BR112015007854A2 - sistema e método de execução de uma instância de máquina virtual, sistema servidor de chaves para emitir chaves para uma instância de máquina virtual, imagem de máquina virtual capaz de ter instância formada como uma instância de máquina virtual, e, método de emissão de chaves para uma instância de máquina virtual - Google Patents
sistema e método de execução de uma instância de máquina virtual, sistema servidor de chaves para emitir chaves para uma instância de máquina virtual, imagem de máquina virtual capaz de ter instância formada como uma instância de máquina virtual, e, método de emissão de chaves para uma instância de máquina virtualInfo
- Publication number
- BR112015007854A2 BR112015007854A2 BR112015007854A BR112015007854A BR112015007854A2 BR 112015007854 A2 BR112015007854 A2 BR 112015007854A2 BR 112015007854 A BR112015007854 A BR 112015007854A BR 112015007854 A BR112015007854 A BR 112015007854A BR 112015007854 A2 BR112015007854 A2 BR 112015007854A2
- Authority
- BR
- Brazil
- Prior art keywords
- virtual machine
- instance
- machine instance
- key
- running
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/08—Addressing or allocation; Relocation in hierarchically structured memory systems, e.g. virtual memory systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0457—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply dynamic encryption, e.g. stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/061—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key exchange, e.g. in peer-to-peer networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/065—Network architectures or network communication protocols for network security for supporting key management in a packet data network for group communications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45587—Isolation or security of virtual machine instances
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2125—Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2143—Clearing memory, e.g. to prevent the data from being stolen
Abstract
resumo sistema e método de execução de uma instância de máquina virtual, sistema servidor de chaves para emitir chaves para uma instância de máquina virtual, imagem de máquina virtual capaz de ter instância formada como uma instância de máquina virtual, e, método de emissão de chaves para uma instância de máquina virtual é fornecido um sistema de execução de uma instância de máquina virtual. um ambiente de execução (11) é disposto para criar uma instância de máquina virtual (10). a instância de máquina virtual (10) compreende uma unidade de autorização de instância (1) para receber uma credencial de autorização de instância, em que a credencial de autorização de instância é associada exclusivamente à instância de máquina virtual (10). uma unidade de chave de dados (2) é disposta para gerar uma solicitação de chave de dados, com base na credencial de autorização de instância associada à instância de máquina virtual (10). uma unidade de decodificação (3) é disposta para decifrar um item de dados (7) com base na chave de dados. um sistema servidor de chaves (6) é disposto para emitir chaves para uma instância de máquina virtual (10). uma unidade de fornecimento de autorização de instância (22) é disposta para fornecer a credencial de autorização de instância para a instância de máquina virtual (10). 1/1
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US201261712887P | 2012-10-12 | 2012-10-12 | |
PCT/IB2013/058394 WO2014057369A1 (en) | 2012-10-12 | 2013-09-09 | Secure data handling by a virtual machine |
Publications (1)
Publication Number | Publication Date |
---|---|
BR112015007854A2 true BR112015007854A2 (pt) | 2017-07-04 |
Family
ID=49674350
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BR112015007854A BR112015007854A2 (pt) | 2012-10-12 | 2013-09-09 | sistema e método de execução de uma instância de máquina virtual, sistema servidor de chaves para emitir chaves para uma instância de máquina virtual, imagem de máquina virtual capaz de ter instância formada como uma instância de máquina virtual, e, método de emissão de chaves para uma instância de máquina virtual |
