CY1109239T1 - Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφη - Google Patents

Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφη

Info

Publication number
CY1109239T1
CY1109239T1 CY20091100770T CY091100770T CY1109239T1 CY 1109239 T1 CY1109239 T1 CY 1109239T1 CY 20091100770 T CY20091100770 T CY 20091100770T CY 091100770 T CY091100770 T CY 091100770T CY 1109239 T1 CY1109239 T1 CY 1109239T1
Authority
CY
Cyprus
Prior art keywords
resource
program
access control
digital signature
code
Prior art date
Application number
CY20091100770T
Other languages
English (en)
Inventor
Someren Nicko Van
Original Assignee
Ncipher Corporation Limited
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ncipher Corporation Limited filed Critical Ncipher Corporation Limited
Publication of CY1109239T1 publication Critical patent/CY1109239T1/el

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
  • Communication Control (AREA)
  • Electrophonic Musical Instruments (AREA)
  • Circuits Of Receivers In General (AREA)
  • Iron Core Of Rotating Electric Machines (AREA)

Abstract

Σύστημα υπολογιστή διαθέτει πόρο, μονάδα επαλήθευσης και μηχανή εκτέλεσης για την εκτέλεση σώματος κώδικα προγράμματος που διαθέτει συσχετισμένη υπογραφή. Κρυπτογραφικό κλειδί συσχετίζεται με τον πόρο και, όταν ο κώδικας πρόκειται να φορτωθεί μέσα στη μηχανή εκτέλεσης, εκτελείται λειτουργία επαλήθευσης επί της υπογραφής με τη χρήση του κρυπτογραφικού κλειδιού που συσχετίζεται με τον πόρο. Η μηχανή εκτέλεσης είναι ξεχωριστή από τον πόρο και όταν απαιτείται πρόσβαση στον εν λόγω πόρο από τον κώδικα που βρίσκεται μέσα στη μηχανή εκτέλεσης, διενεργείται περαιτέρω λειτουργία επαλήθευσης επί της υπογραφής με τη χρήση του κρυπτογραφικού κλειδιού που συσχετίζεται με τον πόρο. Η πρόσβαση στον πόρο από τον κώδικα εξαρτάται από το αποτέλεσμα της λειτουργίας επαλήθευσης.
CY20091100770T 2000-02-21 2009-07-20 Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφη CY1109239T1 (el)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GBGB0003920.6A GB0003920D0 (en) 2000-02-21 2000-02-21 Computer system
EP01905927A EP1257892B1 (en) 2000-02-21 2001-02-20 Controlling access to a resource by a program using a digital signature

Publications (1)

Publication Number Publication Date
CY1109239T1 true CY1109239T1 (el) 2014-07-02

Family

ID=9885992

Family Applications (1)

Application Number Title Priority Date Filing Date
CY20091100770T CY1109239T1 (el) 2000-02-21 2009-07-20 Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφη

Country Status (17)

Country Link
US (1) US7900239B2 (el)
EP (1) EP1257892B1 (el)
JP (1) JP2003524252A (el)
AT (1) ATE429672T1 (el)
AU (1) AU3389201A (el)
CA (1) CA2400940C (el)
CY (1) CY1109239T1 (el)
CZ (1) CZ20022659A3 (el)
DE (1) DE60138455D1 (el)
DK (1) DK1257892T3 (el)
ES (1) ES2323524T3 (el)
GB (1) GB0003920D0 (el)
HU (1) HUP0204161A2 (el)
NO (1) NO20023964L (el)
PL (1) PL356340A1 (el)
PT (1) PT1257892E (el)
WO (1) WO2001063385A1 (el)

