CL2022001864A1 - Método y aparato para control de autoridad, dispositivo informático y medio de almacenamiento - Google Patents
Método y aparato para control de autoridad, dispositivo informático y medio de almacenamientoInfo
- Publication number
- CL2022001864A1 CL2022001864A1 CL2022001864A CL2022001864A CL2022001864A1 CL 2022001864 A1 CL2022001864 A1 CL 2022001864A1 CL 2022001864 A CL2022001864 A CL 2022001864A CL 2022001864 A CL2022001864 A CL 2022001864A CL 2022001864 A1 CL2022001864 A1 CL 2022001864A1
- Authority
- CL
- Chile
- Prior art keywords
- container
- user
- configuration file
- script
- computing device
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/629—Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/468—Specific access rights for resources, e.g. using capability register
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Abstract
La presente divulgación se refiere a un método y un aparato para el control de autoridad, un dispositivo informático y un medio de almacenamiento, y se relaciona con el campo de las tecnologías de Internet. El método incluye: adquirir un archivo de configuración según un escenario empresarial cuando se inicializa un contenedor, en el que el archivo de configuración se gestiona fuera del contenedor; validar el archivo de configuración en el contenedor; recibir una instrucción de usuario; identificar un tipo de instrucción de usuario cuando la instrucción de usuario es una instrucción ejecutable; adquirir contenido de guión de un archivo de guión cuando el tipo de instrucción de usuario indica que la instrucción de usuario es el archivo de guión, en el que el contenido de guión incluye al menos una instrucción de comando; y realizar una comprobación de validez en al menos una declaración de comando basada en el archivo de configuración. Mediante el método anterior, durante el uso del contenedor, las autorizaciones de usuario en el contenedor se controlan de acuerdo con el escenario comercial, y las autorizaciones de usuario se controlan desde el punto de vista de una granularidad más pequeña, mejorando así la seguridad de uso del contenedor mientras se logra la adaptabilidad de las autoridades.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010022017.2A CN111259412B (zh) | 2020-01-09 | 2020-01-09 | 权限控制方法、装置、计算机设备及存储介质 |
Publications (1)
Publication Number | Publication Date |
---|---|
CL2022001864A1 true CL2022001864A1 (es) | 2022-11-25 |
Family
ID=70948631
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CL2022001864A CL2022001864A1 (es) | 2020-01-09 | 2022-07-08 | Método y aparato para control de autoridad, dispositivo informático y medio de almacenamiento |
Country Status (12)
Country | Link |
---|---|
US (1) | US11599654B2 (es) |
EP (1) | EP4088212A4 (es) |
JP (1) | JP7228751B2 (es) |
KR (1) | KR102502181B1 (es) |
CN (1) | CN111259412B (es) |
AU (1) | AU2021206497B2 (es) |
BR (1) | BR112022013674A2 (es) |
CA (1) | CA3167549A1 (es) |
CL (1) | CL2022001864A1 (es) |
MX (1) | MX2022008427A (es) |
WO (1) | WO2021141543A1 (es) |
ZA (1) | ZA202208348B (es) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112445576B (zh) * | 2020-11-30 | 2024-04-16 | 中国人寿保险股份有限公司 | 一种屏蔽业务差异的设备调用方法及相关设备 |
CN112989324A (zh) * | 2021-03-10 | 2021-06-18 | 中国民航信息网络股份有限公司 | 数据交互的方法、装置、电子设备及存储介质 |
CN113849819B (zh) * | 2021-09-24 | 2023-07-14 | 苏州浪潮智能科技有限公司 | 命令行指令的处理方法、装置、计算机设备和存储介质 |
CN114531443B (zh) * | 2022-02-18 | 2024-05-17 | 京东科技信息技术有限公司 | 基于集群的容器控制方法及系统 |
