DE102013104053A1 - Sicherheitssystem und -verfahren zur Kontrolle und zur Steuerung der Interaktionen zwischen Komponenten eines Computersystems - Google Patents

Sicherheitssystem und -verfahren zur Kontrolle und zur Steuerung der Interaktionen zwischen Komponenten eines Computersystems Download PDF

Info

Publication number
DE102013104053A1
DE102013104053A1 DE102013104053A DE102013104053A DE102013104053A1 DE 102013104053 A1 DE102013104053 A1 DE 102013104053A1 DE 102013104053 A DE102013104053 A DE 102013104053A DE 102013104053 A DE102013104053 A DE 102013104053A DE 102013104053 A1 DE102013104053 A1 DE 102013104053A1
Authority
DE
Germany
Prior art keywords
component
interaction
components
level
source
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
DE102013104053A
Other languages
German (de)
English (en)
Inventor
Christopher James SLYFIELD
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GE Aviation Systems Ltd
Original Assignee
GE Aviation Systems Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GE Aviation Systems Ltd filed Critical GE Aviation Systems Ltd
Publication of DE102013104053A1 publication Critical patent/DE102013104053A1/de
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6281Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database at program execution time, where the protection is within the operating system
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/629Protecting access to data via a platform, e.g. using keys or access control rules to features or functions of an application
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Automation & Control Theory (AREA)
  • Signal Processing (AREA)
  • Mathematical Physics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Storage Device Security (AREA)
  • Hardware Redundancy (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
DE102013104053A 2012-04-27 2013-04-22 Sicherheitssystem und -verfahren zur Kontrolle und zur Steuerung der Interaktionen zwischen Komponenten eines Computersystems Pending DE102013104053A1 (de)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1207404.3 2012-04-27
GBGB1207404.3A GB201207404D0 (en) 2012-04-27 2012-04-27 Security system and method for controlling interactions between components of a computer system

Publications (1)

Publication Number Publication Date
DE102013104053A1 true DE102013104053A1 (de) 2013-10-31

Family

ID=46330457

Family Applications (1)

Application Number Title Priority Date Filing Date
DE102013104053A Pending DE102013104053A1 (de) 2012-04-27 2013-04-22 Sicherheitssystem und -verfahren zur Kontrolle und zur Steuerung der Interaktionen zwischen Komponenten eines Computersystems

Country Status (8)

Country Link
US (1) US9122883B2 (https=)
JP (1) JP6183889B2 (https=)
CN (1) CN103377337A (https=)
BR (1) BR102013009890A2 (https=)
CA (1) CA2813425C (https=)
DE (1) DE102013104053A1 (https=)
FR (1) FR2990037B1 (https=)
GB (2) GB201207404D0 (https=)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2013204965B2 (en) 2012-11-12 2016-07-28 C2 Systems Limited A system, method, computer program and data signal for the registration, monitoring and control of machines and devices
US9769192B2 (en) 2014-02-28 2017-09-19 Temporal Defense Systems, Llc Security evaluation systems and methods
US9887984B2 (en) 2014-10-24 2018-02-06 Temporal Defense Systems, Llc Autonomous system for secure electric system access
US10372946B1 (en) * 2016-10-17 2019-08-06 Altera Corporation Systems and methods for configuring a secure computing environment on an integrated circuit
CN112948824B (zh) * 2021-03-31 2022-04-26 支付宝(杭州)信息技术有限公司 一种基于隐私保护的程序通信方法、装置及设备
GB2624643A (en) * 2022-11-23 2024-05-29 Nchain Licensing Ag Communication protocol

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4184201A (en) 1978-04-26 1980-01-15 Sperry Rand Corporation Integrating processor element
CN1149476C (zh) * 1995-03-16 2004-05-12 松下电器产业株式会社 资源分配装置
US6934859B2 (en) 2000-06-09 2005-08-23 Northrop Grumman Corporation Authenticated search engines
JP3927376B2 (ja) * 2001-03-27 2007-06-06 日立ソフトウエアエンジニアリング株式会社 データ持ち出し禁止用プログラム
US20040139312A1 (en) * 2003-01-14 2004-07-15 General Instrument Corporation Categorization of host security levels based on functionality implemented inside secure hardware
JP4501156B2 (ja) * 2004-10-28 2010-07-14 日本電気株式会社 機密モードに応じたアクセスフォルダ切り替え方法、プログラム、及びコンピュータシステム
DE102005028663B4 (de) * 2005-06-15 2024-10-24 Volkswagen Ag Verfahren und Vorrichtung zum sicheren Kommunizieren einer Komponente eines Fahrzeugs über eine drahtlose Kommunikationsverbindung mit einem externen Kommunikationspartner
US20070143601A1 (en) 2005-12-15 2007-06-21 Arroyo Diana J System and method for authorizing information flows
FR2898445B1 (fr) * 2006-03-08 2008-11-14 Airbus France Sas Procede et dispositif de detection de tentatives d'intrusion sur une liaison de communication entre un aeronef et une station sol.
US8060744B2 (en) 2006-03-23 2011-11-15 Harris Corporation Computer architecture for an electronic device providing single-level secure access to multi-level secure file system
CN100539499C (zh) * 2006-06-02 2009-09-09 清华大学 一种安全的星形局域网计算机系统
US8826366B2 (en) * 2010-07-15 2014-09-02 Tt Government Solutions, Inc. Verifying access-control policies with arithmetic quantifier-free form constraints

