CY1109239T1 - Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφη - Google Patents
Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφηInfo
- Publication number
- CY1109239T1 CY1109239T1 CY20091100770T CY091100770T CY1109239T1 CY 1109239 T1 CY1109239 T1 CY 1109239T1 CY 20091100770 T CY20091100770 T CY 20091100770T CY 091100770 T CY091100770 T CY 091100770T CY 1109239 T1 CY1109239 T1 CY 1109239T1
- Authority
- CY
- Cyprus
- Prior art keywords
- resource
- program
- access control
- digital signature
- code
- Prior art date
Links
- PWPJGUXAGUPAHP-UHFFFAOYSA-N lufenuron Chemical compound C1=C(Cl)C(OC(F)(F)C(C(F)(F)F)F)=CC(Cl)=C1NC(=O)NC(=O)C1=C(F)C=CC=C1F PWPJGUXAGUPAHP-UHFFFAOYSA-N 0.000 title 1
- 238000012795 verification Methods 0.000 abstract 4
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Communication Control (AREA)
- Electrophonic Musical Instruments (AREA)
- Circuits Of Receivers In General (AREA)
- Iron Core Of Rotating Electric Machines (AREA)
Abstract
Σύστημα υπολογιστή διαθέτει πόρο, μονάδα επαλήθευσης και μηχανή εκτέλεσης για την εκτέλεση σώματος κώδικα προγράμματος που διαθέτει συσχετισμένη υπογραφή. Κρυπτογραφικό κλειδί συσχετίζεται με τον πόρο και, όταν ο κώδικας πρόκειται να φορτωθεί μέσα στη μηχανή εκτέλεσης, εκτελείται λειτουργία επαλήθευσης επί της υπογραφής με τη χρήση του κρυπτογραφικού κλειδιού που συσχετίζεται με τον πόρο. Η μηχανή εκτέλεσης είναι ξεχωριστή από τον πόρο και όταν απαιτείται πρόσβαση στον εν λόγω πόρο από τον κώδικα που βρίσκεται μέσα στη μηχανή εκτέλεσης, διενεργείται περαιτέρω λειτουργία επαλήθευσης επί της υπογραφής με τη χρήση του κρυπτογραφικού κλειδιού που συσχετίζεται με τον πόρο. Η πρόσβαση στον πόρο από τον κώδικα εξαρτάται από το αποτέλεσμα της λειτουργίας επαλήθευσης.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0003920.6A GB0003920D0 (en) | 2000-02-21 | 2000-02-21 | Computer system |
EP01905927A EP1257892B1 (en) | 2000-02-21 | 2001-02-20 | Controlling access to a resource by a program using a digital signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CY1109239T1 true CY1109239T1 (el) | 2014-07-02 |
Family
ID=9885992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CY20091100770T CY1109239T1 (el) | 2000-02-21 | 2009-07-20 | Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφη |
Country Status (17)
Country | Link |
---|---|
US (1) | US7900239B2 (el) |
EP (1) | EP1257892B1 (el) |
JP (1) | JP2003524252A (el) |
AT (1) | ATE429672T1 (el) |
AU (1) | AU3389201A (el) |
CA (1) | CA2400940C (el) |
CY (1) | CY1109239T1 (el) |
CZ (1) | CZ20022659A3 (el) |
DE (1) | DE60138455D1 (el) |
DK (1) | DK1257892T3 (el) |
ES (1) | ES2323524T3 (el) |
GB (1) | GB0003920D0 (el) |
HU (1) | HUP0204161A2 (el) |
NO (1) | NO20023964L (el) |
PL (1) | PL356340A1 (el) |
PT (1) | PT1257892E (el) |
WO (1) | WO2001063385A1 (el) |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002065693A2 (en) * | 2001-02-14 | 2002-08-22 | Scientific Generics Limited | Cryptographic key generation apparatus and method |
GB0113255D0 (en) | 2001-05-31 | 2001-07-25 | Scient Generics Ltd | Number generator |
US7882555B2 (en) * | 2001-03-16 | 2011-02-01 | Kavado, Inc. | Application layer security method and system |
US7328337B2 (en) | 2001-05-25 | 2008-02-05 | America Online, Incorporated | Trust grant and revocation from a master key to secondary keys |
NO316489B1 (no) | 2001-10-01 | 2004-01-26 | Genkey As | System, b¶rbar anordning og fremgangsmåte for digital autentisering, kryptering og signering ved generering av flyktige, men konsistente ogrepeterbare kryptonökler |
US20030079134A1 (en) * | 2001-10-23 | 2003-04-24 | Xerox Corporation | Method of secure print-by-reference |
US7627753B2 (en) * | 2002-03-19 | 2009-12-01 | Microsoft Corporation | Secure digital data format and code enforced policy |
IL149583A0 (en) | 2002-05-09 | 2003-07-06 | Kavado Israel Ltd | Method for automatic setting and updating of a security policy |
