BR112012019384A8 - Método para executar uma aplicação e portador de dados portátil - Google Patents

Método para executar uma aplicação e portador de dados portátil

Info

Publication number
BR112012019384A8
BR112012019384A8 BR112012019384A BR112012019384A BR112012019384A8 BR 112012019384 A8 BR112012019384 A8 BR 112012019384A8 BR 112012019384 A BR112012019384 A BR 112012019384A BR 112012019384 A BR112012019384 A BR 112012019384A BR 112012019384 A8 BR112012019384 A8 BR 112012019384A8
Authority
BR
Brazil
Prior art keywords
application
running
data carrier
portable data
operating system
Prior art date
Application number
BR112012019384A
Other languages
English (en)
Other versions
BR112012019384B1 (pt
BR112012019384A2 (pt
Inventor
Hilmer Dorothee
Jauering Matthias
Holtmann Ludger
Treger Jörn
Fladee Ingeborg
Original Assignee
Giesecke Devrient Mobile Security Gmbh
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Giesecke Devrient Mobile Security Gmbh filed Critical Giesecke Devrient Mobile Security Gmbh
Publication of BR112012019384A2 publication Critical patent/BR112012019384A2/pt
Publication of BR112012019384A8 publication Critical patent/BR112012019384A8/pt
Publication of BR112012019384B1 publication Critical patent/BR112012019384B1/pt

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Debugging And Monitoring (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Stored Programmes (AREA)

Abstract

MÉTODO PARA EXECUTAR UMA APLICAÇÃO E PORTADOR DE DADOS PORTÁTIL. A presente invenção descreve um método para executar uma aplicação (A) que compreende código interpretável ou nativo executável e chama funções de um sistema operacional (BS), em que o sistema operacional (BS) transmite um resultado de uma respectiva chamada de função (f1) à aplicação (A). O método, de acordo com a invenção, é caracterizado pelo fato de que a aplicação (A) verifica o resultado de uma respectiva chamada de função para uma falsificação, de modo a detectar um ataque.
BR112012019384-8A 2010-02-02 2011-02-01 método para executar uma aplicação e portador de dados portátil BR112012019384B1 (pt)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
DE102010006572A DE102010006572A1 (de) 2010-02-02 2010-02-02 Verfahren zum Ausführen einer Anwendung
DE102010006572.2 2010-02-02
PCT/EP2011/000451 WO2011095320A1 (de) 2010-02-02 2011-02-01 Verfahren zum ausführen einer anwendung

Publications (3)

Publication Number Publication Date
BR112012019384A2 BR112012019384A2 (pt) 2018-05-02
BR112012019384A8 true BR112012019384A8 (pt) 2018-06-12
BR112012019384B1 BR112012019384B1 (pt) 2020-10-20

Family

ID=44072582

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112012019384-8A BR112012019384B1 (pt) 2010-02-02 2011-02-01 método para executar uma aplicação e portador de dados portátil

Country Status (6)

Country Link
US (1) US9171186B2 (pt)
EP (1) EP2531949B1 (pt)
CN (1) CN102822836B (pt)
BR (1) BR112012019384B1 (pt)
DE (1) DE102010006572A1 (pt)
WO (1) WO2011095320A1 (pt)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3114602B1 (en) * 2014-03-07 2022-01-12 Nokia Technologies Oy Method and apparatus for verifying processed data
CN106778272A (zh) * 2016-12-27 2017-05-31 成都三零瑞通移动通信有限公司 一种对调用函数进行动态安全检测的方法

