BRPI0720700A8 - Método implementado por computador para proteger os recursos de um sistema operacional - Google Patents
Método implementado por computador para proteger os recursos de um sistema operacionalInfo
- Publication number
- BRPI0720700A8 BRPI0720700A8 BRPI0720700A BRPI0720700A BRPI0720700A8 BR PI0720700 A8 BRPI0720700 A8 BR PI0720700A8 BR PI0720700 A BRPI0720700 A BR PI0720700A BR PI0720700 A BRPI0720700 A BR PI0720700A BR PI0720700 A8 BRPI0720700 A8 BR PI0720700A8
- Authority
- BR
- Brazil
- Prior art keywords
- operating system
- resources
- protection agent
- tools
- protect
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F15/00—Digital computers in general; Data processing equipment in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2105—Dual mode as a secondary aspect
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
PROTEÇÃO DOS RECURSOS DE UM SISTEMA OPERACIONAL O presente documento descreve ferramentas capazes de permitir a um agente de proteção determinar, a partir de uma memória inacessível a partir de um modo de privilégio de sistema operacional, se um ou mais recursos de um sistema operacional foi modificado. Em algumas instâncias, essas ferramentas podem permitir que o agente de proteção resida dentro de um monitor de máquina virtual. Em outras instâncias, as ferramentas podem permitir que o agente de proteção resida dentro de uma partição virtual distinta, provida pelo monitor de máquina virtual. Ao operar fora do modo de privilégio de sistema operacional, o agente de proteção pode se tornar menos vulnerável a ataques por entidades que operam dentro do modo de privilégio de sistema operacional.
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/627.314 | 2007-01-25 | ||
US11/627,314 US7765374B2 (en) | 2007-01-25 | 2007-01-25 | Protecting operating-system resources |
PCT/US2007/088219 WO2008091462A1 (en) | 2007-01-25 | 2007-12-19 | Protecting operating-system resources |
Publications (3)
Publication Number | Publication Date |
---|---|
BRPI0720700A2 BRPI0720700A2 (pt) | 2014-04-15 |
BRPI0720700A8 true BRPI0720700A8 (pt) | 2017-01-17 |
BRPI0720700B1 BRPI0720700B1 (pt) | 2019-05-21 |
Family
ID=39644773
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
BRPI0720700-0A BRPI0720700B1 (pt) | 2007-01-25 | 2007-12-19 | Método implementado por computador para proteger os recursos de um sistema operacional |
Country Status (10)
Country | Link |
---|---|
US (1) | US7765374B2 (pt) |
EP (2) | EP2521062B1 (pt) |
JP (1) | JP2010517164A (pt) |
KR (1) | KR101279683B1 (pt) |
CN (1) | CN101589365B (pt) |
BR (1) | BRPI0720700B1 (pt) |
CL (1) | CL2008000176A1 (pt) |
RU (1) | RU2462747C2 (pt) |
TW (1) | TWI470471B (pt) |
WO (1) | WO2008091462A1 (pt) |
Families Citing this family (55)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8380987B2 (en) | 2007-01-25 | 2013-02-19 | Microsoft Corporation | Protection agents and privilege modes |
DE102007030396B4 (de) * | 2007-06-29 | 2014-11-27 | Trumpf Werkzeugmaschinen Gmbh + Co. Kg | Vorrichtung zur Steuerung einer Maschine sowie Fernkommunikationssystem |
CN101334825B (zh) * | 2007-06-29 | 2011-08-24 | 联想(北京)有限公司 | 应用程序管理和运行系统及方法 |
US8171236B2 (en) | 2008-06-06 | 2012-05-01 | International Business Machines Corporation | Managing migration of a shared memory logical partition from a source system to a target system |
JP5166169B2 (ja) * | 2008-08-27 | 2013-03-21 | 株式会社日立製作所 | ハイパバイザを有する計算機システム |
US8954897B2 (en) * | 2008-08-28 | 2015-02-10 | Microsoft Corporation | Protecting a virtual guest machine from attacks by an infected host |
US7975034B1 (en) * | 2008-10-31 | 2011-07-05 | Symantec Corporation | Systems and methods to secure data and hardware through virtualization |
US8776028B1 (en) * | 2009-04-04 | 2014-07-08 | Parallels IP Holdings GmbH | Virtual execution environment for software delivery and feedback |
