CN101238470A - 用于在计算设备中改善安全性的受保护的软件标识符 - Google Patents
用于在计算设备中改善安全性的受保护的软件标识符 Download PDFInfo
- Publication number
- CN101238470A CN101238470A CNA2006800287861A CN200680028786A CN101238470A CN 101238470 A CN101238470 A CN 101238470A CN A2006800287861 A CNA2006800287861 A CN A2006800287861A CN 200680028786 A CN200680028786 A CN 200680028786A CN 101238470 A CN101238470 A CN 101238470A
- Authority
- CN
- China
- Prior art keywords
- software
- equipment
- guids
- application software
- executive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (5)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0516471.0A GB0516471D0 (en) | 2005-08-10 | 2005-08-10 | Protected software identifiers for improving security in a computing device |
GB0516471.0 | 2005-08-10 | ||
PCT/GB2006/002964 WO2007017676A2 (en) | 2005-08-10 | 2006-08-08 | Protected software identifiers for improving security in a computing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101238470A true CN101238470A (zh) | 2008-08-06 |
CN101238470B CN101238470B (zh) | 2010-08-18 |
Family
ID=34984421
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006800287861A Expired - Fee Related CN101238470B (zh) | 2005-08-10 | 2006-08-08 | 操作计算设备的方法、制造软件的方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20100325426A1 (zh) |
EP (1) | EP1924943A2 (zh) |
JP (1) | JP2009505196A (zh) |
CN (1) | CN101238470B (zh) |
GB (2) | GB0516471D0 (zh) |
WO (1) | WO2007017676A2 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102024107A (zh) * | 2010-11-17 | 2011-04-20 | 中国联合网络通信集团有限公司 | 应用软件控制平台、开发者终端、分发系统及方法 |
CN102024127A (zh) * | 2010-11-17 | 2011-04-20 | 中国联合网络通信集团有限公司 | 应用软件控制平台、使用者终端、分发系统及方法 |
Families Citing this family (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8523666B2 (en) * | 2007-05-25 | 2013-09-03 | Microsoft Corporation | Programming framework for closed systems |
US8321538B2 (en) * | 2007-09-24 | 2012-11-27 | Hewlett-Packard Development Company, L.P. | Autonomous network device configuration method |
GB2456134A (en) * | 2007-12-31 | 2009-07-08 | Symbian Software Ltd | Typed application development |
KR101944010B1 (ko) * | 2012-02-24 | 2019-01-30 | 삼성전자 주식회사 | 애플리케이션의 변조 감지 방법 및 장치 |
US10866963B2 (en) * | 2017-12-28 | 2020-12-15 | Dropbox, Inc. | File system authentication |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5724425A (en) * | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
DE69534757T2 (de) * | 1994-09-15 | 2006-08-31 | International Business Machines Corp. | System und Verfahren zur sicheren Speicherung und Verteilung von Daten unter Verwendung digitaler Unterschriften |
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US5757919A (en) * | 1996-12-12 | 1998-05-26 | Intel Corporation | Cryptographically protected paging subsystem |
US6108420A (en) * | 1997-04-10 | 2000-08-22 | Channelware Inc. | Method and system for networked installation of uniquely customized, authenticable, and traceable software application |
WO2001025922A1 (en) * | 1999-10-01 | 2001-04-12 | Infraworks Corporation | Method and system for providing data security using file spoofing |
US7017189B1 (en) * | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
JP4744674B2 (ja) * | 2000-06-30 | 2011-08-10 | 富士通フロンテック株式会社 | プログラムインストール方法、プログラムインストールシステム、プログラム実行装置及び記憶媒体 |
EP1211587A1 (en) * | 2000-11-30 | 2002-06-05 | Pentap Technologies AG | Distributing programming language code |
JP2003202929A (ja) * | 2002-01-08 | 2003-07-18 | Ntt Docomo Inc | 配信方法および配信システム |
US20040153644A1 (en) * | 2003-02-05 | 2004-08-05 | Mccorkendale Bruce | Preventing execution of potentially malicious software |
JP2004280283A (ja) * | 2003-03-13 | 2004-10-07 | Hitachi Ltd | 分散ファイルシステム、分散ファイルシステムサーバ及び分散ファイルシステムへのアクセス方法 |
US7584509B2 (en) * | 2004-06-12 | 2009-09-01 | Microsoft Corporation | Inhibiting software tampering |