Family Cites Families (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0632377B1 (en) * 1993-06-30 1998-12-30 Microsoft Corporation Method for testing a message-driven operating system
US5909545A (en) * 1996-01-19 1999-06-01 Tridia Corporation Method and system for on demand downloading of module to enable remote control of an application program over a network
EP1143688A1 (en) * 2000-03-02 2001-10-10 Client Electronics GmbH Mobile services on the basis of a smart card
KR100435783B1 (ko) * 2000-07-31 2004-06-12 엘지전자 주식회사 운영 체계에서 사용자 메모리 유효성 검증 방법
US7072876B1 (en) * 2000-09-19 2006-07-04 Cigital System and method for mining execution traces with finite automata
US6983380B2 (en) * 2001-02-06 2006-01-03 Networks Associates Technology, Inc. Automatically generating valid behavior specifications for intrusion detection
CN1197006C (zh) 2001-02-20 2005-04-13 英业达股份有限公司 一种生成具有自检测和自修复功能的应用程序的方法
US7099663B2 (en) 2001-05-31 2006-08-29 Qualcomm Inc. Safe application distribution and execution in a wireless environment
US7039953B2 (en) * 2001-08-30 2006-05-02 International Business Machines Corporation Hierarchical correlation of intrusion detection events
US7065677B1 (en) * 2003-04-10 2006-06-20 Microsoft Corporation Method for testing operating system components
US7739689B1 (en) * 2004-02-27 2010-06-15 Symantec Operating Corporation Internal monitoring of applications in a distributed management framework
US7900194B1 (en) * 2004-03-25 2011-03-01 Verizon Corporate Services Group Inc. Kernel-based intrusion detection using bloom filters
US20070100902A1 (en) * 2005-10-27 2007-05-03 Dinesh Sinha Two way incremental dynamic application data synchronization
WO2007098642A1 (en) * 2006-03-04 2007-09-07 Intel Corporation MECHANlSM FOR ACCESS CONTROL OF COMPUTING SYSTEM IN PRE-OS STAGE
WO2007122495A2 (en) * 2006-04-21 2007-11-01 Axalto Sa A framework for protecting resource-constrained network devices from denial-of-service attacks
DE102006037810A1 (de) * 2006-08-11 2008-02-14 Giesecke & Devrient Gmbh Sichere Programmcodeausführung
US8458790B2 (en) * 2006-10-12 2013-06-04 International Business Machines Corporation Defending smart cards against attacks by redundant processing
CN102027482A (zh) * 2008-05-15 2011-04-20 Nxp股份有限公司 用于安全数据读取的方法和数据处理系统
US7788433B2 (en) 2008-05-24 2010-08-31 Via Technologies, Inc. Microprocessor apparatus providing for secure interrupts and exceptions
CN101408917A (zh) * 2008-10-22 2009-04-15 厦门市美亚柏科资讯科技有限公司 应用程序行为合法性检测方法及系统
KR101719635B1 (ko) * 2009-10-08 2017-03-27 이르데토 비.브이. 동적 함수 호출 시스템들에서 공격적인 자기-수정을 위한 시스템 및 방법
US8412980B2 (en) * 2010-06-04 2013-04-02 International Business Machines Corporation Fault tolerant stability critical execution checking using redundant execution pipelines

Also Published As

Publication number Publication date
EP2531949A1 (de) 2012-12-12
DE102010006572A1 (de) 2011-08-04
CN102822836B (zh) 2016-02-10
EP2531949B1 (de) 2018-05-23
CN102822836A (zh) 2012-12-12
BR112012019384B1 (pt) 2020-10-20
WO2011095320A1 (de) 2011-08-11
US9171186B2 (en) 2015-10-27
US20120297479A1 (en) 2012-11-22
BR112012019384A2 (pt) 2018-05-02

Similar Documents

Publication Publication Date Title
BR112014023828A8 (pt) Método e sistema para dinamicamente instalar plugins em aplicativo distribuído em sistemas remotos
WO2011146917A3 (en) Apparatuses, systems and methods for determining installed software applications on a computing device
BR112017019042A2 (pt) sensores inteligentes com processamento de sinal local
BR112014017156A8 (pt) prevenção de execução dinâmica para impedir programação orientada para retorno
BR112016002536A2 (pt) “peça de vestuário com dispositivo de emergência e método de emergência associado”
BR112015008624A2 (pt) método e aparelho para executar aplicativo
CA2863882A1 (en) Environment and method for cross-platform development of software applications
GB2508540A (en) Malware scanning
WO2014035580A3 (en) Systems and methods for hosted applications
TW200705236A (en) Software protection
SG10201407589UA (en) Systems and methods for security verification in electronic learning systems and other systems
BR112015013917A2 (pt) método, unidade de computação, e sistema
WO2013019059A3 (en) Sandboxing technology for webruntime system
BR112014005354A8 (pt) Método implementado por um dispositivo de computação
EA201691185A1 (ru) Интерфейс с защищенной промежуточной платформой для создания данных, совместимых с внешней системой, в цепочке поставок нефтегазовых ресурсов
BR112013029404A2 (pt) varredura antecipada de malware
BR112014019186A8 (pt) sistemas e métodos para processamento de arquivo
BR112017006368A2 (pt) derivados de ácido borônico
WO2013035089A3 (en) System and method for enhanced interaction between an iframe or a web page and an embedded iframe from a different domain
BR112017006349A2 (pt) derivados de ácido borônico
BR112013006419A2 (pt) aparelho, método de instalação
EP2590106A3 (en) Security and safety manager implementation in a multi-core processor
WO2014194237A3 (en) Systems and methods for remote analysis of software applications
CL2012000098A1 (es) Un sistema de control metodo y aparato para aumentar el rendimiento de un ciclo kalina.
BR112016001232A8 (pt) Sistema robusto de recuperação de erro de hardware / sofware

Legal Events

Date Code Title Description
B25L Entry of change of name and/or headquarter and transfer of application, patent and certificate of addition of invention: publication cancelled

Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH (DE)

B25A Requested transfer of rights approved

Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH (DE)

B25L Entry of change of name and/or headquarter and transfer of application, patent and certificate of addition of invention: publication cancelled

Owner name: GIESECKE+DEVRIENT MOBILE SECURITY GMBH (DE)

B06F Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette]
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B09A Decision: intention to grant [chapter 9.1 patent gazette]
B16A Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]

Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 01/02/2011, OBSERVADAS AS CONDICOES LEGAIS.