Families Citing this family (63)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002065693A2 (en) * 2001-02-14 2002-08-22 Scientific Generics Limited Cryptographic key generation apparatus and method
GB0113255D0 (en) 2001-05-31 2001-07-25 Scient Generics Ltd Number generator
US7882555B2 (en) * 2001-03-16 2011-02-01 Kavado, Inc. Application layer security method and system
US7328337B2 (en) 2001-05-25 2008-02-05 America Online, Incorporated Trust grant and revocation from a master key to secondary keys
NO316489B1 (no) 2001-10-01 2004-01-26 Genkey As System, b¶rbar anordning og fremgangsmåte for digital autentisering, kryptering og signering ved generering av flyktige, men konsistente ogrepeterbare kryptonökler
US20030079134A1 (en) * 2001-10-23 2003-04-24 Xerox Corporation Method of secure print-by-reference
US7627753B2 (en) * 2002-03-19 2009-12-01 Microsoft Corporation Secure digital data format and code enforced policy
IL149583A0 (en) 2002-05-09 2003-07-06 Kavado Israel Ltd Method for automatic setting and updating of a security policy
EP1520369B1 (en) 2002-05-31 2006-10-18 Scientific Generics Limited Biometric authentication system
US7512975B2 (en) 2002-08-16 2009-03-31 Intel Corporation Hardware-assisted credential validation
US7546452B2 (en) 2002-08-20 2009-06-09 Intel Corporation Hardware-based credential management
GB0304663D0 (en) * 2003-02-28 2003-04-02 Ncipher Corp Ltd A method and system of securely enforcing a computer policy
US7328340B2 (en) * 2003-06-27 2008-02-05 Intel Corporation Methods and apparatus to provide secure firmware storage and service access
US7464270B2 (en) * 2003-07-23 2008-12-09 Microsoft Corporation Application identification and license enforcement
US7103779B2 (en) * 2003-09-18 2006-09-05 Apple Computer, Inc. Method and apparatus for incremental code signing
US7517036B2 (en) * 2004-05-27 2009-04-14 Silverbrook Research Pty Ltd Printhead module capable of printing a maximum of n channels of print data
US7549718B2 (en) * 2004-05-27 2009-06-23 Silverbrook Research Pty Ltd Printhead module having operation controllable on basis of thermal sensors
US7290852B2 (en) * 2004-05-27 2007-11-06 Silverbrook Research Pty Ltd Printhead module having a dropped row
US7427117B2 (en) * 2004-05-27 2008-09-23 Silverbrook Research Pty Ltd Method of expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group
US7607757B2 (en) * 2004-05-27 2009-10-27 Silverbrook Research Pty Ltd Printer controller for supplying dot data to at least one printhead module having faulty nozzle
US20060294312A1 (en) * 2004-05-27 2006-12-28 Silverbrook Research Pty Ltd Generation sequences
US7448707B2 (en) * 2004-05-27 2008-11-11 Silverbrook Research Pty Ltd Method of expelling ink from nozzels in groups, starting at outside nozzels of each group
US7377609B2 (en) * 2004-05-27 2008-05-27 Silverbrook Research Pty Ltd Printer controller for at least partially compensating for erroneous rotational displacement
US7281777B2 (en) * 2004-05-27 2007-10-16 Silverbrook Research Pty Ltd Printhead module having a communication input for data and control
US7266661B2 (en) * 2004-05-27 2007-09-04 Silverbrook Research Pty Ltd Method of storing bit-pattern in plural devices
US7374266B2 (en) * 2004-05-27 2008-05-20 Silverbrook Research Pty Ltd Method for at least partially compensating for errors in ink dot placement due to erroneous rotational displacement
US7631190B2 (en) * 2004-05-27 2009-12-08 Silverbrook Research Pty Ltd Use of variant and base keys with two entities
US7243193B2 (en) * 2004-05-27 2007-07-10 Silverbrook Research Pty Ltd Storage of program code in arbitrary locations in memory
US20060004829A1 (en) * 2004-05-27 2006-01-05 Silverbrook Research Pty Ltd Rolling keys
US7600843B2 (en) * 2004-05-27 2009-10-13 Silverbrook Research Pty Ltd Printer controller for controlling a printhead module based on thermal sensing
US20070083491A1 (en) * 2004-05-27 2007-04-12 Silverbrook Research Pty Ltd Storage of key in non-volatile memory