US8621460B2 (en) * | 2009-11-02 | 2013-12-31 | International Business Machines Corporation | Endpoint-hosted hypervisor management |
US8819826B2 (en) | 2010-01-27 | 2014-08-26 | Mcafee, Inc. | Method and system for detection of malware that connect to network destinations through cloud scanning and web reputation |
US8955131B2 (en) | 2010-01-27 | 2015-02-10 | Mcafee Inc. | Method and system for proactive detection of malicious shared libraries via a remote reputation system |
US9104872B2 (en) * | 2010-01-28 | 2015-08-11 | Bank Of America Corporation | Memory whitelisting |
US9536089B2 (en) * | 2010-09-02 | 2017-01-03 | Mcafee, Inc. | Atomic detection and repair of kernel memory |
US8082585B1 (en) * | 2010-09-13 | 2011-12-20 | Raymond R. Givonetti | Protecting computers from malware using a hardware solution that is not alterable by any software |
US9032013B2 (en) * | 2010-10-29 | 2015-05-12 | Microsoft Technology Licensing, Llc | Unified policy over heterogenous device types |
US20120144489A1 (en) * | 2010-12-07 | 2012-06-07 | Microsoft Corporation | Antimalware Protection of Virtual Machines |
US8516509B2 (en) * | 2011-02-08 | 2013-08-20 | BlueStripe Software, Inc. | Methods and computer program products for monitoring system calls using safely removable system function table chaining |
US9262246B2 (en) | 2011-03-31 | 2016-02-16 | Mcafee, Inc. | System and method for securing memory and storage of an electronic device with a below-operating system security agent |
US9038176B2 (en) | 2011-03-31 | 2015-05-19 | Mcafee, Inc. | System and method for below-operating system trapping and securing loading of code into memory |
WO2012135192A2 (en) * | 2011-03-28 | 2012-10-04 | Mcafee, Inc. | System and method for virtual machine monitor based anti-malware security |
US9317690B2 (en) | 2011-03-28 | 2016-04-19 | Mcafee, Inc. | System and method for firmware based anti-malware security |
US8635615B2 (en) | 2011-05-14 | 2014-01-21 | Industrial Technology Research Institute | Apparatus and method for managing hypercalls in a hypervisor and the hypervisor thereof |
US9280377B2 (en) * | 2013-03-29 | 2016-03-08 | Citrix Systems, Inc. | Application with multiple operation modes |
US9529996B2 (en) | 2011-10-11 | 2016-12-27 | Citrix Systems, Inc. | Controlling mobile device access to enterprise resources |
WO2013105916A1 (en) * | 2011-12-01 | 2013-07-18 | Intel Corporation | Secure message filtering to vehicle electronic control units with secure provisioning of message filtering rules |
CN102521016A (zh) * | 2011-12-08 | 2012-06-27 | 中兴通讯股份有限公司 | 一种运行多个虚拟机的方法及系统 |
US9043903B2 (en) * | 2012-06-08 | 2015-05-26 | Crowdstrike, Inc. | Kernel-level security agent |
CN102779250B (zh) * | 2012-06-29 | 2016-04-13 | 腾讯科技(深圳)有限公司 | 文件可控执行的检测方法及虚拟机 |
US9292881B2 (en) | 2012-06-29 | 2016-03-22 | Crowdstrike, Inc. | Social sharing of security information in a group |
US9971585B2 (en) | 2012-10-16 | 2018-05-15 | Citrix Systems, Inc. | Wrapping unmanaged applications on a mobile device |
EP2909715B1 (en) | 2012-10-16 | 2022-12-14 | Citrix Systems, Inc. | Application wrapping for application management framework |
US9201642B2 (en) * | 2013-03-15 | 2015-12-01 | International Business Machines Corporation | Extending platform trust during program updates |
US10284627B2 (en) | 2013-03-29 | 2019-05-07 | Citrix Systems, Inc. | Data management for an application with multiple operation modes |
US9197654B2 (en) * | 2013-06-28 | 2015-11-24 | Mcafee, Inc. | Rootkit detection by using HW resources to detect inconsistencies in network traffic |
GB2515736A (en) | 2013-07-01 | 2015-01-07 | Ibm | Controlling access to one or more datasets of an operating system in use |
