BR112012019384A8 - Método para executar uma aplicação e portador de dados portátil - Google Patents
Método para executar uma aplicação e portador de dados portátilInfo
- Publication number
- BR112012019384A8 BR112012019384A8 BR112012019384A BR112012019384A BR112012019384A8 BR 112012019384 A8 BR112012019384 A8 BR 112012019384A8 BR 112012019384 A BR112012019384 A BR 112012019384A BR 112012019384 A BR112012019384 A BR 112012019384A BR 112012019384 A8 BR112012019384 A8 BR 112012019384A8
- Authority
- BR
- Brazil
- Prior art keywords
- application
- running
- data carrier
- portable data
- operating system
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Landscapes
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Mathematical Physics (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
- Debugging And Monitoring (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Stored Programmes (AREA)
Abstract
MÉTODO PARA EXECUTAR UMA APLICAÇÃO E PORTADOR DE DADOS PORTÁTIL. A presente invenção descreve um método para executar uma aplicação (A) que compreende código interpretável ou nativo executável e chama funções de um sistema operacional (BS), em que o sistema operacional (BS) transmite um resultado de uma respectiva chamada de função (f1) à aplicação (A). O método, de acordo com a invenção, é caracterizado pelo fato de que a aplicação (A) verifica o resultado de uma respectiva chamada de função para uma falsificação, de modo a detectar um ataque.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102010006572A DE102010006572A1 (de) | 2010-02-02 | 2010-02-02 | Verfahren zum Ausführen einer Anwendung |
DE102010006572.2 | 2010-02-02 | ||
PCT/EP2011/000451 WO2011095320A1 (de) | 2010-02-02 | 2011-02-01 | Verfahren zum ausführen einer anwendung |
Publications (3)
Publication Number | Publication Date |
---|---|
BR112012019384A2 BR112012019384A2 (pt) | 2018-05-02 |
BR112012019384A8 true BR112012019384A8 (pt) | 2018-06-12 |
BR112012019384B1 BR112012019384B1 (pt) | 2020-10-20 |
Family
ID=44072582
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112012019384-8A BR112012019384B1 (pt) | 2010-02-02 | 2011-02-01 | método para executar uma aplicação e portador de dados portátil |
Country Status (6)
Country | Link |
---|---|
US (1) | US9171186B2 (pt) |
EP (1) | EP2531949B1 (pt) |
CN (1) | CN102822836B (pt) |
BR (1) | BR112012019384B1 (pt) |
DE (1) | DE102010006572A1 (pt) |
WO (1) | WO2011095320A1 (pt) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3114602B1 (en) * | 2014-03-07 | 2022-01-12 | Nokia Technologies Oy | Method and apparatus for verifying processed data |
CN106778272A (zh) * | 2016-12-27 | 2017-05-31 | 成都三零瑞通移动通信有限公司 | 一种对调用函数进行动态安全检测的方法 |
Family Cites Families (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0632377B1 (en) * | 1993-06-30 | 1998-12-30 | Microsoft Corporation | Method for testing a message-driven operating system |
US5909545A (en) * | 1996-01-19 | 1999-06-01 | Tridia Corporation | Method and system for on demand downloading of module to enable remote control of an application program over a network |
EP1143688A1 (en) * | 2000-03-02 | 2001-10-10 | Client Electronics GmbH | Mobile services on the basis of a smart card |
KR100435783B1 (ko) * | 2000-07-31 | 2004-06-12 | 엘지전자 주식회사 | 운영 체계에서 사용자 메모리 유효성 검증 방법 |
US7072876B1 (en) * | 2000-09-19 | 2006-07-04 | Cigital | System and method for mining execution traces with finite automata |
US6983380B2 (en) * | 2001-02-06 | 2006-01-03 | Networks Associates Technology, Inc. | Automatically generating valid behavior specifications for intrusion detection |
CN1197006C (zh) | 2001-02-20 | 2005-04-13 | 英业达股份有限公司 | 一种生成具有自检测和自修复功能的应用程序的方法 |
US7099663B2 (en) | 2001-05-31 | 2006-08-29 | Qualcomm Inc. | Safe application distribution and execution in a wireless environment |
US7039953B2 (en) * | 2001-08-30 | 2006-05-02 | International Business Machines Corporation | Hierarchical correlation of intrusion detection events |
US7065677B1 (en) * | 2003-04-10 | 2006-06-20 | Microsoft Corporation | Method for testing operating system components |
US7739689B1 (en) * | 2004-02-27 | 2010-06-15 | Symantec Operating Corporation | Internal monitoring of applications in a distributed management framework |
US7900194B1 (en) * | 2004-03-25 | 2011-03-01 | Verizon Corporate Services Group Inc. | Kernel-based intrusion detection using bloom filters |
US20070100902A1 (en) * | 2005-10-27 | 2007-05-03 | Dinesh Sinha | Two way incremental dynamic application data synchronization |
WO2007098642A1 (en) * | 2006-03-04 | 2007-09-07 | Intel Corporation | MECHANlSM FOR ACCESS CONTROL OF COMPUTING SYSTEM IN PRE-OS STAGE |
WO2007122495A2 (en) * | 2006-04-21 | 2007-11-01 | Axalto Sa | A framework for protecting resource-constrained network devices from denial-of-service attacks |