Country Status (7)
Country | Link |
---|---|
US (1) | US9635013B2 (pt) |
EP (1) | EP2907071B1 (pt) |
JP (1) | JP6357158B2 (pt) |
CN (1) | CN104756127B (pt) |
BR (1) | BR112015007854A2 (pt) |
RU (1) | RU2648941C2 (pt) |
WO (1) | WO2014057369A1 (pt) |
Families Citing this family (32)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10078754B1 (en) * | 2013-09-24 | 2018-09-18 | Amazon Technologies, Inc. | Volume cryptographic key management |
US9231923B1 (en) * | 2013-11-12 | 2016-01-05 | Amazon Technologies, Inc. | Secure data destruction in a distributed environment using key protection mechanisms |
US10095532B2 (en) * | 2014-04-28 | 2018-10-09 | Netkine, Inc. | Providing excess compute resources with virtualization |
US9607170B2 (en) * | 2014-05-02 | 2017-03-28 | Henry R. Williams | Compromise free cloud data encryption and security |
WO2015168913A1 (zh) | 2014-05-08 | 2015-11-12 | 华为技术有限公司 | 一种证书获取方法和设备 |
US9819650B2 (en) | 2014-07-22 | 2017-11-14 | Nanthealth, Inc. | Homomorphic encryption in a healthcare network environment, system and methods |
US9652276B2 (en) * | 2014-09-17 | 2017-05-16 | International Business Machines Corporation | Hypervisor and virtual machine protection |
US11455181B1 (en) * | 2014-09-19 | 2022-09-27 | Amazon Technologies, Inc. | Cross-network connector appliances |
US9489510B1 (en) | 2014-09-24 | 2016-11-08 | Amazon Technologies, Inc. | Detecting generation of virtual machine authentication |
US11563566B2 (en) * | 2014-10-27 | 2023-01-24 | Micro Focus Llc | Key splitting |
GB2531848B (en) | 2014-10-31 | 2017-12-13 | Hewlett Packard Entpr Dev Lp | Management of cryptographic keys |
CN106063218B (zh) | 2014-12-30 | 2018-06-05 | 华为技术有限公司 | 虚拟化系统中加解密的方法、装置和系统 |
GB201513039D0 (en) * | 2015-07-23 | 2015-09-09 | Eaton Ind France Sas | Shutting down of a virtual system |
US10019580B2 (en) * | 2015-11-19 | 2018-07-10 | Federal Reserve Bank Of Philadelphia | Integrity checking for computing devices |
KR102510868B1 (ko) * | 2016-07-07 | 2023-03-16 | 삼성에스디에스 주식회사 | 클라이언트 시스템 인증 방법, 클라이언트 장치 및 인증 서버 |
CN106302417A (zh) * | 2016-08-05 | 2017-01-04 | 浪潮(北京)电子信息产业有限公司 | 一种虚拟化信息传输方法及系统 |
US10303899B2 (en) * | 2016-08-11 | 2019-05-28 | Intel Corporation | Secure public cloud with protected guest-verified host control |
WO2018054473A1 (en) * | 2016-09-22 | 2018-03-29 | Telefonaktiebolaget Lm Ericsson (Publ) | Version control for trusted computing |
US10310885B2 (en) * | 2016-10-25 | 2019-06-04 | Microsoft Technology Licensing, Llc | Secure service hosted in a virtual security environment |
KR102511451B1 (ko) | 2016-11-09 | 2023-03-17 | 삼성전자주식회사 | 리치 실행 환경에서 보안 어플리케이션을 안전하게 실행하는 컴퓨팅 시스템 |
SG11201909704QA (en) * | 2017-05-18 | 2019-11-28 | Visa Int Service Ass | Reducing compromise of sensitive data in virtual machine |
EP3416086A1 (en) * | 2017-06-15 | 2018-12-19 | Gemalto Sa | Method for managing an instance of a class |
US11017127B2 (en) * | 2018-01-31 | 2021-05-25 | Seagate Technology Llc | Storage compute appliance with internal data encryption |
CN109508224B (zh) * | 2018-11-15 | 2022-07-05 | 中国电子科技网络信息安全有限公司 | 一种基于kvm虚拟机的用户数据隔离防护系统及方法 |
RU2747465C2 (ru) * | 2019-07-17 | 2021-05-05 | Акционерное общество "Лаборатория Касперского" | Система и способ устранения проблем функционирования сервисов в сети передачи данных, содержащей виртуальные машины |
RU2748963C2 (ru) * | 2019-07-17 | 2021-06-02 | Акционерное общество "Лаборатория Касперского" | Система и способ выявления проблем функционирования сервисов в сети передачи данных, содержащей виртуальные машины |
US11550944B2 (en) * | 2019-09-27 | 2023-01-10 | Amazon Technologies, Inc. | Code execution environment customization system for object storage service |
US11263220B2 (en) | 2019-09-27 | 2022-03-01 | Amazon Technologies, Inc. | On-demand execution of object transformation code in output path of object storage service |
KR102222891B1 (ko) * | 2019-12-06 | 2021-03-04 | 한국항공우주연구원 | 인공위성 소프트웨어를 검증하는 시뮬레이터, 인공위성 소프트웨어를 검증하는 방법 및 컴퓨터 프로그램 |
CA3177396A1 (en) * | 2020-06-29 | 2022-01-06 | Prabhu PALANISAMY | Temporary cloud provider credentials via secure discovery framework |