FR3012643B1 (fr) * | 2013-10-28 | 2017-03-17 | Oberthur Technologies | Systeme de detection d'intrusion dans un dispositif comprenant un premier systeme d'exploitation et un deuxieme systeme d'exploitation |
US9772953B2 (en) | 2014-02-03 | 2017-09-26 | Samsung Electronics Co., Ltd. | Methods and apparatus for protecting operating system data |
US10289405B2 (en) | 2014-03-20 | 2019-05-14 | Crowdstrike, Inc. | Integrity assurance and rebootless updating during runtime |
US10318765B2 (en) * | 2014-05-02 | 2019-06-11 | Avago Technologies International Sales Pte. Limited | Protecting critical data structures in an embedded hypervisor system |
US9760712B2 (en) * | 2014-05-23 | 2017-09-12 | Vmware, Inc. | Application whitelisting using user identification |
US10951655B2 (en) * | 2014-09-26 | 2021-03-16 | Oracle International Corporation | System and method for dynamic reconfiguration in a multitenant application server environment |
RU2585978C2 (ru) * | 2014-09-30 | 2016-06-10 | Закрытое акционерное общество "Лаборатория Касперского" | Способ вызова системных функций в условиях использования средств защиты ядра операционной системы |
US10339316B2 (en) | 2015-07-28 | 2019-07-02 | Crowdstrike, Inc. | Integrity assurance through early loading in the boot phase |
CN108351938B (zh) * | 2015-10-29 | 2022-02-08 | 惠普发展公司,有限责任合伙企业 | 校验针对程序代码的一部分所计算的安全值的装置、系统和方法 |
RU2624554C1 (ru) * | 2016-05-17 | 2017-07-04 | Закрытое акционерное общество "Перспективный мониторинг" | Способ обнаружения скрытого программного обеспечения в вычислительной системе, работающей под управлением POSIX-совместимой операционной системы |
JP6319369B2 (ja) | 2016-06-23 | 2018-05-09 | 日本電気株式会社 | 処理制御装置、処理制御方法、及び、処理制御プログラム |
US20180004931A1 (en) * | 2016-07-02 | 2018-01-04 | Intel Corporation | Process management |
US10387228B2 (en) | 2017-02-21 | 2019-08-20 | Crowdstrike, Inc. | Symmetric bridge component for communications between kernel mode and user mode |
KR102022168B1 (ko) * | 2017-12-15 | 2019-09-18 | 이방훈 | 하드웨어 태스크 스위칭을 이용한 은닉 태스크의 감지 방법 및 장치 |
US10740459B2 (en) | 2017-12-28 | 2020-08-11 | Crowdstrike, Inc. | Kernel- and user-level cooperative security processing |
JP7151530B2 (ja) * | 2019-02-13 | 2022-10-12 | 日本電信電話株式会社 | サーバ基盤および物理cpu割当プログラム |
USD905765S1 (en) | 2019-03-07 | 2020-12-22 | Caterpillar Inc. | Adapter for a ground engaging machine implement |
RU2728504C1 (ru) * | 2019-03-29 | 2020-07-29 | Акционерное общество "Лаборатория Касперского" | Система и способ поэтапного повышения информационной безопасности элементов технологической системы |
US20220156879A1 (en) * | 2020-11-18 | 2022-05-19 | Intel Corporation | Multi-tile graphics processing unit |
US20230092808A1 (en) * | 2021-09-17 | 2023-03-23 | Mediatek Inc. | Model protection system |
Family Cites Families (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4091447A (en) | 1976-07-19 | 1978-05-23 | Union Carbide Corporation | Interrupt control system for a microcomputer |
DE2744111A1 (de) | 1977-09-30 | 1979-04-05 | Siemens Ag | Schaltungsanordnung zur eingabe von unterbrechungsbefehlen und ausgabe von unterbrechungsbestaetigungen fuer computer-systeme |
US5469556A (en) * | 1989-12-12 | 1995-11-21 | Harris Corporation | Resource access security system for controlling access to resources of a data processing system |
US5684948A (en) * | 1995-09-01 | 1997-11-04 | National Semiconductor Corporation | Memory management circuit which provides simulated privilege levels |
US7210040B2 (en) * | 2000-07-14 | 2007-04-24 | Computer Associates Think, Inc. | Detection of suspicious privileged access to restricted computer resources |
US6938164B1 (en) * | 2000-11-22 | 2005-08-30 | Microsoft Corporation | Method and system for allowing code to be securely initialized in a computer |
