BR112017004416B1 - Sistema e método implementado por computador para controlar acesso a um recurso de segurança - Google Patents

Sistema e método implementado por computador para controlar acesso a um recurso de segurança Download PDF

Info

Publication number
BR112017004416B1
BR112017004416B1 BR112017004416-1A BR112017004416A BR112017004416B1 BR 112017004416 B1 BR112017004416 B1 BR 112017004416B1 BR 112017004416 A BR112017004416 A BR 112017004416A BR 112017004416 B1 BR112017004416 B1 BR 112017004416B1
Authority
BR
Brazil
Prior art keywords
authorization
request
principal
platform module
context
Prior art date
Application number
BR112017004416-1A
Other languages
English (en)
Portuguese (pt)
Other versions
BR112017004416A2 (pt
Inventor
Stefan Thom
Ronald Aigner
Navin Pai
Original Assignee
Microsoft Technology Licensing, Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing, Llc filed Critical Microsoft Technology Licensing, Llc
Publication of BR112017004416A2 publication Critical patent/BR112017004416A2/pt
Publication of BR112017004416B1 publication Critical patent/BR112017004416B1/pt

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/86Secure or tamper-resistant housings
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)
BR112017004416-1A 2014-09-25 2015-09-23 Sistema e método implementado por computador para controlar acesso a um recurso de segurança BR112017004416B1 (pt)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US14/497,221 2014-09-25
US14/497,221 US9767304B2 (en) 2014-09-25 2014-09-25 Representation of operating system context in a trusted platform module
PCT/US2015/051683 WO2016049157A1 (en) 2014-09-25 2015-09-23 Representation of operating system context in a trusted platform module

Publications (2)

Publication Number Publication Date
BR112017004416A2 BR112017004416A2 (pt) 2017-12-05
BR112017004416B1 true BR112017004416B1 (pt) 2022-12-06

Family

ID=54325669

Family Applications (1)

Application Number Title Priority Date Filing Date
BR112017004416-1A BR112017004416B1 (pt) 2014-09-25 2015-09-23 Sistema e método implementado por computador para controlar acesso a um recurso de segurança

Country Status (11)

Country Link
US (1) US9767304B2 (enExample)
EP (1) EP3198511B1 (enExample)
JP (1) JP6584500B2 (enExample)
KR (1) KR102396070B1 (enExample)
CN (1) CN107077571B (enExample)
AU (1) AU2015320713B2 (enExample)
BR (1) BR112017004416B1 (enExample)
CA (1) CA2959735C (enExample)
MX (1) MX381685B (enExample)
RU (1) RU2702276C2 (enExample)
WO (1) WO2016049157A1 (enExample)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3038394A1 (en) * 2014-12-22 2016-06-29 Gemalto Sa Method of restoring a secure element to a factory state
US10586076B2 (en) * 2015-08-24 2020-03-10 Acronis International Gmbh System and method for controlling access to OS resources
US11243782B2 (en) 2016-12-14 2022-02-08 Microsoft Technology Licensing, Llc Kernel soft reset using non-volatile RAM
CN111557012B (zh) * 2018-12-03 2023-09-15 戴斯数字有限责任公司 跨传感器预测性推断
US12367320B2 (en) * 2021-09-22 2025-07-22 Ridgeline, Inc. Mechanism for real-time identity resolution in a distributed system