US11604673B2 (en) | 2020-07-30 | 2023-03-14 | Red Hat, Inc. | Memory encryption for virtual machines by hypervisor-controlled firmware |
WO2023187442A1 (en) * | 2022-03-29 | 2023-10-05 | Telefonaktiebolaget Lm Ericsson (Publ) | Cloud native key management using physical network function |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6510523B1 (en) * | 1999-02-22 | 2003-01-21 | Sun Microsystems Inc. | Method and system for providing limited access privileges with an untrusted terminal |
JP2001285282A (ja) * | 2000-03-30 | 2001-10-12 | Mitsubishi Electric Corp | 認証方式 |
US7624269B2 (en) * | 2004-07-09 | 2009-11-24 | Voltage Security, Inc. | Secure messaging system with derived keys |
US8549592B2 (en) * | 2005-07-12 | 2013-10-01 | International Business Machines Corporation | Establishing virtual endorsement credentials for dynamically generated endorsement keys in a trusted computing platform |
WO2007079499A2 (en) * | 2006-01-04 | 2007-07-12 | Nytor, Inc. | Trusted host platform |
US8479264B2 (en) * | 2006-09-29 | 2013-07-02 | Micron Technology, Inc. | Architecture for virtual security module |
US7822206B2 (en) * | 2006-10-26 | 2010-10-26 | International Business Machines Corporation | Systems and methods for management and auto-generation of encryption keys |
JP2010282242A (ja) * | 2007-08-20 | 2010-12-16 | Nec Corp | アクセス制御システム、アクセス制御方法およびアクセス制御用プログラム |
JP4342595B1 (ja) * | 2008-05-09 | 2009-10-14 | 株式会社東芝 | 情報処理装置、情報処理システム、および暗号化情報管理方法 |
US8752165B2 (en) * | 2008-05-29 | 2014-06-10 | Apple Inc. | Provisioning secrets in an unsecured environment |
US8336079B2 (en) * | 2008-12-31 | 2012-12-18 | Hytrust, Inc. | Intelligent security control system for virtualized ecosystems |
US8341427B2 (en) | 2009-02-16 | 2012-12-25 | Microsoft Corporation | Trusted cloud computing and services framework |
EP2278514B1 (en) * | 2009-07-16 | 2018-05-30 | Alcatel Lucent | System and method for providing secure virtual machines |
US8812871B2 (en) | 2010-05-27 | 2014-08-19 | Cisco Technology, Inc. | Method and apparatus for trusted execution in infrastructure as a service cloud environments |
EP2577539B1 (en) * | 2010-06-02 | 2018-12-19 | VMware, Inc. | Securing customer virtual machines in a multi-tenant cloud |
EP2583211B1 (en) * | 2010-06-15 | 2020-04-15 | Oracle International Corporation | Virtual computing infrastructure |
JP5589583B2 (ja) * | 2010-06-15 | 2014-09-17 | 富士ゼロックス株式会社 | 監視ポータル、監視システム、端末、そのプログラム |
US8694777B2 (en) * | 2010-08-13 | 2014-04-08 | International Business Machines Corporation | Securely identifying host systems |
US20120054486A1 (en) | 2010-08-31 | 2012-03-01 | MindTree Limited | Securing A Virtual Environment And Virtual Machines |
US8443365B2 (en) * | 2010-11-03 | 2013-05-14 | Hewlett-Packard Development Company, L.P. | Methods and systems to clone a virtual machine instance |
US8607067B1 (en) * | 2011-03-01 | 2013-12-10 | Amazon Technologies, Inc. | Techniques for attesting to information |
US8495356B2 (en) * | 2010-12-31 | 2013-07-23 | International Business Machines Corporation | System for securing virtual machine disks on a remote shared storage subsystem |
US9021264B2 (en) * | 2011-02-03 | 2015-04-28 | Cloudlink Technologies Inc. | Method and system for cloud based storage |
US9749291B2 (en) * | 2011-07-15 | 2017-08-29 | International Business Machines Corporation | Securing applications on public facing systems |
US8583920B1 (en) * | 2012-04-25 | 2013-11-12 | Citrix Systems, Inc. | Secure administration of virtual machines |
US8863255B2 (en) * | 2012-09-14 | 2014-10-14 | Netflix, Inc. | Security credential deployment in cloud environment |
-
2013
- 2013-09-09 WO PCT/IB2013/058394 patent/WO2014057369A1/en active Application Filing
- 2013-09-09 EP EP13796163.7A patent/EP2907071B1/en active Active
- 2013-09-09 US US14/432,320 patent/US9635013B2/en active Active
- 2013-09-09 RU RU2015117644A patent/RU2648941C2/ru active
- 2013-09-09 JP JP2015536244A patent/JP6357158B2/ja active Active
- 2013-09-09 BR BR112015007854A patent/BR112015007854A2/pt not_active Application Discontinuation
- 2013-09-09 CN CN201380052744.1A patent/CN104756127B/zh active Active
Also Published As