US7035963B2 (en) * | 2000-12-27 | 2006-04-25 | Intel Corporation | Method for resolving address space conflicts between a virtual machine monitor and a guest operating system |
US7631160B2 (en) * | 2001-04-04 | 2009-12-08 | Advanced Micro Devices, Inc. | Method and apparatus for securing portions of memory |
KR100389206B1 (ko) * | 2001-04-25 | 2003-06-27 | 주식회사 성진씨앤씨 | 컴퓨터 운영 시스템 보호 방법 및 장치 |
GB2376761A (en) | 2001-06-19 | 2002-12-24 | Hewlett Packard Co | An arrangement in which a process is run on a host operating system but may be switched to a guest system if it poses a security risk |
US7272832B2 (en) * | 2001-10-25 | 2007-09-18 | Hewlett-Packard Development Company, L.P. | Method of protecting user process data in a secure platform inaccessible to the operating system and other tasks on top of the secure platform |
JP4256107B2 (ja) * | 2002-03-07 | 2009-04-22 | 富士通株式会社 | データサーバへの不正侵入対処方法、及びプログラム |
US7793286B2 (en) | 2002-12-19 | 2010-09-07 | Intel Corporation | Methods and systems to manage machine state in virtual machine operations |
US20050114687A1 (en) * | 2003-11-21 | 2005-05-26 | Zimmer Vincent J. | Methods and apparatus to provide protection for firmware resources |
US20050132122A1 (en) * | 2003-12-16 | 2005-06-16 | Rozas Carlos V. | Method, apparatus and system for monitoring system integrity in a trusted computing environment |
US7222062B2 (en) | 2003-12-23 | 2007-05-22 | Intel Corporation | Method and system to support a trusted set of operational environments using emulated trusted hardware |
US7802250B2 (en) | 2004-06-28 | 2010-09-21 | Intel Corporation | Support for transitioning to a virtual machine monitor based upon the privilege level of guest software |
US7694121B2 (en) * | 2004-06-30 | 2010-04-06 | Microsoft Corporation | System and method for protected operating system boot using state validation |
US8955104B2 (en) * | 2004-07-07 | 2015-02-10 | University Of Maryland College Park | Method and system for monitoring system memory integrity |
US7757231B2 (en) | 2004-12-10 | 2010-07-13 | Intel Corporation | System and method to deprivilege components of a virtual machine monitor |
US7409719B2 (en) * | 2004-12-21 | 2008-08-05 | Microsoft Corporation | Computer security management, such as in a virtual machine or hardened operating system |
JP4400448B2 (ja) * | 2004-12-22 | 2010-01-20 | コニカミノルタセンシング株式会社 | 分光輝度計の校正方法、及び校正システムの動作プログラム |
US8533777B2 (en) * | 2004-12-29 | 2013-09-10 | Intel Corporation | Mechanism to determine trust of out-of-band management agents |
US8856473B2 (en) * | 2005-07-01 | 2014-10-07 | Red Hat, Inc. | Computer system protection based on virtualization |
AU2006100099A4 (en) * | 2006-02-08 | 2006-03-16 | Pc Tools Technology Pty Limited | Automated Threat Analysis System |
US8380987B2 (en) | 2007-01-25 | 2013-02-19 | Microsoft Corporation | Protection agents and privilege modes |
-
2007
- 2007-01-25 US US11/627,314 patent/US7765374B2/en active Active
- 2007-12-19 WO PCT/US2007/088219 patent/WO2008091462A1/en active Application Filing
- 2007-12-19 JP JP2009547246A patent/JP2010517164A/ja active Pending
- 2007-12-19 EP EP12005459.8A patent/EP2521062B1/en active Active
- 2007-12-19 EP EP07869567.3A patent/EP2106583B1/en active Active
- 2007-12-19 CN CN2007800505108A patent/CN101589365B/zh active Active
- 2007-12-19 RU RU2009128684/08A patent/RU2462747C2/ru active
- 2007-12-19 KR KR1020097015094A patent/KR101279683B1/ko active IP Right Grant
- 2007-12-19 BR BRPI0720700-0A patent/BRPI0720700B1/pt active IP Right Grant
- 2007-12-24 TW TW96149789A patent/TWI470471B/zh not_active IP Right Cessation
-
2008
- 2008-01-22 CL CL200800176A patent/CL2008000176A1/es unknown
Also Published As
Publication number | Publication date |
---|---|
TWI470471B (zh) | 2015-01-21 |
BRPI0720700A2 (pt) | 2014-04-15 |
WO2008091462A1 (en) | 2008-07-31 |
