BR112014005052B1 - Sistema e método para manipulação de conteúdo para aplicações - Google Patents
Sistema e método para manipulação de conteúdo para aplicações Download PDFInfo
- Publication number
- BR112014005052B1 BR112014005052B1 BR112014005052-0A BR112014005052A BR112014005052B1 BR 112014005052 B1 BR112014005052 B1 BR 112014005052B1 BR 112014005052 A BR112014005052 A BR 112014005052A BR 112014005052 B1 BR112014005052 B1 BR 112014005052B1
- Authority
- BR
- Brazil
- Prior art keywords
- content
- application
- compartment
- computing device
- code element
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/566—Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/145—Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1483—Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Virology (AREA)
- Bioethics (AREA)
- Information Transfer Between Computers (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Applications Claiming Priority (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| US13/227,201 | 2011-09-07 | ||
| US13/227,201 US10445528B2 (en) | 2011-09-07 | 2011-09-07 | Content handling for applications |
| PCT/US2012/053620 WO2013036470A1 (en) | 2011-09-07 | 2012-09-04 | Content handling for applications |
Publications (3)
| Publication Number | Publication Date |
|---|---|
| BR112014005052A2 BR112014005052A2 (pt) | 2017-03-21 |
| BR112014005052A8 BR112014005052A8 (pt) | 2018-02-06 |
| BR112014005052B1 true BR112014005052B1 (pt) | 2021-09-08 |
Family
ID=47754187
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| BR112014005052-0A BR112014005052B1 (pt) | 2011-09-07 | 2012-09-04 | Sistema e método para manipulação de conteúdo para aplicações |
Country Status (11)
| Country | Link |
|---|---|
| US (1) | US10445528B2 (https=) |
| EP (1) | EP2754082B1 (https=) |
| JP (1) | JP2014525638A (https=) |
| KR (1) | KR101977428B1 (https=) |
| CN (1) | CN103765431B (https=) |
| AU (1) | AU2012304788B2 (https=) |
| BR (1) | BR112014005052B1 (https=) |
| CA (1) | CA2846877C (https=) |
| MX (1) | MX351857B (https=) |
| RU (1) | RU2626658C2 (https=) |
| WO (1) | WO2013036470A1 (https=) |
Families Citing this family (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN103117992A (zh) * | 2012-09-10 | 2013-05-22 | 微软公司 | 应用的内容处理 |
| US10009379B2 (en) * | 2014-12-23 | 2018-06-26 | Peter W. J. Jones | Systems and methods for sterilizing email attachments and other communications delivered by email |
| US9785721B2 (en) * | 2014-12-30 | 2017-10-10 | Yahoo Holdings, Inc. | System and method for programmatically creating resource locators |
| DE112015006537T5 (de) * | 2015-08-20 | 2018-02-15 | Google LLC (n.d.Ges.d. Staates Delaware) | Gerätebasierte filterung von inhaltselementen, die mit mobilen anwendungen verbunden sind |
| US12019733B2 (en) * | 2022-03-11 | 2024-06-25 | Intel Corporation | Compartment isolation for load store forwarding |
Family Cites Families (39)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US6505300B2 (en) * | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content |
| US7051366B1 (en) * | 2000-06-21 | 2006-05-23 | Microsoft Corporation | Evidence-based security policy manager |
| US6981281B1 (en) | 2000-06-21 | 2005-12-27 | Microsoft Corporation | Filtering a permission set using permission requests associated with a code assembly |
| US7047562B2 (en) * | 2001-06-21 | 2006-05-16 | Lockheed Martin Corporation | Conditioning of the execution of an executable program upon satisfaction of criteria |
| NZ531131A (en) | 2001-08-13 | 2005-12-23 | Qualcomm Inc | Using permissions to allocate device resources to an application |
| US7216160B2 (en) * | 2001-10-31 | 2007-05-08 | Sun Microsystems, Inc. | Server-based application monitoring through collection of application component and environmental statistics |
| US7242773B2 (en) * | 2002-09-09 | 2007-07-10 | Sony Corporation | Multiple partial encryption using retuning |
| US7308648B1 (en) * | 2002-11-27 | 2007-12-11 | Microsoft Corporation | Method, system, and computer-readable medium for filtering harmful HTML in an electronic document |