Publication number | Publication date |
---|---|
US9635013B2 (en) | 2017-04-25 |
WO2014057369A1 (en) | 2014-04-17 |
CN104756127A (zh) | 2015-07-01 |
EP2907071A1 (en) | 2015-08-19 |
RU2648941C2 (ru) | 2018-03-28 |
RU2015117644A (ru) | 2016-12-10 |
JP2015537428A (ja) | 2015-12-24 |
CN104756127B (zh) | 2018-03-27 |
US20150244710A1 (en) | 2015-08-27 |
JP6357158B2 (ja) | 2018-07-11 |
EP2907071B1 (en) | 2018-11-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BR112015007854A2 (pt) | sistema e método de execução de uma instância de máquina virtual, sistema servidor de chaves para emitir chaves para uma instância de máquina virtual, imagem de máquina virtual capaz de ter instância formada como uma instância de máquina virtual, e, método de emissão de chaves para uma instância de máquina virtual | |
BR112017018890A2 (pt) | controle de acesso para dados encriptados em identificadores legíveis por máquina | |
BR112014010472A2 (pt) | método para proporcionar um mecanismo de segurança para um código externo; aparelho; programa de computador incorporado em um meio legível por computador; e servidor de aplicação | |
ES2709275T3 (es) | Acceso multi-inquilino a aplicaciones | |
BR112012004052A2 (pt) | conjuntos de entropia para máquinas virtuais | |
BR112013019245A2 (pt) | método e aparelho para bloquear e desbloquear múltiplos ambientes de sistema operacional com uma única entrada de gesto | |
BR112014031579A8 (pt) | produto de programa de computador, sistema de computação e método | |
BR112015013770A2 (pt) | método e aparelho para marcação de itens fabricados usando-se características físicas | |
BR112018002521A2 (pt) | subsistema para autorização e ativação de recursos | |
BR112015028071A2 (pt) | sistemas e métodos para comunicação segura | |
BR112015020097A2 (pt) | Dispositivo de computação de cliente, método executado por um dispositivo de computação de cliente e meio de armazenamento legível por computador para autenticar um cliente de uma aplicação de comunicações unificada com bilhete da web baseado em uma chave simétrica | |
BR112015005740A2 (pt) | método para controlar o acesso a dados sendo processados por um recurso de computação remoto, meio legível por computador, e sistema para controlar o acesso a dados sendo processados por um recurso de computação remoto | |
BR112015019378A2 (pt) | serviço de segurança de dados | |
BR112017007146A2 (pt) | ações de limpeza de conteúdo móvel através dispositivos | |
BR112015018301A2 (pt) | sistema automatizado para a configuração de máquina de fontes de alimentação de solda e sistemas de soldagem | |
BR112012031281A2 (pt) | "sistema para a colaboração on-line e método para fornecer um site de colaboração on-line" | |
FR2980285B1 (fr) | Systemes et procedes de gestion de cles cryptographiques dans un microcontroleur securise | |
BR112014003390A2 (pt) | sistema de computação, método para lidar com pedidos de gerenciamento de sistema em um sistema de computação e meio lido por computador | |
WO2013130561A3 (en) | Method of operating a computing device, computing device and computer program | |
BR112017011270A2 (pt) | aparelho de processamento de informação, método de controle para aparelho de processamento de informação, sistema de processamento de informação, e programa de computador | |
GB2519900A (en) | Image instance mapping | |
BR112019007690A2 (pt) | gerenciamento de chave segura | |
BR112018006100A2 (pt) | método e aparelho para deduplicação de linha de cache por meio de correspondência de dados | |
BR112014012831A2 (pt) | método para gerir a associação de um grupo de dispositivos, e dispositivo de um grupo de dispositivos | |
BR112016014922A2 (pt) | Sistema de gerenciamento de sistema de processo, dispositivo de servidor, programa de gerenciamento e método de gerenciamento |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B06F | Objections, documents and/or translations needed after an examination request according [chapter 6.6 patent gazette] | ||
B06U | Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette] | ||
B11B | Dismissal acc. art. 36, par 1 of ipl - no reply within 90 days to fullfil the necessary requirements |