CN114756454A (zh) * | 2022-03-29 | 2022-07-15 | 润芯微科技(江苏)有限公司 | 一种嵌入式软件开发的代码管理、持续集成和交付的工作方法及系统 |
CN115883536A (zh) * | 2022-11-28 | 2023-03-31 | 中国联合网络通信集团有限公司 | 文件传递方法、装置、系统及存储介质 |
CN117573243B (zh) * | 2024-01-17 | 2024-05-10 | 杭州实在智能科技有限公司 | 用于信创体系的rpa文件操作和管理方法及系统 |
Family Cites Families (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU2001296394A1 (en) * | 2000-09-27 | 2002-04-15 | Conducive Technology Corp | Scripting business logic in a distributed object oriented environment |
JP4643204B2 (ja) * | 2004-08-25 | 2011-03-02 | 株式会社エヌ・ティ・ティ・ドコモ | サーバ装置 |
US7475235B1 (en) * | 2005-06-15 | 2009-01-06 | Unisys Corporation | Real-time management of a configuration of a computer system |
US7673028B2 (en) * | 2005-09-28 | 2010-03-02 | Sap Ag | Method and system for container-managed configuration and administration |
CN101640787B (zh) * | 2009-08-24 | 2011-10-26 | 中兴通讯股份有限公司 | 一种层次化控制访问组播组的方法和装置 |
KR20120055371A (ko) * | 2010-11-23 | 2012-05-31 | 한국전자통신연구원 | 디지털 공간정보의 보호 방법 및 장치 |
US9047442B2 (en) * | 2012-06-18 | 2015-06-02 | Microsoft Technology Licensing, Llc | Provisioning managed devices with states of arbitrary type |
US8898769B2 (en) * | 2012-11-16 | 2014-11-25 | At&T Intellectual Property I, Lp | Methods for provisioning universal integrated circuit cards |
US20150007142A1 (en) * | 2012-12-12 | 2015-01-01 | Google Inc. | Branch destination tables |
US20150363437A1 (en) * | 2014-06-17 | 2015-12-17 | Ims Health Incorporated | Data collection and cleaning at source |
US9641529B2 (en) * | 2014-11-10 | 2017-05-02 | Coastal Federal Credit Union | Methods, systems and computer program products for an application execution container for managing secondary application protocols |
US10404708B2 (en) * | 2015-06-03 | 2019-09-03 | Secure Circle, Llc | System for secure file access |
US9973538B2 (en) * | 2015-09-29 | 2018-05-15 | NeuVector, Inc. | Architecture of transparent network security for application containers |
US10223534B2 (en) * | 2015-10-15 | 2019-03-05 | Twistlock, Ltd. | Static detection of vulnerabilities in base images of software containers |
KR20170072552A (ko) * | 2015-12-17 | 2017-06-27 | 에스케이텔레콤 주식회사 | 클라우드 개발 환경을 위한 컨테이너 서비스 방법 및 그 장치 |
CN108090345B (zh) * | 2016-11-21 | 2021-08-17 | 腾讯科技(深圳)有限公司 | linux系统外部命令执行方法及装置 |
CN108268324A (zh) * | 2016-12-30 | 2018-07-10 | 航天信息股份有限公司 | 一种远程多业务管理方法和系统 |
US10691816B2 (en) * | 2017-02-24 | 2020-06-23 | International Business Machines Corporation | Applying host access control rules for data used in application containers |
KR101796205B1 (ko) * | 2017-04-17 | 2017-11-13 | 주식회사 넷앤드 | 보안 강화를 위해 입력된 명령어 학습 기반 이상 사용자를 탐지하는 서버 접근 통제 시스템 |
US10467424B2 (en) * | 2017-10-12 | 2019-11-05 | International Business Machines Corporation | File system content based security |
CN109343934A (zh) * | 2018-09-17 | 2019-02-15 | 北京北信源信息安全技术有限公司 | 一种基于容器的私服架构及其搭建和可视化方法 |
US10515005B1 (en) * | 2018-12-20 | 2019-12-24 | Atlassian Pty Ltd | Systems and methods for testing source code |
US11514340B2 (en) * | 2019-11-08 | 2022-11-29 | International Business Machines Corporation | Machine learning for technical tool selection |
-
2020
- 2020-01-09 CN CN202010022017.2A patent/CN111259412B/zh active Active
-
2021
- 2021-01-08 JP JP2022542366A patent/JP7228751B2/ja active Active
- 2021-01-08 MX MX2022008427A patent/MX2022008427A/es unknown
- 2021-01-08 BR BR112022013674A patent/BR112022013674A2/pt not_active Application Discontinuation
- 2021-01-08 KR KR1020227027024A patent/KR102502181B1/ko active IP Right Grant
- 2021-01-08 US US17/791,374 patent/US11599654B2/en active Active