| JP3823925B2 (ja) | 2003-02-05 | 2006-09-20 | ソニー株式会社 | 情報処理装置、ライセンス情報記録媒体、および情報処理方法、並びにコンピュータ・プログラム |
| US20040260754A1 (en) * | 2003-06-20 | 2004-12-23 | Erik Olson | Systems and methods for mitigating cross-site scripting |
| WO2005043360A1 (en) * | 2003-10-21 | 2005-05-12 | Green Border Technologies | Systems and methods for secure client applications |
| US7774620B1 (en) * | 2004-05-27 | 2010-08-10 | Microsoft Corporation | Executing applications at appropriate trust levels |
| US8037527B2 (en) * | 2004-11-08 | 2011-10-11 | Bt Web Solutions, Llc | Method and apparatus for look-ahead security scanning |
| US20060236100A1 (en) * | 2005-04-19 | 2006-10-19 | Guruprasad Baskaran | System and method for enhanced layer of security to protect a file system from malicious programs |
| US7624111B2 (en) | 2005-06-27 | 2009-11-24 | Microsoft Corporation | Active content trust model |
| US20070107057A1 (en) * | 2005-11-10 | 2007-05-10 | Docomo Communications Laboratories Usa, Inc. | Method and apparatus for detecting and preventing unsafe behavior of javascript programs |
| US8045958B2 (en) * | 2005-11-21 | 2011-10-25 | Research In Motion Limited | System and method for application program operation on a wireless device |
| US20070156871A1 (en) * | 2005-12-30 | 2007-07-05 | Michael Braun | Secure dynamic HTML pages |
| US9356935B2 (en) | 2006-09-12 | 2016-05-31 | Adobe Systems Incorporated | Selective access to portions of digital content |
| US7895296B1 (en) | 2006-12-29 | 2011-02-22 | Google, Inc. | Local storage for web based native applications |
| US8584232B2 (en) * | 2007-04-23 | 2013-11-12 | Sap Ag | Enhanced cross-site attack prevention |
| JP4395178B2 (ja) * | 2007-05-29 | 2010-01-06 | インターナショナル・ビジネス・マシーンズ・コーポレーション | コンテンツ処理システム、方法及びプログラム |
| US10019570B2 (en) | 2007-06-14 | 2018-07-10 | Microsoft Technology Licensing, Llc | Protection and communication abstractions for web browsers |
| US8181246B2 (en) * | 2007-06-20 | 2012-05-15 | Imperva, Inc. | System and method for preventing web frauds committed using client-scripting attacks |
| US20090064337A1 (en) * | 2007-09-05 | 2009-03-05 | Shih-Wei Chien | Method and apparatus for preventing web page attacks |
| US9906549B2 (en) * | 2007-09-06 | 2018-02-27 | Microsoft Technology Licensing, Llc | Proxy engine for custom handling of web content |
| US20090119769A1 (en) * | 2007-11-05 | 2009-05-07 | Microsoft Corporation | Cross-site scripting filter |
| US8650648B2 (en) * | 2008-03-26 | 2014-02-11 | Sophos Limited | Method and system for detecting restricted content associated with retrieved content |
| US8220050B2 (en) * | 2008-03-31 | 2012-07-10 | Sophos Plc | Method and system for detecting restricted content associated with retrieved content |
| US8806618B2 (en) * | 2008-03-31 | 2014-08-12 | Microsoft Corporation | Security by construction for distributed applications |
| US9058483B2 (en) | 2008-05-08 | 2015-06-16 | Google Inc. | Method for validating an untrusted native code module |
| US8387152B2 (en) | 2008-06-27 | 2013-02-26 | Microsoft Corporation | Attested content protection |
| US20100058467A1 (en) | 2008-08-28 | 2010-03-04 | International Business Machines Corporation | Efficiency of active content filtering using cached ruleset metadata |
| JP2010092376A (ja) | 2008-10-10 | 2010-04-22 | Softbank Mobile Corp | 情報処理装置、情報処理方法及び情報処理プログラム |
| CN101788982B (zh) * | 2009-01-22 | 2013-03-06 | 国际商业机器公司 | 在未修改浏览器上保护Web应用的跨域交互的方法和系统 |
| EP2222081A1 (en) | 2009-02-19 | 2010-08-25 | Thomson Licensing | Methods and devices for digital content protection |
| US8413139B2 (en) | 2009-03-11 | 2013-04-02 | Microsoft Corporation | Programming model for application and data access and synchronization within virtual environments |
| KR101651283B1 (ko) | 2009-11-13 | 2016-08-26 | 삼성전자 주식회사 | 컨텐츠제공시스템 및 그 컨텐츠제공방법, 디스플레이장치 및 그 제어방법 |
| US8719939B2 (en) | 2009-12-31 | 2014-05-06 | Mcafee, Inc. | Malware detection via reputation system |