Also Published As

Publication number Publication date
GB2503553B (en) 2014-07-16
BR102013009890A2 (pt) 2017-05-02
GB201207404D0 (en) 2012-06-13
JP6183889B2 (ja) 2017-08-23
FR2990037A1 (fr) 2013-11-01
GB2503553A (en) 2014-01-01
CA2813425C (en) 2020-07-14
GB201307621D0 (en) 2013-06-12
US20130291057A1 (en) 2013-10-31
CN103377337A (zh) 2013-10-30
CA2813425A1 (en) 2013-10-27
FR2990037B1 (fr) 2016-09-02
US9122883B2 (en) 2015-09-01
JP2013242860A (ja) 2013-12-05

Similar Documents

Publication Publication Date Title
DE102013104053A1 (de) Sicherheitssystem und -verfahren zur Kontrolle und zur Steuerung der Interaktionen zwischen Komponenten eines Computersystems
DE69530128T2 (de) Sicherheit für rechnerbetriebsmittel
DE69838378T2 (de) Verfahren und gerät um sicherheit, für server die anwenderprogramme ausführen, die über's netzwerk empfangen wurden, zu gewährleisten
US9992213B2 (en) Risk-adaptive access control of an application action based on threat detection data
DE602004011871T2 (de) Bereitstellung einer sicheren Eingabe an ein System mit einer Hochsicherheitsumgebung
DE102012210887B4 (de) Verfahren zum Einrichten einer sicher verwalteten Ausführungsumgebung für eine virtuelle Maschine und eine Computervorrichtung
DE112020000538T5 (de) Feinkörnige zugriffskontrolle auf token-grundlage
DE102020133597A1 (de) Personalprofile und fingerabdruckauthentifizierung für configuration engineering- und laufzeitanwendungen
DE102015112026A1 (de) Auf geringste Rechte basierende Sicherheitsarchitektur für Fertigungssteuerungssoftware
DE112012003988T5 (de) Schützen des Arbeitsspeichers eines virtuellen Gasts
DE112022003368T5 (de) Verschlüsselungsüberwachungsregister und -system
DE112018007217T5 (de) Sicherheitseinrichtung und eingebettete Einrichtung
DE102015208665A1 (de) Verfahren und System zum Implementieren eines sicheren Sperrbildschirms
DE102014116883A1 (de) Verfahren zum Zugreifen auf Funktionen eines Embedded-Geräts
DE60017438T2 (de) System zur betriebsmittelzugriffsteuerung
DE60211900T2 (de) Verfahren und vorrichtung zur bewahrung von sicherer dateneingabe und datenausgabe
WO2023094238A1 (de) Verfahren zur steuerung des zugriffs eines users auf ein netzwerk, netzwerk und computerprogramm
DE102004016654B4 (de) Netzwerksystem sowie Verfahren zur Steuerung eines Zugangs einer ersten Netzwerkkomponente zu wenigstens einer zweiten Netzwerkkomponente
DE102020209131A1 (de) Vorrichtung und Verfahren für eine optimal randomisierte Auswahl von Regeln zur Angriffserkennung in einem Kommunikationsnetzwerk
DE102023102565B4 (de) Verfahren zur Intrusions-Überwachung in einem Computernetzwerk sowie Kraftfahrzeug und Cloud Computing-Infrastruktur
EP2169588A1 (de) Verfahren zur Gewährleistung von Sicherheit
EP4510019A1 (de) Verfahren zum überprüfen eines zugriffs auf zugangsinformationen innerhalb einer laufzeitumgebung, sowie laufzeitumgebungs-system, computerprogramm und datenträger
EP4312137A1 (de) Berechtigung zu einem installieren und/oder einem starten eines zweiten anwendungsprogramms
DE202026100980U1 (de) System für Zero-Trust-Cloud-Sicherheit mit KI-Sicherheitsanalysen und kryptografischer Identitätssicherung
DE102023106449A1 (de) Sicherheitsbewertung eines Computersystems

Legal Events

Date Code Title Description
R012 Request for examination validly filed