US20080183996A1 (en) | 2008-07-31 |
EP2521062A1 (en) | 2012-11-07 |
RU2009128684A (ru) | 2011-01-27 |
KR101279683B1 (ko) | 2013-06-27 |
EP2106583A1 (en) | 2009-10-07 |
EP2106583A4 (en) | 2012-01-25 |
RU2462747C2 (ru) | 2012-09-27 |
CN101589365B (zh) | 2012-07-04 |
US7765374B2 (en) | 2010-07-27 |
CL2008000176A1 (es) | 2008-08-01 |
KR20090107035A (ko) | 2009-10-12 |
BRPI0720700B1 (pt) | 2019-05-21 |
CN101589365A (zh) | 2009-11-25 |
JP2010517164A (ja) | 2010-05-20 |
EP2106583B1 (en) | 2015-11-11 |
TW200842646A (en) | 2008-11-01 |
EP2521062B1 (en) | 2020-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
BRPI0720700A8 (pt) | Método implementado por computador para proteger os recursos de um sistema operacional | |
BRPI0720921A8 (pt) | Agentes de proteção e modos de privilégio | |
BR112018002515A2 (pt) | proteção de conteúdo aplicado em hardware para unidades de processamento gráfico | |
BR112016024698A2 (pt) | filamentos e estruturas fibrosas que empregam os mesmos | |
WO2012135192A3 (en) | System and method for virtual machine monitor based anti-malware security | |
BRPI0501171A (pt) | Método e sistema para reforçar a polìtica de segurança via um mecanismo virtual de segurança | |
BR112015017405A2 (pt) | composições que incluem agentes hidrofobizantes e estabilizantes e métodos para preparação e utilização das mesmas | |
BR112014032147A2 (pt) | processo para a preparação de um derivado de polissacarídeo, e, derivado de polissacarídeo | |
BR112016002233A2 (pt) | composições de adoçante | |
BR112012016286A2 (pt) | cartucho para processamento de amostra e método de processar e/ou analisar uma amostra sob força centrífuga | |
BR112013030585A2 (pt) | monitoramento de saída de área demarcada | |
BR112015008411A2 (pt) | compartilhamento rastreável de conteúdo de vídeo on-line | |
BR112015002316A2 (pt) | métodos, sistemas, e meios legíveis por computador para monitoramento ativo, proteção de memória e verificação de integridade de dispositivos alvos | |
BR112013019537A2 (pt) | sessão de navegação privada recuperável | |
WO2010132860A3 (en) | Systems and methods for computer security employing virtual computer systems | |
BR112014010634A2 (pt) | método implementado por computador, dispositivo de computação e meio de armazenamento legível por computador | |
WO2009025193A1 (ja) | 情報共有システム、情報共有方法、および情報共有プログラム | |
EP2590106A3 (en) | Security and safety manager implementation in a multi-core processor | |
BR112015012359A2 (pt) | dispositivo de articulação para um veículo a motor | |
CL2008000642A1 (es) | Metodo para integrar contenidos de interfaz de usuario, desde diferentes espacios de procesos, particionados en una sola interfaz de usuario. | |
BR112014031586A2 (pt) | gerenciamento com base em rede de conjuntos de dados protegidos | |
BR112013032612A2 (pt) | método de forjamento para produzir um êmbolo ou haste de êmbolo | |
WO2008152023A3 (de) | Ressourcenzugriff unter vermittlung durch ein sicherheitsmodul | |
BR112016012366A8 (pt) | composição não colorante, processo para remodelar as fibras queratínicas e usos da composição | |
Abdul-Hussin | Siphons and traps structural analysis techniques behaviour of a Petri nets |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
B25A | Requested transfer of rights approved |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC (US) |
|
B07A | Application suspended after technical examination (opinion) [chapter 7.1 patent gazette] | ||
B09A | Decision: intention to grant [chapter 9.1 patent gazette] | ||
B16A | Patent or certificate of addition of invention granted [chapter 16.1 patent gazette] |
Free format text: PRAZO DE VALIDADE: 10 (DEZ) ANOS CONTADOS A PARTIR DE 21/05/2019, OBSERVADAS AS CONDICOES LEGAIS. (CO) 10 (DEZ) ANOS CONTADOS A PARTIR DE 21/05/2019, OBSERVADAS AS CONDICOES LEGAIS |