP2013090839A patent/JP6183889B2/ja not_active Expired - Fee Related
- 2013-04-26 GB GB1307621.1A patent/GB2503553B/en active Active
- 2013-05-02 CN CN2013101581657A patent/CN103377337A/zh active Pending
Also Published As
| Publication number | Publication date |
|---|---|
| GB2503553B (en) | 2014-07-16 |
| GB201207404D0 (en) | 2012-06-13 |
| JP6183889B2 (ja) | 2017-08-23 |
| FR2990037A1 (fr) | 2013-11-01 |
| GB2503553A (en) | 2014-01-01 |
| CA2813425C (en) | 2020-07-14 |
| GB201307621D0 (en) | 2013-06-12 |
| DE102013104053A1 (de) | 2013-10-31 |
| US20130291057A1 (en) | 2013-10-31 |
| CN103377337A (zh) | 2013-10-30 |
| CA2813425A1 (en) | 2013-10-27 |
| FR2990037B1 (fr) | 2016-09-02 |
| US9122883B2 (en) | 2015-09-01 |
| JP2013242860A (ja) | 2013-12-05 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US8136147B2 (en) | Privilege management | |
| BR102013009890A2 (pt) | método para controlar interações entre um ou mais componentes de um sistema de computador, meio legível por computador e sistema de segurança para controlar interações entre um ou mais componentes de um sistema de computador | |
| US8789170B2 (en) | Method for enforcing resource access control in computer systems | |
| US9917863B2 (en) | Method and system for implementing mandatory file access control in native discretionary access control environments | |
| US20170005983A1 (en) | Computer security architecture and related computing method | |
| KR101565590B1 (ko) | 역할기반 접근통제 및 인가된 파일 리스트를 통한 파일접근 통제 통합 시스템 | |
| US9516031B2 (en) | Assignment of security contexts to define access permissions for file system objects | |
| CN104601580A (zh) | 一种基于强制访问控制的策略容器设计方法 | |
| CN105827645A (zh) | 一种用于访问控制的方法、设备与系统 | |
| CN106101074A (zh) | 一种面向大数据平台的基于用户分级的安全调度方法 | |
| US10318767B2 (en) | Multi-tier security framework | |
| KR102690042B1 (ko) | 접근 대상의 보안 수준에 따른 암호 규칙 자동 관리 방법, 장치 및 컴퓨터-판독가능 기록매체 | |
| Ahuja | Securing Container Isolation in Multi-Tenant Environments | |
| Bishop | Unix security: threats and solutions | |
| Venelle et al. | Security enhanced java: Mandatory access control for the java virtual machine | |
| Lesas et al. | PBAC4M: provenance-based access control for mobile | |
| Villarreal et al. | A pattern for whitelisting firewalls (wlf) | |
| Clarke | Zero-Trust Architecture Implementation for Securing Interoperable Health Tech Ecosystems | |
| KR20080015176A (ko) | 메타 접근통제 시스템 | |
| Guclu et al. | Research Article A New Scalable and Expandable Access Control Model for Distributed Database Systems in Data Security | |
| Yu et al. | An information flow based security model for Linux clusters | |
| RU2572385C2 (ru) | Система разграничения доступа по расширениям файлов | |
| Mitchell | General concepts | |
| Jianxiao et al. | The applied research of access control model in scientific data sharing platform | |
| EA044131B1 (ru) | Способ и система предотвращения получения несанкционированного доступа к объектам корпоративной сети |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B03A | Publication of a patent application or of a certificate of addition of invention [chapter 3.1 patent gazette] | ||
| B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
| B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
| B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
| B11D | Dismissal acc. art. 38, par 2 of ipl - failure to pay fee after grant in time |