EP1520369B1 (en) | 2002-05-31 | 2006-10-18 | Scientific Generics Limited | Biometric authentication system |
US7512975B2 (en) | 2002-08-16 | 2009-03-31 | Intel Corporation | Hardware-assisted credential validation |
US7546452B2 (en) | 2002-08-20 | 2009-06-09 | Intel Corporation | Hardware-based credential management |
GB0304663D0 (en) * | 2003-02-28 | 2003-04-02 | Ncipher Corp Ltd | A method and system of securely enforcing a computer policy |
US7328340B2 (en) * | 2003-06-27 | 2008-02-05 | Intel Corporation | Methods and apparatus to provide secure firmware storage and service access |
US7464270B2 (en) * | 2003-07-23 | 2008-12-09 | Microsoft Corporation | Application identification and license enforcement |
US7103779B2 (en) * | 2003-09-18 | 2006-09-05 | Apple Computer, Inc. | Method and apparatus for incremental code signing |
US7517036B2 (en) * | 2004-05-27 | 2009-04-14 | Silverbrook Research Pty Ltd | Printhead module capable of printing a maximum of n channels of print data |
US7549718B2 (en) * | 2004-05-27 | 2009-06-23 | Silverbrook Research Pty Ltd | Printhead module having operation controllable on basis of thermal sensors |
US7290852B2 (en) * | 2004-05-27 | 2007-11-06 | Silverbrook Research Pty Ltd | Printhead module having a dropped row |
US7427117B2 (en) * | 2004-05-27 | 2008-09-23 | Silverbrook Research Pty Ltd | Method of expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group |
US7607757B2 (en) * | 2004-05-27 | 2009-10-27 | Silverbrook Research Pty Ltd | Printer controller for supplying dot data to at least one printhead module having faulty nozzle |
US20060294312A1 (en) * | 2004-05-27 | 2006-12-28 | Silverbrook Research Pty Ltd | Generation sequences |
US7448707B2 (en) * | 2004-05-27 | 2008-11-11 | Silverbrook Research Pty Ltd | Method of expelling ink from nozzels in groups, starting at outside nozzels of each group |
US7377609B2 (en) * | 2004-05-27 | 2008-05-27 | Silverbrook Research Pty Ltd | Printer controller for at least partially compensating for erroneous rotational displacement |
US7281777B2 (en) * | 2004-05-27 | 2007-10-16 | Silverbrook Research Pty Ltd | Printhead module having a communication input for data and control |
US7266661B2 (en) * | 2004-05-27 | 2007-09-04 | Silverbrook Research Pty Ltd | Method of storing bit-pattern in plural devices |
US7374266B2 (en) * | 2004-05-27 | 2008-05-20 | Silverbrook Research Pty Ltd | Method for at least partially compensating for errors in ink dot placement due to erroneous rotational displacement |
US7631190B2 (en) * | 2004-05-27 | 2009-12-08 | Silverbrook Research Pty Ltd | Use of variant and base keys with two entities |
US7243193B2 (en) * | 2004-05-27 | 2007-07-10 | Silverbrook Research Pty Ltd | Storage of program code in arbitrary locations in memory |
US20060004829A1 (en) * | 2004-05-27 | 2006-01-05 | Silverbrook Research Pty Ltd | Rolling keys |
US7600843B2 (en) * | 2004-05-27 | 2009-10-13 | Silverbrook Research Pty Ltd | Printer controller for controlling a printhead module based on thermal sensing |
US20070083491A1 (en) * | 2004-05-27 | 2007-04-12 | Silverbrook Research Pty Ltd | Storage of key in non-volatile memory |
US7484831B2 (en) * | 2004-05-27 | 2009-02-03 | Silverbrook Research Pty Ltd | Printhead module having horizontally grouped firing order |
US7188928B2 (en) * | 2004-05-27 | 2007-03-13 | Silverbrook Research Pty Ltd | Printer comprising two uneven printhead modules and at least two printer controllers, one of which sends print data to both of the printhead modules |
US8011747B2 (en) * | 2004-05-27 | 2011-09-06 | Silverbrook Research Pty Ltd | Printer controller for controlling a printhead with horizontally grouped firing order |
US7735944B2 (en) * | 2004-05-27 | 2010-06-15 | Silverbrook Research Pty Ltd | Printer comprising two printhead modules and at least two printer controllers |
