ES2738574T3 - Aislamiento de aplicaciones hospedadas por código de complemento - Google Patents

Aislamiento de aplicaciones hospedadas por código de complemento Download PDF

Info

Publication number
ES2738574T3
ES2738574T3 ES09836588T ES09836588T ES2738574T3 ES 2738574 T3 ES2738574 T3 ES 2738574T3 ES 09836588 T ES09836588 T ES 09836588T ES 09836588 T ES09836588 T ES 09836588T ES 2738574 T3 ES2738574 T3 ES 2738574T3
Authority
ES
Spain
Prior art keywords
application
hosted
host
browser
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
ES09836588T
Other languages
English (en)
Spanish (es)
Inventor
Sam George
Akhilesh Kaza
Michael R Harsh
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Microsoft Technology Licensing LLC
Original Assignee
Microsoft Technology Licensing LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing LLC filed Critical Microsoft Technology Licensing LLC
Application granted granted Critical
Publication of ES2738574T3 publication Critical patent/ES2738574T3/es
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a program unit and a register, e.g. for a simultaneous processing of several programs
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/12Use of codes for handling textual entities
    • G06F40/14Tree-structured documents
    • G06F40/143Markup, e.g. Standard Generalized Markup Language [SGML] or Document Type Definition [DTD]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)
ES09836588T 2008-12-09 2009-11-11 Aislamiento de aplicaciones hospedadas por código de complemento Active ES2738574T3 (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US12/330,528 US9594900B2 (en) 2008-12-09 2008-12-09 Isolating applications hosted by plug-in code
PCT/US2009/064034 WO2010077443A2 (en) 2008-12-09 2009-11-11 Isolating applications hosted by plug-in code

Publications (1)

Publication Number Publication Date
ES2738574T3 true ES2738574T3 (es) 2020-01-23

Family

ID=42232444

Family Applications (1)

Application Number Title Priority Date Filing Date
ES09836588T Active ES2738574T3 (es) 2008-12-09 2009-11-11 Aislamiento de aplicaciones hospedadas por código de complemento

Country Status (7)

Country Link
US (2) US9594900B2 (https=)
EP (1) EP2356582B1 (https=)
JP (1) JP6026108B2 (https=)
KR (1) KR101719378B1 (https=)
CN (1) CN102246157B (https=)
ES (1) ES2738574T3 (https=)
WO (1) WO2010077443A2 (https=)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8732794B2 (en) * 2007-08-13 2014-05-20 Trusteer Ltd. Browser plug-in firewall
US9081956B2 (en) * 2008-05-26 2015-07-14 Trusteer Ltd. Remote DOM access
AU2011201133B2 (en) * 2010-03-15 2014-07-17 Jasim George Schluter X/HTML support for silverlight applications
US20120102383A1 (en) * 2010-10-20 2012-04-26 Jerald Liu Creating, Sharing and Modifying Documents That Include Content and an Integrated Software Application
US8922564B2 (en) 2010-12-01 2014-12-30 Microsoft Corporation Controlling runtime execution from a host to conserve resources
US20120304283A1 (en) * 2011-05-27 2012-11-29 Microsoft Corporation Brokered item access for isolated applications
CN102209076B (zh) * 2011-06-03 2014-01-29 用友软件股份有限公司 服务端与客户端之间的交互方法和交互系统
US9329851B2 (en) 2011-09-09 2016-05-03 Microsoft Technology Licensing, Llc Browser-based discovery and application switching
WO2014078961A1 (en) 2012-11-21 2014-05-30 Roofoveryourhead Marketing Ltd A browser extension for the collection and distribution of data and methods of use thereof
JP6546100B2 (ja) * 2014-02-17 2019-07-17 富士通株式会社 サービス提供方法、サービス要求方法、情報処理装置、及び、クライアント装置
CN104007989A (zh) * 2014-05-21 2014-08-27 广州华多网络科技有限公司 信息交互的方法及装置
CN105335187B (zh) 2014-08-14 2019-12-13 阿里巴巴集团控股有限公司 一种应用的处理方法及装置
CN105718322B (zh) * 2014-11-30 2018-10-23 中国科学院沈阳自动化研究所 同一进程下多应用模块客户端的异常处理方法
JP6319175B2 (ja) * 2015-05-12 2018-05-09 コニカミノルタ株式会社 画像形成装置及びプログラム
JP6390510B2 (ja) * 2015-05-12 2018-09-19 コニカミノルタ株式会社 画像形成装置及びプログラム
CN106059999B (zh) * 2016-05-06 2021-03-23 腾讯科技(北京)有限公司 一种媒体文件的展示方法、客户端、插件及系统
US10089159B2 (en) 2016-11-03 2018-10-02 Microsoft Technology Licensing, Llc Processing non-spatial input by multiple program elements of a computer program executed on a computer
US10990427B2 (en) * 2019-04-03 2021-04-27 Sap Se Extension application mechanisms through intra-process operation systems
CN110597568B (zh) * 2019-08-30 2020-11-10 深圳市宏电技术股份有限公司 一种插件部署方法、系统及终端
US12067134B2 (en) 2022-02-22 2024-08-20 International Business Machines Corporation Secure data transfer via user-specific data containers
US12229247B1 (en) * 2022-03-31 2025-02-18 Amazon Technologies, Inc. Embedding insecure web applications in secure web pages