DE102006037810A1 (de) * | 2006-08-11 | 2008-02-14 | Giesecke & Devrient Gmbh | Sichere Programmcodeausführung |
US8458790B2 (en) * | 2006-10-12 | 2013-06-04 | International Business Machines Corporation | Defending smart cards against attacks by redundant processing |
CN102027482A (zh) * | 2008-05-15 | 2011-04-20 | Nxp股份有限公司 | 用于安全数据读取的方法和数据处理系统 |
US7788433B2 (en) | 2008-05-24 | 2010-08-31 | Via Technologies, Inc. | Microprocessor apparatus providing for secure interrupts and exceptions |
CN101408917A (zh) * | 2008-10-22 | 2009-04-15 | 厦门市美亚柏科资讯科技有限公司 | 应用程序行为合法性检测方法及系统 |
KR101719635B1 (ko) * | 2009-10-08 | 2017-03-27 | 이르데토 비.브이. | 동적 함수 호출 시스템들에서 공격적인 자기-수정을 위한 시스템 및 방법 |
US8412980B2 (en) * | 2010-06-04 | 2013-04-02 | International Business Machines Corporation | Fault tolerant stability critical execution checking using redundant execution pipelines |
-
2010
- 2010-02-02 DE DE102010006572A patent/DE102010006572A1/de not_active Withdrawn
-
2011
- 2011-02-01 BR BR112012019384-8A patent/BR112012019384B1/pt active IP Right Grant
- 2011-02-01 US US13/576,278 patent/US9171186B2/en active Active
- 2011-02-01 WO PCT/EP2011/000451 patent/WO2011095320A1/de active Application Filing
- 2011-02-01 CN CN201180016533.3A patent/CN102822836B/zh active Active
- 2011-02-01 EP EP11701954.7A patent/EP2531949B1/de active Active
Also Published As
Publication number | Publication date |
---|---|
EP2531949A1 (de) | 2012-12-12 |
DE102010006572A1 (de) | 2011-08-04 |
CN102822836B (zh) | 2016-02-10 |
EP2531949B1 (de) | 2018-05-23 |
CN102822836A (zh) | 2012-12-12 |
BR112012019384B1 (pt) | 2020-10-20 |
WO2011095320A1 (de) | 2011-08-11 |
US9171186B2 (en) | 2015-10-27 |
US20120297479A1 (en) | 2012-11-22 |
BR112012019384A2 (pt) | 2018-05-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112014023828A8 (pt) | Método e sistema para dinamicamente instalar plugins em aplicativo distribuído em sistemas remotos | |
WO2011146917A3 (en) | Apparatuses, systems and methods for determining installed software applications on a computing device | |
BR112017019042A2 (pt) | sensores inteligentes com processamento de sinal local | |
BR112014017156A8 (pt) | prevenção de execução dinâmica para impedir programação orientada para retorno | |
BR112016002536A2 (pt) | peça de vestuário com dispositivo de emergência e método de emergência associado | |
BR112015008624A2 (pt) | método e aparelho para executar aplicativo | |
CA2863882A1 (en) | Environment and method for cross-platform development of software applications | |
GB2508540A (en) | Malware scanning | |
WO2014035580A3 (en) | Systems and methods for hosted applications | |
TW200705236A (en) | Software protection | |
SG10201407589UA (en) | Systems and methods for security verification in electronic learning systems and other systems | |
BR112015013917A2 (pt) | método, unidade de computação, e sistema | |
WO2013019059A3 (en) | Sandboxing technology for webruntime system | |
BR112014005354A8 (pt) | Método implementado por um dispositivo de computação | |
EA201691185A1 (ru) | Интерфейс с защищенной промежуточной платформой для создания данных, совместимых с внешней системой, в цепочке поставок нефтегазовых ресурсов | |
BR112013029404A2 (pt) | varredura antecipada de malware | |
BR112014019186A8 (pt) | sistemas e métodos para processamento de arquivo | |
BR112017006368A2 (pt) | derivados de ácido borônico | |
WO2013035089A3 (en) | System and method for enhanced interaction between an iframe or a web page and an embedded iframe from a different domain | |
BR112017006349A2 (pt) | derivados de ácido borônico | |
BR112013006419A2 (pt) | aparelho, método de instalação | |
EP2590106A3 (en) | Security and safety manager implementation in a multi-core processor | |
WO2014194237A3 (en) | Systems and methods for remote analysis of software applications | |
CL2012000098A1 (es) | Un sistema de control metodo y aparato para aumentar el rendimiento de un ciclo kalina. | |
BR112016001232A8 (pt) | Sistema robusto de recuperação de erro de hardware / sofware |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B25L | Entry of change of name and/or headquarter and transfer of application, patent and certificate of addition of invention: publication cancelled |
Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH (DE) |
|
B25A | Requested transfer of rights approved |
Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH (DE) |
|
B25L | Entry of change of name and/or headquarter and transfer of application, patent and certificate of addition of invention: publication cancelled |
Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH (DE) |
|
B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
B16A | Patent or certificate of addition of invention granted [chapter 16.1 patent gazette] |
Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 01/02/2011, OBSERVADAS AS CONDICOES LEGAIS. |