US7557941B2 (en) * | 2004-05-27 | 2009-07-07 | Silverbrook Research Pty Ltd | Use of variant and base keys with three or more entities |
US7314261B2 (en) * | 2004-05-27 | 2008-01-01 | Silverbrook Research Pty Ltd | Printhead module for expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group |
US7328956B2 (en) * | 2004-05-27 | 2008-02-12 | Silverbrook Research Pty Ltd | Printer comprising a printhead and at least two printer controllers connected to a common input of the printhead |
US7390071B2 (en) * | 2004-05-27 | 2008-06-24 | Silverbrook Research Pty Ltd | Printer controller for supplying data to a printhead module having a dropped row |
GB0413034D0 (en) | 2004-06-10 | 2004-07-14 | Scient Generics Ltd | Secure workflow engine |
US8499337B1 (en) * | 2004-10-06 | 2013-07-30 | Mcafee, Inc. | Systems and methods for delegation and notification of administration of internet access |
JP2006221629A (ja) * | 2005-02-07 | 2006-08-24 | Sony Computer Entertainment Inc | プロセッサのリソース管理によるコンテンツ制御方法および装置 |
US7908483B2 (en) * | 2005-06-30 | 2011-03-15 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
WO2007016787A2 (en) | 2005-08-09 | 2007-02-15 | Nexsan Technologies Canada Inc. | Data archiving system |
US8364965B2 (en) | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
US8375458B2 (en) | 2007-01-05 | 2013-02-12 | Apple Inc. | System and method for authenticating code executing on computer system |
US9246687B2 (en) * | 2007-02-28 | 2016-01-26 | Broadcom Corporation | Method for authorizing and authenticating data |
EP2096569B1 (en) * | 2008-02-29 | 2012-04-18 | Research In Motion Limited | System and method for shared resource owner based access control |
US8341715B2 (en) | 2008-02-29 | 2012-12-25 | Research In Motion Limited | System and method for shared resource owner based access control |
EP2250604B1 (en) | 2008-03-04 | 2017-12-27 | Apple Inc. | System and method of authorizing execution of software code based on at least one installed profile |
US7940543B2 (en) * | 2008-03-19 | 2011-05-10 | Nanya Technology Corp. | Low power synchronous memory command address scheme |
US20100262963A1 (en) * | 2009-04-09 | 2010-10-14 | Gary Michael Wassermann | Systems and methods for activating a network appliance |
DE102009058516A1 (de) * | 2009-12-16 | 2011-06-22 | Siemens Aktiengesellschaft, 80333 | Vorrichtung und Verfahren zum Gewähren von Zugriffsrechten auf eine Wartungsfunktionalität |
CN102812473A (zh) * | 2010-02-11 | 2012-12-05 | 惠普发展公司,有限责任合伙企业 | 基于可执行程序身份的文件访问 |
US20110314293A1 (en) * | 2010-06-17 | 2011-12-22 | Yu Chun-Ta | Method of Handling a Server Delegation and Related Communication Device |
US8631460B2 (en) * | 2011-03-23 | 2014-01-14 | CipherPoint Software, Inc. | Systems and methods for implementing transparent encryption |
US8990266B2 (en) | 2011-10-18 | 2015-03-24 | CipherPoint Software, Inc. | Dynamic data transformations for network transmissions |
JP4941611B2 (ja) * | 2011-11-21 | 2012-05-30 | ソニー株式会社 | 情報処理装置、および方法、並びにコンピュータ・プログラム |
US8844026B2 (en) | 2012-06-01 | 2014-09-23 | Blackberry Limited | System and method for controlling access to secure resources |
US9058493B1 (en) * | 2013-01-16 | 2015-06-16 | Amdocs Software Systems Limited | System, method, and computer program for conditionally implementing protected content |
KR102376196B1 (ko) | 2016-09-02 | 2022-03-18 | 아싸 아브로이 에이비 | 접근을 제어하기 위한 열쇠 위임 |
US11263840B2 (en) | 2017-02-24 | 2022-03-01 | Assa Abloy Ab | Delegation and auxiliary condition for physical access |
US10819586B2 (en) * | 2018-10-17 | 2020-10-27 | Servicenow, Inc. | Functional discovery and mapping of serverless resources |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU662805B2 (en) * | 1992-04-06 | 1995-09-14 | Addison M. Fischer | A method for processing information among computers which may exchange messages |
