CA2601260C - Agent de service persistant - Google Patents

Agent de service persistant Download PDF

Info

Publication number
CA2601260C
CA2601260C CA2601260A CA2601260A CA2601260C CA 2601260 C CA2601260 C CA 2601260C CA 2601260 A CA2601260 A CA 2601260A CA 2601260 A CA2601260 A CA 2601260A CA 2601260 C CA2601260 C CA 2601260C
Authority
CA
Canada
Prior art keywords
agent
driver agent
electronic device
client
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CA2601260A
Other languages
English (en)
Other versions
CA2601260A1 (fr
Inventor
Philip B. Gardner
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Absolute Software Corp
Original Assignee
Absolute Software Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Absolute Software Corp filed Critical Absolute Software Corp
Publication of CA2601260A1 publication Critical patent/CA2601260A1/fr
Application granted granted Critical
Publication of CA2601260C publication Critical patent/CA2601260C/fr
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/88Detecting or preventing theft or loss

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Stored Programmes (AREA)

Abstract

L'invention concerne un agent de service résistant aux effractions destiné à fournir de différents services (tels que la suppression de données, la protection par la paroi coupe-feu, le chiffrage de données, le suivi de position, la communication de messages et la mise à jour de logiciels) qui comprend des modules fonctionnels multiples, y compris un module de chargeur (CLM) qui effectue le chargement et prend le contrôle pendant POST, indépendamment du système d'exploitation, un module d'installeur adaptatif (AIM) et un agent pilote de communications (CDA). Une fois le contrôle passé au CLM, il charge l'AM, qui a son tour localise, valide, décompresse et adapte le CDA à l'environnement OS détecté. Le CDA existe sous deux formes, un mini-CDA qui détermine si un CDA complet ou courant est situé quelque part dans le dispositif et, dans le cas contraire, charge le CDA à fonctions complètes depuis le réseau; et un CDA à fonctions complètes qui est responsable de toutes les communications entre le dispositif et le serveur de monitorage. Les fonctions de service peuvent être contrôlés par un serveur distant.
CA2601260A 2005-03-18 2006-03-20 Agent de service persistant Active CA2601260C (fr)

Applications Claiming Priority (7)

Application Number Priority Date Filing Date Title
US66361505P 2005-03-18 2005-03-18
US66349605P 2005-03-18 2005-03-18
US60/663,615 2005-03-18
US60/663,496 2005-03-18
US75679606P 2006-01-07 2006-01-07
US60/756,796 2006-01-07
PCT/US2006/010381 WO2006102399A1 (fr) 2005-03-18 2006-03-20 Agent de service persistant

Publications (2)

Publication Number Publication Date
CA2601260A1 CA2601260A1 (fr) 2006-09-28
CA2601260C true CA2601260C (fr) 2016-05-03

Family

ID=36778184

Family Applications (1)

Application Number Title Priority Date Filing Date
CA2601260A Active CA2601260C (fr) 2005-03-18 2006-03-20 Agent de service persistant

Country Status (4)

Country Link
EP (1) EP1864238A1 (fr)
JP (2) JP2008533621A (fr)
CA (1) CA2601260C (fr)
WO (1) WO2006102399A1 (fr)

