CN101238470B - 操作计算设备的方法、制造软件的方法 - Google Patents
操作计算设备的方法、制造软件的方法 Download PDFInfo
- Publication number
- CN101238470B CN101238470B CN2006800287861A CN200680028786A CN101238470B CN 101238470 B CN101238470 B CN 101238470B CN 2006800287861 A CN2006800287861 A CN 2006800287861A CN 200680028786 A CN200680028786 A CN 200680028786A CN 101238470 B CN101238470 B CN 101238470B
- Authority
- CN
- China
- Prior art keywords
- software
- equipment
- application software
- unique identification
- identification symbol
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
Description
Claims (2)
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0516471.0A GB0516471D0 (en) | 2005-08-10 | 2005-08-10 | Protected software identifiers for improving security in a computing device |
GB0516471.0 | 2005-08-10 | ||
PCT/GB2006/002964 WO2007017676A2 (en) | 2005-08-10 | 2006-08-08 | Protected software identifiers for improving security in a computing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN101238470A CN101238470A (zh) | 2008-08-06 |
CN101238470B true CN101238470B (zh) | 2010-08-18 |
Family
ID=34984421
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN2006800287861A Expired - Fee Related CN101238470B (zh) | 2005-08-10 | 2006-08-08 | 操作计算设备的方法、制造软件的方法 |
Country Status (6)
Country | Link |
---|---|
US (1) | US20100325426A1 (zh) |
EP (1) | EP1924943A2 (zh) |
JP (1) | JP2009505196A (zh) |
CN (1) | CN101238470B (zh) |
GB (2) | GB0516471D0 (zh) |
WO (1) | WO2007017676A2 (zh) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8523666B2 (en) * | 2007-05-25 | 2013-09-03 | Microsoft Corporation | Programming framework for closed systems |
US8321538B2 (en) * | 2007-09-24 | 2012-11-27 | Hewlett-Packard Development Company, L.P. | Autonomous network device configuration method |
GB2456134A (en) * | 2007-12-31 | 2009-07-08 | Symbian Software Ltd | Typed application development |
CN102024127B (zh) * | 2010-11-17 | 2012-09-19 | 中国联合网络通信集团有限公司 | 应用软件控制平台、使用者终端、分发系统及方法 |
CN102024107A (zh) * | 2010-11-17 | 2011-04-20 | 中国联合网络通信集团有限公司 | 应用软件控制平台、开发者终端、分发系统及方法 |
KR101944010B1 (ko) * | 2012-02-24 | 2019-01-30 | 삼성전자 주식회사 | 애플리케이션의 변조 감지 방법 및 장치 |
US10866963B2 (en) * | 2017-12-28 | 2020-12-15 | Dropbox, Inc. | File system authentication |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1255209A (zh) * | 1997-04-10 | 2000-05-31 | 查耐威尔有限公司 | 对唯一定制的、合法的和可跟踪的软件应用进行网上安装的方法和系统 |
EP1168166A2 (en) * | 2000-06-30 | 2002-01-02 | Fujitsu Limited | Program installation method and system |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5724425A (en) * | 1994-06-10 | 1998-03-03 | Sun Microsystems, Inc. | Method and apparatus for enhancing software security and distributing software |
DE69534757T2 (de) * | 1994-09-15 | 2006-08-31 | International Business Machines Corp. | System und Verfahren zur sicheren Speicherung und Verteilung von Daten unter Verwendung digitaler Unterschriften |
US5892904A (en) * | 1996-12-06 | 1999-04-06 | Microsoft Corporation | Code certification for network transmission |
US5757919A (en) * | 1996-12-12 | 1998-05-26 | Intel Corporation | Cryptographically protected paging subsystem |
AU7735600A (en) * | 1999-10-01 | 2001-05-10 | Infraworks Corporation | Port blocking method and system |
US7017189B1 (en) * | 2000-06-27 | 2006-03-21 | Microsoft Corporation | System and method for activating a rendering device in a multi-level rights-management architecture |
EP1211587A1 (en) * | 2000-11-30 | 2002-06-05 | Pentap Technologies AG | Distributing programming language code |
JP2003202929A (ja) * | 2002-01-08 | 2003-07-18 | Ntt Docomo Inc | 配信方法および配信システム |
US20040153644A1 (en) * | 2003-02-05 | 2004-08-05 | Mccorkendale Bruce | Preventing execution of potentially malicious software |
JP2004280283A (ja) * | 2003-03-13 | 2004-10-07 | Hitachi Ltd | 分散ファイルシステム、分散ファイルシステムサーバ及び分散ファイルシステムへのアクセス方法 |
US7559091B2 (en) * | 2004-06-12 | 2009-07-07 | Microsoft Corporation | Software obfuscation |
US7747998B2 (en) * | 2004-08-31 | 2010-06-29 | Microsoft Corporation | Elevated patching |