US7484831B2 (en) * 2004-05-27 2009-02-03 Silverbrook Research Pty Ltd Printhead module having horizontally grouped firing order
US7188928B2 (en) * 2004-05-27 2007-03-13 Silverbrook Research Pty Ltd Printer comprising two uneven printhead modules and at least two printer controllers, one of which sends print data to both of the printhead modules
US8011747B2 (en) * 2004-05-27 2011-09-06 Silverbrook Research Pty Ltd Printer controller for controlling a printhead with horizontally grouped firing order
US7735944B2 (en) * 2004-05-27 2010-06-15 Silverbrook Research Pty Ltd Printer comprising two printhead modules and at least two printer controllers
US7557941B2 (en) * 2004-05-27 2009-07-07 Silverbrook Research Pty Ltd Use of variant and base keys with three or more entities
US7314261B2 (en) * 2004-05-27 2008-01-01 Silverbrook Research Pty Ltd Printhead module for expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group
US7328956B2 (en) * 2004-05-27 2008-02-12 Silverbrook Research Pty Ltd Printer comprising a printhead and at least two printer controllers connected to a common input of the printhead
US7390071B2 (en) * 2004-05-27 2008-06-24 Silverbrook Research Pty Ltd Printer controller for supplying data to a printhead module having a dropped row
GB0413034D0 (en) 2004-06-10 2004-07-14 Scient Generics Ltd Secure workflow engine
US8499337B1 (en) * 2004-10-06 2013-07-30 Mcafee, Inc. Systems and methods for delegation and notification of administration of internet access
JP2006221629A (ja) * 2005-02-07 2006-08-24 Sony Computer Entertainment Inc プロセッサのリソース管理によるコンテンツ制御方法および装置
US7908483B2 (en) * 2005-06-30 2011-03-15 Intel Corporation Method and apparatus for binding TPM keys to execution entities
WO2007016787A2 (en) 2005-08-09 2007-02-15 Nexsan Technologies Canada Inc. Data archiving system
US8364965B2 (en) 2006-03-15 2013-01-29 Apple Inc. Optimized integrity verification procedures
US8375458B2 (en) 2007-01-05 2013-02-12 Apple Inc. System and method for authenticating code executing on computer system
US9246687B2 (en) * 2007-02-28 2016-01-26 Broadcom Corporation Method for authorizing and authenticating data
EP2096569B1 (en) * 2008-02-29 2012-04-18 Research In Motion Limited System and method for shared resource owner based access control
US8341715B2 (en) 2008-02-29 2012-12-25 Research In Motion Limited System and method for shared resource owner based access control
EP2250604B1 (en) 2008-03-04 2017-12-27 Apple Inc. System and method of authorizing execution of software code based on at least one installed profile
US7940543B2 (en) * 2008-03-19 2011-05-10 Nanya Technology Corp. Low power synchronous memory command address scheme
US20100262963A1 (en) * 2009-04-09 2010-10-14 Gary Michael Wassermann Systems and methods for activating a network appliance
DE102009058516A1 (de) * 2009-12-16 2011-06-22 Siemens Aktiengesellschaft, 80333 Vorrichtung und Verfahren zum Gewähren von Zugriffsrechten auf eine Wartungsfunktionalität
CN102812473A (zh) * 2010-02-11 2012-12-05 惠普发展公司,有限责任合伙企业 基于可执行程序身份的文件访问
US20110314293A1 (en) * 2010-06-17 2011-12-22 Yu Chun-Ta Method of Handling a Server Delegation and Related Communication Device
US8631460B2 (en) * 2011-03-23 2014-01-14 CipherPoint Software, Inc. Systems and methods for implementing transparent encryption
US8990266B2 (en) 2011-10-18 2015-03-24 CipherPoint Software, Inc. Dynamic data transformations for network transmissions
JP4941611B2 (ja) * 2011-11-21 2012-05-30 ソニー株式会社 情報処理装置、および方法、並びにコンピュータ・プログラム
US8844026B2 (en) 2012-06-01 2014-09-23 Blackberry Limited System and method for controlling access to secure resources
US9058493B1 (en) * 2013-01-16 2015-06-16 Amdocs Software Systems Limited System, method, and computer program for conditionally implementing protected content
KR102376196B1 (ko) 2016-09-02 2022-03-18 아싸 아브로이 에이비 접근을 제어하기 위한 열쇠 위임
US11263840B2 (en) 2017-02-24 2022-03-01 Assa Abloy Ab Delegation and auxiliary condition for physical access
US10819586B2 (en) * 2018-10-17 2020-10-27 Servicenow, Inc. Functional discovery and mapping of serverless resources