- 2021-01-08 AU AU2021206497A patent/AU2021206497B2/en active Active
- 2021-01-08 EP EP21738434.6A patent/EP4088212A4/en active Pending
- 2021-01-08 CA CA3167549A patent/CA3167549A1/en active Pending
- 2021-01-08 WO PCT/SG2021/050016 patent/WO2021141543A1/en unknown
-
2022
- 2022-07-08 CL CL2022001864A patent/CL2022001864A1/es unknown
- 2022-07-26 ZA ZA2022/08348A patent/ZA202208348B/en unknown
Also Published As
Publication number | Publication date |
---|---|
KR102502181B1 (ko) | 2023-02-21 |
AU2021206497B2 (en) | 2023-05-04 |
MX2022008427A (es) | 2022-10-20 |
CA3167549A1 (en) | 2021-07-15 |
EP4088212A4 (en) | 2023-06-28 |
ZA202208348B (en) | 2022-10-26 |
CN111259412A (zh) | 2020-06-09 |
JP7228751B2 (ja) | 2023-02-24 |
JP2023500166A (ja) | 2023-01-04 |
BR112022013674A2 (pt) | 2022-09-13 |
AU2021206497A1 (en) | 2022-08-04 |
CN111259412B (zh) | 2023-12-05 |
KR20220116341A (ko) | 2022-08-22 |
US11599654B2 (en) | 2023-03-07 |
WO2021141543A1 (en) | 2021-07-15 |
EP4088212A1 (en) | 2022-11-16 |
US20230036357A1 (en) | 2023-02-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CL2022001864A1 (es) | Método y aparato para control de autoridad, dispositivo informático y medio de almacenamiento | |
BR112017022248A2 (pt) | ajuste de faixa dinâmica para faixa dinâmica alta e conversão de vídeo em código de gama de cores ampla | |
MY190784A (en) | Methods and devices for generating security questions and verifying identities | |
BR112017016219A2 (pt) | rastreamento de fluxo de dados através de monitoramento de memória | |
MX2018013818A (es) | Metodo y aparato para comprobacion ejecutable dinamica. | |
BR112016030050A2 (pt) | modulação de pulso assíncrono para codificação de sinal baseada em limite | |
MX2015017111A (es) | Generacion automatica de casos de prueba manuales y programados. | |
EP3525100A3 (en) | Framework for developing and deploying applications | |
BR112017026590A2 (pt) | técnicas para monitorar dados para mitigar problema transitivo em contextos orientados a objeto | |
BR112015006794A2 (pt) | método e aparelho para verificação de terminal | |
GB2555338A (en) | Method and apparatus for generating, capturing, storing, and loading debug information for failed tests scripts | |
Kuhn et al. | It doesn’t have to be like this: Cybersecurity vulnerability trends | |
BR112021017438A2 (pt) | Descriptografia incremental e verificação de integridade de uma imagem de sistema operacional seguro | |
EA202191199A1 (ru) | Способы, устройства, компьютерные программы и машиночитаемые носители | |
AR112389A1 (es) | Aparato para el control de malezas | |
Zimmeck et al. | Compliance traceability: Privacy policies as software development artifacts | |
CO2023004011A2 (es) | Método y aparato para funcionalidad de exposición de función de aplicación de medios | |
BR112018071100A2 (pt) | sistema para realização de uma verificação de validade de um dispositivo de usuário | |
BR112017022798A8 (pt) | Dispositivo, mídia legível por computador e método para modificar serviços com o uso de capacidades de coleta de dados avançadas | |
BR112019002328A2 (pt) | método e aparelho de codificação de vídeo | |
BR112013030468A2 (pt) | configuração de segurança | |
Nordio et al. | Javanni: A verifier for JavaScript | |
AR118174A1 (es) | Credencial de acceso verificable | |
Mandanici | Professional Skepticism: Innate Sixth Sense, or Learned Skill? | |
Lina | Management Control System Factors Influencing the Employee Outcomes: An Empirical Evidence from Higher Education in Indonesia |