GB0516443D0 (en) * | 2005-08-10 | 2005-09-14 | Symbian Software Ltd | Improving the security of operation of a computing device through the use of vendor ids |
-
2005
- 2005-08-10 GB GBGB0516471.0A patent/GB0516471D0/en not_active Ceased
-
2006
- 2006-08-08 JP JP2008525631A patent/JP2009505196A/ja active Pending
- 2006-08-08 EP EP06779088A patent/EP1924943A2/en not_active Ceased
- 2006-08-08 WO PCT/GB2006/002964 patent/WO2007017676A2/en active Application Filing
- 2006-08-08 CN CN2006800287861A patent/CN101238470B/zh not_active Expired - Fee Related
- 2006-08-08 US US12/063,178 patent/US20100325426A1/en not_active Abandoned
- 2006-08-10 GB GB0615909A patent/GB2429081A/en not_active Withdrawn
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1255209A (zh) * | 1997-04-10 | 2000-05-31 | 查耐威尔有限公司 | 对唯一定制的、合法的和可跟踪的软件应用进行网上安装的方法和系统 |
EP1168166A2 (en) * | 2000-06-30 | 2002-01-02 | Fujitsu Limited | Program installation method and system |
Also Published As
Publication number | Publication date |
---|---|
CN101238470A (zh) | 2008-08-06 |
WO2007017676A2 (en) | 2007-02-15 |
WO2007017676A3 (en) | 2007-05-24 |
GB0516471D0 (en) | 2005-09-14 |
GB0615909D0 (en) | 2006-09-20 |
JP2009505196A (ja) | 2009-02-05 |
EP1924943A2 (en) | 2008-05-28 |
US20100325426A1 (en) | 2010-12-23 |
GB2429081A (en) | 2007-02-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
KR101176646B1 (ko) | 상태 검증을 사용하는 보호된 오퍼레이팅 시스템 부팅을 위한 시스템 및 방법 | |
CN109937419B (zh) | 安全功能强化的设备的初始化方法及设备的固件更新方法 | |
US7546587B2 (en) | Run-time call stack verification | |
EP2831787B1 (en) | Method and system for preventing and detecting security threats | |
CN107567630B (zh) | 受信输入/输出设备的隔离 | |
CN101238470B (zh) | 操作计算设备的方法、制造软件的方法 | |
Löhr et al. | Patterns for secure boot and secure storage in computer systems | |
EP2126770B1 (en) | Trusted computing entities | |
CN103455756B (zh) | 一种基于可信计算的进程控制方法 | |
Paverd et al. | Hardware security for device authentication in the smart grid | |
WO2011146305A2 (en) | Extending an integrity measurement | |
US9026803B2 (en) | Computing entities, platforms and methods operable to perform operations selectively using different cryptographic algorithms | |
WO2014153760A1 (en) | Detecting exploits against software applications | |
WO2014153635A1 (en) | Method and system for platform and user application security on a device | |
KR20180007922A (ko) | Tpm 기반의 사용자 장치 및 이를 이용한 부팅 방법 | |
CN101238472A (zh) | 通过使用供应商id来改进计算装置的操作的安全性 | |
WO2020007249A1 (zh) | 一种操作系统安全主动防御方法及操作系统 | |
US20180181731A1 (en) | Method and system for preventing unauthorized computer processing | |
Msgna et al. | Secure application execution in mobile devices | |
Zaharis et al. | Live forensics framework for wireless sensor nodes using sandboxing | |
Meshram et al. | Security in embedded systems: Vulnerabilities pigeonholing of attacks and countermeasures | |
Murmann et al. | How Secure are Current Mobile Operating Systems? | |
Surendrababu | System Integrity–A Cautionary Tale | |
Li et al. | Research on the security of automotive domain controller systems based on trusted execution environment | |
Yu et al. | Research on Model for Verifying the Integrity of Software Based on API Hook |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
ASS | Succession or assignment of patent right |
Owner name: NOKIA NETWORKS OY Free format text: FORMER OWNER: SYMBIAN SOFTWARE LTD Effective date: 20100618 |
|
C41 | Transfer of patent application or patent right or utility model | ||
COR | Change of bibliographic data |
Free format text: CORRECT: ADDRESS; FROM: LONDON, THE UNITED KINGDOM TO: ESPOO, FINLAND |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20100618 Address after: Espoo, Finland Applicant after: Nokia Oyj Address before: London, England Applicant before: Symbian Software Ltd. |
|
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
C17 | Cessation of patent right | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20100818 Termination date: 20120808 |