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU662805B2 (en) * 1992-04-06 1995-09-14 Addison M. Fischer A method for processing information among computers which may exchange messages
ES2184066T3 (es) 1996-10-25 2003-04-01 Schlumberger Systems & Service Uso de un lenguaje de programacion de alto nivel con microcontrolador.
US6138235A (en) * 1998-06-29 2000-10-24 Sun Microsystems, Inc. Controlling access to services between modular applications
EP1163566A1 (en) * 1999-03-08 2001-12-19 Spyrus, Inc. Method and system for enforcing access to a computing resource using a licensing certificate

Also Published As

Publication number Publication date
CA2400940C (en) 2009-09-01
GB0003920D0 (en) 2000-04-05
ATE429672T1 (de) 2009-05-15
HUP0204161A2 (en) 2003-05-28
PL356340A1 (en) 2004-06-28
EP1257892A1 (en) 2002-11-20
NO20023964L (no) 2002-10-21
DK1257892T3 (da) 2009-08-17
CA2400940A1 (en) 2001-08-30
US20050005112A1 (en) 2005-01-06
AU3389201A (en) 2001-09-03
CZ20022659A3 (cs) 2003-06-18
US7900239B2 (en) 2011-03-01
PT1257892E (pt) 2009-06-09
NO20023964D0 (no) 2002-08-20
WO2001063385A1 (en) 2001-08-30
JP2003524252A (ja) 2003-08-12
DE60138455D1 (de) 2009-06-04
EP1257892B1 (en) 2009-04-22
ES2323524T3 (es) 2009-07-20

Similar Documents

Publication Publication Date Title
CY1109239T1 (el) Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφη
US11568051B2 (en) Malicious object detection in a runtime environment
CN103761475A (zh) 检测智能终端中恶意代码的方法及装置
CN103902910A (zh) 检测智能终端中恶意代码的方法及装置
US8082442B2 (en) Securely sharing applications installed by unprivileged users
CN109313677B (zh) 用于动态可执行验证的方法和装置
CN111179086B (zh) 一种基于WebAssembly的智能合约虚拟机
DE69901424D1 (de) Rechnerdatei-integritätsprüfung
RU2007138019A (ru) Безопасная загрузка
CN107092518A (zh) 一种保护拟态防御系统软件层安全的编译方法
ATE522875T1 (de) Identifizierung von textpassagen
TW201721497A (zh) 用以檢測運作時期所產生碼中之惡意碼的系統及方法
JP5945313B2 (ja) 構造体を生成する方法および対応する構造体
KR20170087887A (ko) 애플리케이션 무결성의 검증을 제공하는 방법 및 디바이스
CN109753788B (zh) 内核运行时的完整性校验方法及计算机可读存储介质
KR101482700B1 (ko) 해시를 이용한 프로그램의 무결성 검증 방법
Vasilakis et al. Towards fine-grained, automated application compartmentalization
US10261784B1 (en) Detecting copied computer code using cryptographically hashed overlapping shingles
Qiao et al. Fast reused function retrieval method based on simhash and inverted index
Lanet et al. Memory forensics of a java card dump
JP2009129128A (ja) プログラム変換プログラム,処理方法,および処理装置
GB2628724A (en) Secure software compilation and software verification
JP2015049785A (ja) プログラム処理装置
Stewart DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry
Allen Source Code Isn’t