US7747998B2 (en) * | 2004-08-31 | 2010-06-29 | Microsoft Corporation | Elevated patching |
GB0516443D0 (en) * | 2005-08-10 | 2005-09-14 | Symbian Software Ltd | Improving the security of operation of a computing device through the use of vendor ids |
-
2005
- 2005-08-10 GB GBGB0516471.0A patent/GB0516471D0/en not_active Ceased
-
2006
- 2006-08-08 US US12/063,178 patent/US20100325426A1/en not_active Abandoned
- 2006-08-08 EP EP06779088A patent/EP1924943A2/en not_active Ceased
- 2006-08-08 JP JP2008525631A patent/JP2009505196A/ja active Pending
- 2006-08-08 CN CN2006800287861A patent/CN101238470B/zh not_active Expired - Fee Related
- 2006-08-08 WO PCT/GB2006/002964 patent/WO2007017676A2/en active Application Filing
- 2006-08-10 GB GB0615909A patent/GB2429081A/en not_active Withdrawn
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102024107A (zh) * | 2010-11-17 | 2011-04-20 | 中国联合网络通信集团有限公司 | 应用软件控制平台、开发者终端、分发系统及方法 |
CN102024127A (zh) * | 2010-11-17 | 2011-04-20 | 中国联合网络通信集团有限公司 | 应用软件控制平台、使用者终端、分发系统及方法 |
CN102024127B (zh) * | 2010-11-17 | 2012-09-19 | 中国联合网络通信集团有限公司 | 应用软件控制平台、使用者终端、分发系统及方法 |
Also Published As
Publication number | Publication date |
---|---|
WO2007017676A2 (en) | 2007-02-15 |
WO2007017676A3 (en) | 2007-05-24 |
GB0516471D0 (en) | 2005-09-14 |
US20100325426A1 (en) | 2010-12-23 |
GB0615909D0 (en) | 2006-09-20 |
JP2009505196A (ja) | 2009-02-05 |
EP1924943A2 (en) | 2008-05-28 |
CN101238470B (zh) | 2010-08-18 |
GB2429081A (en) | 2007-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109937419B (zh) | 安全功能强化的设备的初始化方法及设备的固件更新方法 | |
KR101176646B1 (ko) | 상태 검증을 사용하는 보호된 오퍼레이팅 시스템 부팅을 위한 시스템 및 방법 | |
US7546587B2 (en) | Run-time call stack verification | |
EP2831787B1 (en) | Method and system for preventing and detecting security threats | |
CN107567630B (zh) | 受信输入/输出设备的隔离 | |
JP6227772B2 (ja) | 動的ライブラリを保護する方法及び装置 | |
CN101238470B (zh) | 操作计算设备的方法、制造软件的方法 | |
Löhr et al. | Patterns for secure boot and secure storage in computer systems | |
US20060161790A1 (en) | Systems and methods for controlling access to data on a computer with a secure boot process | |
EP2126770B1 (en) | Trusted computing entities | |
Paverd et al. | Hardware security for device authentication in the smart grid | |
KR20180019515A (ko) | 이진 및 메모리 다이버시티를 통한 난독화 시스템 및 방법 | |
US9026803B2 (en) | Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms | |
KR101968382B1 (ko) | Tpm 기반의 사용자 장치 및 이를 이용한 부팅 방법 | |
EP2979214A1 (en) | Detecting exploits against software applications | |
US20160004859A1 (en) | Method and system for platform and user application security on a device | |
CN113127873A (zh) | 堡垒机的可信度量系统及电子设备 | |
WO2020007249A1 (zh) | 一种操作系统安全主动防御方法及操作系统 | |
Gopalan et al. | Policy driven remote attestation | |
Msgna et al. | Secure application execution in mobile devices | |
Murmann et al. | How Secure are Current Mobile Operating Systems? | |
Surendrababu | System Integrity–A Cautionary Tale | |
Li et al. | Research on the security of automotive domain controller systems based on trusted execution environment | |
Yu et al. | Research on Model for Verifying the Integrity of Software Based on API Hook | |
Covey et al. | An Advanced Trusted Platform for mobile phone devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: NOKIA NETWORKS OY Free format text: FORMER OWNER: SYMBIAN SOFTWARE LTD Effective date: 20100618 |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: LONDON, THE UNITED KINGDOM TO: ESPOO, FINLAND |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20100618 Address after: Espoo, Finland Applicant after: Nokia Oyj Address before: London, England Applicant before: Symbian Software Ltd. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100818 Termination date: 20120808 |