ES2184066T3 (es) | 1996-10-25 | 2003-04-01 | Schlumberger Systems & Service | Uso de un lenguaje de programacion de alto nivel con microcontrolador. |
US6138235A (en) * | 1998-06-29 | 2000-10-24 | Sun Microsystems, Inc. | Controlling access to services between modular applications |
EP1163566A1 (en) * | 1999-03-08 | 2001-12-19 | Spyrus, Inc. | Method and system for enforcing access to a computing resource using a licensing certificate |
-
2000
- 2000-02-21 GB GBGB0003920.6A patent/GB0003920D0/en not_active Ceased
-
2001
- 2001-02-20 EP EP01905927A patent/EP1257892B1/en not_active Expired - Lifetime
- 2001-02-20 AT AT01905927T patent/ATE429672T1/de active
- 2001-02-20 DK DK01905927T patent/DK1257892T3/da active
- 2001-02-20 JP JP2001562284A patent/JP2003524252A/ja active Pending
- 2001-02-20 AU AU33892/01A patent/AU3389201A/en not_active Abandoned
- 2001-02-20 CZ CZ20022659A patent/CZ20022659A3/cs unknown
- 2001-02-20 ES ES01905927T patent/ES2323524T3/es not_active Expired - Lifetime
- 2001-02-20 PT PT01905927T patent/PT1257892E/pt unknown
- 2001-02-20 CA CA002400940A patent/CA2400940C/en not_active Expired - Lifetime
- 2001-02-20 PL PL01356340A patent/PL356340A1/xx unknown
- 2001-02-20 US US10/204,645 patent/US7900239B2/en not_active Expired - Lifetime
- 2001-02-20 HU HU0204161A patent/HUP0204161A2/hu unknown
- 2001-02-20 WO PCT/GB2001/000688 patent/WO2001063385A1/en not_active Application Discontinuation
- 2001-02-20 DE DE60138455T patent/DE60138455D1/de not_active Expired - Lifetime
-
2002
- 2002-08-20 NO NO20023964A patent/NO20023964L/no not_active Application Discontinuation
-
2009
- 2009-07-20 CY CY20091100770T patent/CY1109239T1/el unknown
Also Published As
Publication number | Publication date |
---|---|
CA2400940C (en) | 2009-09-01 |
GB0003920D0 (en) | 2000-04-05 |
ATE429672T1 (de) | 2009-05-15 |
HUP0204161A2 (en) | 2003-05-28 |
PL356340A1 (en) | 2004-06-28 |
EP1257892A1 (en) | 2002-11-20 |
NO20023964L (no) | 2002-10-21 |
DK1257892T3 (da) | 2009-08-17 |
CA2400940A1 (en) | 2001-08-30 |
US20050005112A1 (en) | 2005-01-06 |
AU3389201A (en) | 2001-09-03 |
CZ20022659A3 (cs) | 2003-06-18 |
US7900239B2 (en) | 2011-03-01 |
PT1257892E (pt) | 2009-06-09 |
NO20023964D0 (no) | 2002-08-20 |
WO2001063385A1 (en) | 2001-08-30 |
JP2003524252A (ja) | 2003-08-12 |
DE60138455D1 (de) | 2009-06-04 |
EP1257892B1 (en) | 2009-04-22 |
ES2323524T3 (es) | 2009-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CY1109239T1 (el) | Ελεγχος προσβασης σε πορο απο προγραμμα που χρησιμοποιει ψηφιακη υπογραφη | |
US11568051B2 (en) | Malicious object detection in a runtime environment | |
CN103761475A (zh) | 检测智能终端中恶意代码的方法及装置 | |
CN103902910A (zh) | 检测智能终端中恶意代码的方法及装置 | |
US8082442B2 (en) | Securely sharing applications installed by unprivileged users | |
CN109313677B (zh) | 用于动态可执行验证的方法和装置 | |
CN111179086B (zh) | 一种基于WebAssembly的智能合约虚拟机 | |
DE69901424D1 (de) | Rechnerdatei-integritätsprüfung | |
RU2007138019A (ru) | Безопасная загрузка | |
CN107092518A (zh) | 一种保护拟态防御系统软件层安全的编译方法 | |
ATE522875T1 (de) | Identifizierung von textpassagen | |
TW201721497A (zh) | 用以檢測運作時期所產生碼中之惡意碼的系統及方法 | |
JP5945313B2 (ja) | 構造体を生成する方法および対応する構造体 | |
KR20170087887A (ko) | 애플리케이션 무결성의 검증을 제공하는 방법 및 디바이스 | |
CN109753788B (zh) | 内核运行时的完整性校验方法及计算机可读存储介质 | |
KR101482700B1 (ko) | 해시를 이용한 프로그램의 무결성 검증 방법 | |
Vasilakis et al. | Towards fine-grained, automated application compartmentalization | |
US10261784B1 (en) | Detecting copied computer code using cryptographically hashed overlapping shingles | |
Qiao et al. | Fast reused function retrieval method based on simhash and inverted index | |
Lanet et al. | Memory forensics of a java card dump | |
JP2009129128A (ja) | プログラム変換プログラム,処理方法,および処理装置 | |
GB2628724A (en) | Secure software compilation and software verification | |
JP2015049785A (ja) | プログラム処理装置 | |
Stewart | DLL Side-Loading: A Thorn in the Side of the Anti-Virus (AV) Industry | |
Allen | Source Code Isn’t |