Families Citing this family (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8601606B2 (en) 2002-11-25 2013-12-03 Carolyn W. Hafeman Computer recovery or return
CN102089764B (zh) 2007-01-16 2015-04-29 绝对软件公司 具有与主代理配合的辅助代理的安全模块
US9576157B2 (en) 2008-04-02 2017-02-21 Yougetitback Limited Method for mitigating the unauthorized use of a device
US9838877B2 (en) 2008-04-02 2017-12-05 Yougetitback Limited Systems and methods for dynamically assessing and mitigating risk of an insured entity
US20090253406A1 (en) * 2008-04-02 2009-10-08 William Fitzgerald System for mitigating the unauthorized use of a device
US9881152B2 (en) * 2008-04-01 2018-01-30 Yougetitback Limited System for monitoring the unauthorized use of a device
US8932368B2 (en) 2008-04-01 2015-01-13 Yougetitback Limited Method for monitoring the unauthorized use of a device
US9886599B2 (en) 2008-04-02 2018-02-06 Yougetitback Limited Display of information through auxiliary user interface
US9031536B2 (en) 2008-04-02 2015-05-12 Yougetitback Limited Method for mitigating the unauthorized use of a device
US8248237B2 (en) 2008-04-02 2012-08-21 Yougetitback Limited System for mitigating the unauthorized use of a device
US8719909B2 (en) 2008-04-01 2014-05-06 Yougetitback Limited System for monitoring the unauthorized use of a device
US9916481B2 (en) 2008-04-02 2018-03-13 Yougetitback Limited Systems and methods for mitigating the unauthorized use of a device
TW200943121A (en) * 2008-04-15 2009-10-16 Giga Byte Tech Co Ltd A burglarproof method and system for portable computer devices
US8600405B2 (en) 2008-08-12 2013-12-03 Apogee Technology Consultants, Llc Location-based recovery device and risk management system for portable computing devices and data
US20100325149A1 (en) * 2009-06-22 2010-12-23 Craig Stephen Etchegoyen System and Method for Auditing Software Usage
WO2011021114A1 (fr) * 2009-08-20 2011-02-24 Nds Limited Caractéristiques de sécurité d’un livre électronique
US8949954B2 (en) 2011-12-08 2015-02-03 Uniloc Luxembourg, S.A. Customer notification program alerting customer-specified network address of unauthorized access attempts to customer account
AU2012100460B4 (en) 2012-01-04 2012-11-08 Uniloc Usa, Inc. Method and system implementing zone-restricted behavior of a computing device
AU2012100462B4 (en) 2012-02-06 2012-11-08 Uniloc Usa, Inc. Near field authentication through communication of enclosed content sound waves
US9152784B2 (en) * 2012-04-18 2015-10-06 Mcafee, Inc. Detection and prevention of installation of malicious mobile applications
AU2013100355B4 (en) 2013-02-28 2013-10-31 Netauthority, Inc Device-specific content delivery
WO2015040459A1 (fr) * 2013-03-15 2015-03-26 Yougetitback Limited Systèmes et procédés pour évaluer et atténuer dynamiquement le risque d'une entité assurée
CN111357002A (zh) 2017-11-01 2020-06-30 惠普发展公司,有限责任合伙企业 针对伴随设备的不符合事件通知

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5444850A (en) * 1993-08-04 1995-08-22 Trend Micro Devices Incorporated Method and apparatus for controlling network and workstation access prior to workstation boot
EP0791195A4 (fr) * 1993-08-04 1998-05-20 Trend Micro Devices Inc Procede et dispositif de gestion des acces au reseau et aux stations de travail avant l'initialisation de la station
US5748084A (en) * 1996-11-18 1998-05-05 Isikoff; Jeremy M. Device security system
US7047426B1 (en) * 2000-04-27 2006-05-16 Warranty Corporation Of America Portable computing device communication system and method
US7111292B2 (en) * 2001-09-10 2006-09-19 Texas Instruments Incorporated Apparatus and method for secure program upgrade
CA2561130C (fr) * 2004-03-26 2018-01-30 Absolute Software Corporation Agent de service persistant

Also Published As

Publication number Publication date
WO2006102399A1 (fr) 2006-09-28
EP1864238A1 (fr) 2007-12-12
JP2013008400A (ja) 2013-01-10
JP2008533621A (ja) 2008-08-21
JP5508502B2 (ja) 2014-06-04
CA2601260A1 (fr) 2006-09-28

Similar Documents

Publication Publication Date Title
US9465959B2 (en) Persistent agent supported by processor
CA2601260C (fr) Agent de service persistant
CA2561130C (fr) Agent de service persistant
AU2009279430B2 (en) Secure computing environment to address theft and unauthorized access
AU2010315412B2 (en) Approaches for ensuring data security
JP5959749B2 (ja) 悪意のあるソフトウェアによるアタックからオペレーティングシステムを保護する方法
US20110099547A1 (en) Approaches for installing software using bios
US20130291131A1 (en) Approaches for a location aware client
US20220318393A1 (en) Trusted Boot-Loader Authentication
WO2015131607A1 (fr) Procédé et dispositif pour créer un environnement de confiance, et procédé et dispositif pour une restauration après une défaillance de station de base
US8745730B1 (en) Secure computer provisioning and operation

Legal Events

Date Code Title Description
EEER Examination request