-
2011
- 2011-09-07 US US13/227,201 patent/US10445528B2/en active Active
-
2012
- 2012-09-04 KR KR1020147006153A patent/KR101977428B1/ko active Active
- 2012-09-04 MX MX2014002785A patent/MX351857B/es active IP Right Grant
- 2012-09-04 JP JP2014529792A patent/JP2014525638A/ja active Pending
- 2012-09-04 BR BR112014005052-0A patent/BR112014005052B1/pt active IP Right Grant
- 2012-09-04 EP EP12829988.0A patent/EP2754082B1/en active Active
- 2012-09-04 WO PCT/US2012/053620 patent/WO2013036470A1/en not_active Ceased
- 2012-09-04 CA CA2846877A patent/CA2846877C/en active Active
- 2012-09-04 AU AU2012304788A patent/AU2012304788B2/en not_active Ceased
- 2012-09-04 RU RU2014108837A patent/RU2626658C2/ru active
- 2012-09-04 CN CN201280043111.XA patent/CN103765431B/zh active Active
Also Published As
| Publication number | Publication date |
|---|---|
| CN103765431B (zh) | 2016-11-16 |
| BR112014005052A8 (pt) | 2018-02-06 |
| US10445528B2 (en) | 2019-10-15 |
| AU2012304788A1 (en) | 2014-03-20 |
| MX351857B (es) | 2017-10-31 |
| BR112014005052A2 (pt) | 2017-03-21 |
| US20130061282A1 (en) | 2013-03-07 |
| KR101977428B1 (ko) | 2019-08-28 |
| KR20140068940A (ko) | 2014-06-09 |
| CA2846877C (en) | 2020-08-04 |
| CA2846877A1 (en) | 2013-03-14 |
| MX2014002785A (es) | 2014-06-05 |
| EP2754082A4 (en) | 2015-05-27 |
| EP2754082B1 (en) | 2020-09-23 |
| RU2014108837A (ru) | 2015-09-20 |
| CN103765431A (zh) | 2014-04-30 |
| RU2626658C2 (ru) | 2017-07-31 |
| JP2014525638A (ja) | 2014-09-29 |
| AU2012304788B2 (en) | 2016-12-08 |
| WO2013036470A1 (en) | 2013-03-14 |
| EP2754082A1 (en) | 2014-07-16 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US9390241B2 (en) | Method for executing an application in a restricted operating environment | |
| Georgiev et al. | Breaking and fixing origin-based access control in hybrid web/mobile application frameworks | |
| US10270781B2 (en) | Techniques for data security in a multi-tenant environment | |
| JP4769304B2 (ja) | オペレーティングシステム非依存型データ管理 | |
| CN105339923B (zh) | 混合行动应用程序的情境感知权限控制 | |
| Tuncay et al. | Draco: A system for uniform and fine-grained access control for web code on android | |
| US8819766B2 (en) | Domain-based isolation and access control on dynamic objects | |
| US8732830B2 (en) | Scripting engine externalized function execution control | |
| US8646044B2 (en) | Mandatory integrity control | |
| BR112014005052B1 (pt) | Sistema e método para manipulação de conteúdo para aplicações | |
| Yang et al. | Toward principled browser security | |
| Petracca et al. | On risk in access control enforcement | |
| JP2014525638A5 (https=) | ||
| US12244564B2 (en) | Security for computer systems | |
| KR100985073B1 (ko) | 네트워크 공유폴더 접근 제어 장치 및 방법 | |
| CN115344834A (zh) | 应用安全运行方法、装置、电子设备和计算机可读介质 | |
| US8640244B2 (en) | Declared origin policy | |
| JP2013125497A (ja) | 情報処理装置、情報処理方法およびプログラム | |
| US20250384122A1 (en) | Thread-based sandboxing for untrusted software execution | |
| JP2006216038A (ja) | セキュリティクリティカルデータコンテナ | |
| Schöni et al. | Automatically Retrofitting Cordova Applications for Stricter Content Security Policies | |
| CN120639421A (zh) | 接口请求的防护方法、装置、设备及存储介质 | |
| Xue et al. | A privacy protection model for transparent computing system | |
| CN114329420A (zh) | 一种可移动存储设备的访问控制方法、装置、系统和存储介质 | |
| Nature Type | Reference Description |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| B25A | Requested transfer of rights approved |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC (US) |
|
| B15K | Others concerning applications: alteration of classification |
Ipc: G06F 21/62 (2013.01), G06F 21/53 (2013.01), G06F 2 |
|
| B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
| B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
| B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
| B16A | Patent or certificate of addition of invention granted [chapter 16.1 patent gazette] |
Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 04/09/2012, OBSERVADAS AS CONDICOES LEGAIS. |