DK1257892T3 - Adgangskontrol til en ressource ved hjælp af et program, der anvender en digital signatur - Google Patents
Adgangskontrol til en ressource ved hjælp af et program, der anvender en digital signaturInfo
- Publication number
- DK1257892T3 DK1257892T3 DK01905927T DK01905927T DK1257892T3 DK 1257892 T3 DK1257892 T3 DK 1257892T3 DK 01905927 T DK01905927 T DK 01905927T DK 01905927 T DK01905927 T DK 01905927T DK 1257892 T3 DK1257892 T3 DK 1257892T3
- Authority
- DK
- Denmark
- Prior art keywords
- resource
- program
- access control
- digital signature
- execution engine
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
- Communication Control (AREA)
- Electrophonic Musical Instruments (AREA)
- Circuits Of Receivers In General (AREA)
- Iron Core Of Rotating Electric Machines (AREA)
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
GBGB0003920.6A GB0003920D0 (en) | 2000-02-21 | 2000-02-21 | Computer system |
PCT/GB2001/000688 WO2001063385A1 (en) | 2000-02-21 | 2001-02-20 | Controlling access to a resource by a program using a digital signature |
Publications (1)
Publication Number | Publication Date |
---|---|
DK1257892T3 true DK1257892T3 (da) | 2009-08-17 |
Family
ID=9885992
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
DK01905927T DK1257892T3 (da) | 2000-02-21 | 2001-02-20 | Adgangskontrol til en ressource ved hjælp af et program, der anvender en digital signatur |
Country Status (17)
Country | Link |
---|---|
US (1) | US7900239B2 (da) |
EP (1) | EP1257892B1 (da) |
JP (1) | JP2003524252A (da) |
AT (1) | ATE429672T1 (da) |
AU (1) | AU3389201A (da) |
CA (1) | CA2400940C (da) |
CY (1) | CY1109239T1 (da) |
CZ (1) | CZ20022659A3 (da) |
DE (1) | DE60138455D1 (da) |
DK (1) | DK1257892T3 (da) |
ES (1) | ES2323524T3 (da) |
GB (1) | GB0003920D0 (da) |
HU (1) | HUP0204161A2 (da) |
NO (1) | NO20023964L (da) |
PL (1) | PL356340A1 (da) |
PT (1) | PT1257892E (da) |
WO (1) | WO2001063385A1 (da) |
Families Citing this family (63)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2002065693A2 (en) * | 2001-02-14 | 2002-08-22 | Scientific Generics Limited | Cryptographic key generation apparatus and method |
GB0113255D0 (en) | 2001-05-31 | 2001-07-25 | Scient Generics Ltd | Number generator |
US7882555B2 (en) * | 2001-03-16 | 2011-02-01 | Kavado, Inc. | Application layer security method and system |
US7328337B2 (en) | 2001-05-25 | 2008-02-05 | America Online, Incorporated | Trust grant and revocation from a master key to secondary keys |
NO316489B1 (no) | 2001-10-01 | 2004-01-26 | Genkey As | System, b¶rbar anordning og fremgangsmåte for digital autentisering, kryptering og signering ved generering av flyktige, men konsistente ogrepeterbare kryptonökler |
US20030079134A1 (en) * | 2001-10-23 | 2003-04-24 | Xerox Corporation | Method of secure print-by-reference |
US7627753B2 (en) * | 2002-03-19 | 2009-12-01 | Microsoft Corporation | Secure digital data format and code enforced policy |
IL149583A0 (en) | 2002-05-09 | 2003-07-06 | Kavado Israel Ltd | Method for automatic setting and updating of a security policy |
EP1520369B1 (en) | 2002-05-31 | 2006-10-18 | Scientific Generics Limited | Biometric authentication system |
US7512975B2 (en) | 2002-08-16 | 2009-03-31 | Intel Corporation | Hardware-assisted credential validation |
US7546452B2 (en) | 2002-08-20 | 2009-06-09 | Intel Corporation | Hardware-based credential management |
GB0304663D0 (en) * | 2003-02-28 | 2003-04-02 | Ncipher Corp Ltd | A method and system of securely enforcing a computer policy |
US7328340B2 (en) * | 2003-06-27 | 2008-02-05 | Intel Corporation | Methods and apparatus to provide secure firmware storage and service access |
US7464270B2 (en) * | 2003-07-23 | 2008-12-09 | Microsoft Corporation | Application identification and license enforcement |
US7103779B2 (en) * | 2003-09-18 | 2006-09-05 | Apple Computer, Inc. | Method and apparatus for incremental code signing |