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6A (en) * 1836-08-10 Thomas Blanchard Machine for forming end pieces of plank blocks for ships
US6119230A (en) 1997-10-01 2000-09-12 Novell, Inc. Distributed dynamic security capabilities
JPH11175402A (ja) * 1997-12-10 1999-07-02 Fujitsu Ltd カード型記憶媒体及びカード型記憶媒体のアクセス制御方法並びにカード型記憶媒体用アクセス制御プログラムを記録したコンピュータ読み取り可能な記録媒体
US7275263B2 (en) * 2003-08-11 2007-09-25 Intel Corporation Method and system and authenticating a user of a computer system that has a trusted platform module (TPM)
US7716494B2 (en) 2004-07-15 2010-05-11 Sony Corporation Establishing a trusted platform in a digital processing system
US7836299B2 (en) 2005-03-15 2010-11-16 Microsoft Corporation Virtualization of software configuration registers of the TPM cryptographic processor
US8090919B2 (en) * 2007-12-31 2012-01-03 Intel Corporation System and method for high performance secure access to a trusted platform module on a hardware virtualization platform
US7930733B1 (en) 2006-04-10 2011-04-19 At&T Intellectual Property Ii, L.P. Method and system for execution monitor-based trusted computing
US20080040613A1 (en) 2006-08-14 2008-02-14 David Carroll Challener Apparatus, system, and method for secure password reset
US7841000B2 (en) * 2006-10-16 2010-11-23 Lenovo (Singapore) Pte. Ltd. Authentication password storage method and generation method, user authentication method, and computer
JP5116325B2 (ja) * 2007-03-15 2013-01-09 株式会社リコー 情報処理装置、ソフトウェア更新方法及び画像処理装置
US8032741B2 (en) * 2007-08-22 2011-10-04 Intel Corporation Method and apparatus for virtualization of a multi-context hardware trusted platform module (TPM)
US8544092B2 (en) * 2009-03-12 2013-09-24 International Business Machines Corporation Integrity verification using a peripheral device
CA2789243A1 (en) 2009-03-13 2010-09-16 Rutgers, The State University Of New Jersey Systems and methods for the detection of malware
US20100318782A1 (en) * 2009-06-12 2010-12-16 Microsoft Corporation Secure and private backup storage and processing for trusted computing and data services
US8560839B2 (en) * 2010-12-20 2013-10-15 Microsoft Corporation Tamper proof location services
US8561152B2 (en) * 2011-05-17 2013-10-15 Microsoft Corporation Target-based access check independent of access request

Also Published As

Publication number Publication date
KR20170059447A (ko) 2017-05-30
EP3198511B1 (en) 2020-07-15
KR102396070B1 (ko) 2022-05-09
CN107077571B (zh) 2020-03-27
MX381685B (es) 2025-03-04
JP6584500B2 (ja) 2019-10-02
BR112017004416A2 (pt) 2017-12-05
RU2702276C2 (ru) 2019-10-07
CN107077571A (zh) 2017-08-18
RU2017109885A (ru) 2018-09-24
RU2017109885A3 (enExample) 2019-04-01
AU2015320713B2 (en) 2020-11-05
WO2016049157A1 (en) 2016-03-31
AU2015320713A1 (en) 2017-03-16
JP2017530471A (ja) 2017-10-12
MX2017003931A (es) 2017-06-26
US20160092691A1 (en) 2016-03-31
EP3198511A1 (en) 2017-08-02
CA2959735A1 (en) 2016-03-31
US9767304B2 (en) 2017-09-19
CA2959735C (en) 2022-10-18

Similar Documents

Publication Publication Date Title
US11055385B2 (en) Multi-factor user authentication framework using asymmetric key
US10803175B2 (en) Device attestation through security hardened management agent
CN111324895B (zh) 用于客户端设备的信任服务
CN109075976B (zh) 取决于密钥认证的证书发布
CN101488170B (zh) 向受信任平台模块提供可更新密钥绑定的方法和装置
BR112020000220A2 (pt) geração de declaração de atestado de chave proporcionando anonimato de dispositivo
US12056248B1 (en) Enclave-based cryptography services in edge computing environments
CN105659211A (zh) 虚拟机管理器促进的选择性代码完整性实施
CN107077567B (zh) 标识计算设备上的安全边界
TWI587172B (zh) 用於建立安全工作空間的所有權之系統
BR112017004416B1 (pt) Sistema e método implementado por computador para controlar acesso a um recurso de segurança
BR112016026309B1 (pt) Método implementado por um dispositivo de computação para técnicas de token de autenticação bifurcada

Legal Events

Date Code Title Description
B06U Preliminary requirement: requests with searches performed by other patent offices: procedure suspended [chapter 6.21 patent gazette]
B09A Decision: intention to grant [chapter 9.1 patent gazette]
B16A Patent or certificate of addition of invention granted [chapter 16.1 patent gazette]

Free format text: PRAZO DE VALIDADE: 20 (VINTE) ANOS CONTADOS A PARTIR DE 23/09/2015, OBSERVADAS AS CONDICOES LEGAIS

B21F Lapse acc. art. 78, item iv - on non-payment of the annual fees in time

Free format text: REFERENTE A 10A ANUIDADE.

B24J Lapse because of non-payment of annual fees (definitively: art 78 iv lpi, resolution 113/2013 art. 12)

Free format text: EM VIRTUDE DA EXTINCAO PUBLICADA NA RPI 2846 DE 22-07-2025 E CONSIDERANDO AUSENCIA DE MANIFESTACAO DENTRO DOS PRAZOS LEGAIS, INFORMO QUE CABE SER MANTIDA A EXTINCAO DA PATENTE E SEUS CERTIFICADOS, CONFORME O DISPOSTO NO ARTIGO 12, DA RESOLUCAO 113/2013.