US7517036B2 (en) * | 2004-05-27 | 2009-04-14 | Silverbrook Research Pty Ltd | Printhead module capable of printing a maximum of n channels of print data |
US7549718B2 (en) * | 2004-05-27 | 2009-06-23 | Silverbrook Research Pty Ltd | Printhead module having operation controllable on basis of thermal sensors |
US7290852B2 (en) * | 2004-05-27 | 2007-11-06 | Silverbrook Research Pty Ltd | Printhead module having a dropped row |
US7427117B2 (en) * | 2004-05-27 | 2008-09-23 | Silverbrook Research Pty Ltd | Method of expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group |
US7607757B2 (en) * | 2004-05-27 | 2009-10-27 | Silverbrook Research Pty Ltd | Printer controller for supplying dot data to at least one printhead module having faulty nozzle |
US20060294312A1 (en) * | 2004-05-27 | 2006-12-28 | Silverbrook Research Pty Ltd | Generation sequences |
US7448707B2 (en) * | 2004-05-27 | 2008-11-11 | Silverbrook Research Pty Ltd | Method of expelling ink from nozzels in groups, starting at outside nozzels of each group |
US7377609B2 (en) * | 2004-05-27 | 2008-05-27 | Silverbrook Research Pty Ltd | Printer controller for at least partially compensating for erroneous rotational displacement |
US7281777B2 (en) * | 2004-05-27 | 2007-10-16 | Silverbrook Research Pty Ltd | Printhead module having a communication input for data and control |
US7266661B2 (en) * | 2004-05-27 | 2007-09-04 | Silverbrook Research Pty Ltd | Method of storing bit-pattern in plural devices |
US7374266B2 (en) * | 2004-05-27 | 2008-05-20 | Silverbrook Research Pty Ltd | Method for at least partially compensating for errors in ink dot placement due to erroneous rotational displacement |
US7631190B2 (en) * | 2004-05-27 | 2009-12-08 | Silverbrook Research Pty Ltd | Use of variant and base keys with two entities |
US7243193B2 (en) * | 2004-05-27 | 2007-07-10 | Silverbrook Research Pty Ltd | Storage of program code in arbitrary locations in memory |
US20060004829A1 (en) * | 2004-05-27 | 2006-01-05 | Silverbrook Research Pty Ltd | Rolling keys |
US7600843B2 (en) * | 2004-05-27 | 2009-10-13 | Silverbrook Research Pty Ltd | Printer controller for controlling a printhead module based on thermal sensing |
US20070083491A1 (en) * | 2004-05-27 | 2007-04-12 | Silverbrook Research Pty Ltd | Storage of key in non-volatile memory |
US7484831B2 (en) * | 2004-05-27 | 2009-02-03 | Silverbrook Research Pty Ltd | Printhead module having horizontally grouped firing order |
US7188928B2 (en) * | 2004-05-27 | 2007-03-13 | Silverbrook Research Pty Ltd | Printer comprising two uneven printhead modules and at least two printer controllers, one of which sends print data to both of the printhead modules |
US8011747B2 (en) * | 2004-05-27 | 2011-09-06 | Silverbrook Research Pty Ltd | Printer controller for controlling a printhead with horizontally grouped firing order |
US7735944B2 (en) * | 2004-05-27 | 2010-06-15 | Silverbrook Research Pty Ltd | Printer comprising two printhead modules and at least two printer controllers |
US7557941B2 (en) * | 2004-05-27 | 2009-07-07 | Silverbrook Research Pty Ltd | Use of variant and base keys with three or more entities |
US7314261B2 (en) * | 2004-05-27 | 2008-01-01 | Silverbrook Research Pty Ltd | Printhead module for expelling ink from nozzles in groups, alternately, starting at outside nozzles of each group |
US7328956B2 (en) * | 2004-05-27 | 2008-02-12 | Silverbrook Research Pty Ltd | Printer comprising a printhead and at least two printer controllers connected to a common input of the printhead |
US7390071B2 (en) * | 2004-05-27 | 2008-06-24 | Silverbrook Research Pty Ltd | Printer controller for supplying data to a printhead module having a dropped row |
GB0413034D0 (en) | 2004-06-10 | 2004-07-14 | Scient Generics Ltd | Secure workflow engine |
US8499337B1 (en) * | 2004-10-06 | 2013-07-30 | Mcafee, Inc. | Systems and methods for delegation and notification of administration of internet access |
JP2006221629A (ja) * | 2005-02-07 | 2006-08-24 | Sony Computer Entertainment Inc | プロセッサのリソース管理によるコンテンツ制御方法および装置 |
US7908483B2 (en) * | 2005-06-30 | 2011-03-15 | Intel Corporation | Method and apparatus for binding TPM keys to execution entities |
WO2007016787A2 (en) | 2005-08-09 | 2007-02-15 | Nexsan Technologies Canada Inc. | Data archiving system |
US8364965B2 (en) | 2006-03-15 | 2013-01-29 | Apple Inc. | Optimized integrity verification procedures |
US8375458B2 (en) | 2007-01-05 | 2013-02-12 | Apple Inc. | System and method for authenticating code executing on computer system |
US9246687B2 (en) * | 2007-02-28 | 2016-01-26 | Broadcom Corporation | Method for authorizing and authenticating data |
EP2096569B1 (en) * | 2008-02-29 | 2012-04-18 | Research In Motion Limited | System and method for shared resource owner based access control |
US8341715B2 (en) | 2008-02-29 | 2012-12-25 | Research In Motion Limited | System and method for shared resource owner based access control |
EP2250604B1 (en) | 2008-03-04 | 2017-12-27 | Apple Inc. | System and method of authorizing execution of software code based on at least one installed profile |
US7940543B2 (en) * | 2008-03-19 | 2011-05-10 | Nanya Technology Corp. | Low power synchronous memory command address scheme |
US20100262963A1 (en) * | 2009-04-09 | 2010-10-14 | Gary Michael Wassermann | Systems and methods for activating a network appliance |
DE102009058516A1 (de) * | 2009-12-16 | 2011-06-22 | Siemens Aktiengesellschaft, 80333 | Vorrichtung und Verfahren zum Gewähren von Zugriffsrechten auf eine Wartungsfunktionalität |
CN102812473A (zh) * | 2010-02-11 | 2012-12-05 | 惠普发展公司,有限责任合伙企业 | 基于可执行程序身份的文件访问 |
US20110314293A1 (en) * | 2010-06-17 | 2011-12-22 | Yu Chun-Ta | Method of Handling a Server Delegation and Related Communication Device |
US8631460B2 (en) * | 2011-03-23 | 2014-01-14 | CipherPoint Software, Inc. | Systems and methods for implementing transparent encryption |
US8990266B2 (en) | 2011-10-18 | 2015-03-24 | CipherPoint Software, Inc. | Dynamic data transformations for network transmissions |
JP4941611B2 (ja) * | 2011-11-21 | 2012-05-30 | ソニー株式会社 | 情報処理装置、および方法、並びにコンピュータ・プログラム |
US8844026B2 (en) | 2012-06-01 | 2014-09-23 | Blackberry Limited | System and method for controlling access to secure resources |
US9058493B1 (en) * | 2013-01-16 | 2015-06-16 | Amdocs Software Systems Limited | System, method, and computer program for conditionally implementing protected content |
KR102376196B1 (ko) | 2016-09-02 | 2022-03-18 | 아싸 아브로이 에이비 | 접근을 제어하기 위한 열쇠 위임 |
US11263840B2 (en) | 2017-02-24 | 2022-03-01 | Assa Abloy Ab | Delegation and auxiliary condition for physical access |
US10819586B2 (en) * | 2018-10-17 | 2020-10-27 | Servicenow, Inc. | Functional discovery and mapping of serverless resources |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
AU662805B2 (en) * | 1992-04-06 | 1995-09-14 | Addison M. Fischer | A method for processing information among computers which may exchange messages |
ES2184066T3 (es) | 1996-10-25 | 2003-04-01 | Schlumberger Systems & Service | Uso de un lenguaje de programacion de alto nivel con microcontrolador. |
US6138235A (en) * | 1998-06-29 | 2000-10-24 | Sun Microsystems, Inc. | Controlling access to services between modular applications |
EP1163566A1 (en) * | 1999-03-08 | 2001-12-19 | Spyrus, Inc. | Method and system for enforcing access to a computing resource using a licensing certificate |
-
2000
- 2000-02-21 GB GBGB0003920.6A patent/GB0003920D0/en not_active Ceased
-
2001
- 2001-02-20 EP EP01905927A patent/EP1257892B1/en not_active Expired - Lifetime
- 2001-02-20 AT AT01905927T patent/ATE429672T1/de active
- 2001-02-20 DK DK01905927T patent/DK1257892T3/da active
- 2001-02-20 JP JP2001562284A patent/JP2003524252A/ja active Pending
- 2001-02-20 AU AU33892/01A patent/AU3389201A/en not_active Abandoned
- 2001-02-20 CZ CZ20022659A patent/CZ20022659A3/cs unknown
- 2001-02-20 ES ES01905927T patent/ES2323524T3/es not_active Expired - Lifetime
- 2001-02-20 PT PT01905927T patent/PT1257892E/pt unknown
- 2001-02-20 CA CA002400940A patent/CA2400940C/en not_active Expired - Lifetime
- 2001-02-20 PL PL01356340A patent/PL356340A1/xx unknown
- 2001-02-20 US US10/204,645 patent/US7900239B2/en not_active Expired - Lifetime
- 2001-02-20 HU HU0204161A patent/HUP0204161A2/hu unknown
- 2001-02-20 WO PCT/GB2001/000688 patent/WO2001063385A1/en not_active Application Discontinuation
- 2001-02-20 DE DE60138455T patent/DE60138455D1/de not_active Expired - Lifetime
-
2002
- 2002-08-20 NO NO20023964A patent/NO20023964L/no not_active Application Discontinuation
-
2009
- 2009-07-20 CY CY20091100770T patent/CY1109239T1/el unknown
Also Published As
Publication number | Publication date |
---|---|
CA2400940C (en) | 2009-09-01 |
GB0003920D0 (en) | 2000-04-05 |
ATE429672T1 (de) | 2009-05-15 |
HUP0204161A2 (en) | 2003-05-28 |
CY1109239T1 (el) | 2014-07-02 |
PL356340A1 (en) | 2004-06-28 |
EP1257892A1 (en) | 2002-11-20 |
NO20023964L (no) | 2002-10-21 |
CA2400940A1 (en) | 2001-08-30 |
US20050005112A1 (en) | 2005-01-06 |
AU3389201A (en) | 2001-09-03 |
CZ20022659A3 (cs) | 2003-06-18 |
US7900239B2 (en) | 2011-03-01 |
PT1257892E (pt) | 2009-06-09 |
NO20023964D0 (no) | 2002-08-20 |
WO2001063385A1 (en) | 2001-08-30 |
JP2003524252A (ja) | 2003-08-12 |
DE60138455D1 (de) | 2009-06-04 |
EP1257892B1 (en) | 2009-04-22 |
ES2323524T3 (es) | 2009-07-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
DK1257892T3 (da) | Adgangskontrol til en ressource ved hjælp af et program, der anvender en digital signatur | |
TW200707251A (en) | A system and method for establishing and authorizing a security code | |
CN105184118B (zh) | 一种基于代码碎片化的Android应用程序加壳保护方法及装置 | |
ATE422125T1 (de) | Generierungs- und verifizierungsverfahren durch benutzung von time lock puzzle | |
WO2002033525A3 (en) | A method and system for detecting rogue software | |
Li et al. | Zipper stack: Shadow stacks without shadow | |
CN107092518A (zh) | 一种保护拟态防御系统软件层安全的编译方法 | |
TW200606717A (en) | Conditional instruction for a single instruction, multiple data execution engine | |
WO2006092383A3 (en) | Secure cell phone for atm transactions | |
MY149569A (en) | Improvements in resisting the spread of unwanted code and data | |
WO2007077362A3 (fr) | Procede d'authentification d'applications d'un systeme informatique | |
BRPI0702002A (pt) | terminal de comunicação móvel com tela sensìvel ao toque e método de entrada de informação usando o mesmo | |
MXPA05007150A (es) | Procesador de politicas y metodos y sistemas para la proteccion de los datos. | |
TW200731109A (en) | Secure execution environment by preventing execution of unauthorized boot loaders | |
GB2442172A (en) | Anti-hack protection to restrict installation of operating systems and other software | |
WO2008013826A3 (en) | User space virtualization system | |
WO2010077000A2 (ko) | 소프트웨어 분리 실행 방법, 장치 및 컴퓨터로 읽을 수 있는 기록매체 | |
WO2007004219A3 (en) | System, device and method of verifying that a code is executed by a processor | |
Tang et al. | Detecting permission over-claim of android applications with static and semantic analysis approach | |
Wu et al. | Rim: A method to defend from jit spraying attack | |
CN103226676A (zh) | 应用软件可信性的混合度量方法 | |
Lin et al. | Using TPM to improve boot security at BIOS layer | |
Lackner et al. | Countering type confusion and buffer overflow attacks on Java smart cards by data type sensitive obfuscation | |
ATE367691T1 (de) | Übergang von einer booleschen maskierung zu einer arithmetischen maskierung | |
Chu et al. | Research on offense and defense technology for iOS kernel security mechanism |