Family Cites Families (35)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3010A (en) * 1843-03-21 Iiziiiiijiiii
US2000A (en) * 1841-03-12 Improvement in the manufacture of starch
US6085224A (en) * 1997-03-11 2000-07-04 Intracept, Inc. Method and system for responding to hidden data and programs in a datastream
US5974549A (en) * 1997-03-27 1999-10-26 Soliton Ltd. Security monitor
US6253228B1 (en) * 1997-03-31 2001-06-26 Apple Computer, Inc. Method and apparatus for updating and synchronizing information between a client and a server
US6028605A (en) * 1998-02-03 2000-02-22 Documentum, Inc. Multi-dimensional analysis of objects by manipulating discovered semantic properties
US6289371B1 (en) 1998-09-30 2001-09-11 Hewlett-Packard Company Network scan server support method using a web browser
US6691230B1 (en) * 1998-10-15 2004-02-10 International Business Machines Corporation Method and system for extending Java applets sand box with public client storage
US7020843B2 (en) * 1999-11-30 2006-03-28 Uhc Llc Method and system for implementing a browser object container
US7475404B2 (en) * 2000-05-18 2009-01-06 Maquis Techtrix Llc System and method for implementing click-through for browser executed software including ad proxy and proxy cookie caching
US7039801B2 (en) * 2000-06-30 2006-05-02 Microsoft Corporation System and method for integrating secure and non-secure software objects
US20030120719A1 (en) * 2001-08-28 2003-06-26 Yepishin Dmitriy V. System, method and computer program product for a user agent for pattern replay
US20030079052A1 (en) * 2001-10-24 2003-04-24 Kushnirskiy Igor Davidovich Method and apparatus for a platform independent plug-in
US7051340B2 (en) * 2001-11-29 2006-05-23 Hewlett-Packard Development Company, L.P. System and method for isolating applications from each other
US7318238B2 (en) * 2002-01-14 2008-01-08 Microsoft Corporation Security settings for markup language elements
US7512977B2 (en) 2003-06-11 2009-03-31 Symantec Corporation Intrustion protection system utilizing layers
US7103914B2 (en) 2002-06-17 2006-09-05 Bae Systems Information Technology Llc Trusted computer system
US20040001099A1 (en) * 2002-06-27 2004-01-01 Microsoft Corporation Method and system for associating actions with semantic labels in electronic documents
CN100553506C (zh) * 2003-12-30 2009-10-28 郑昌珉 功能性压缩袜
CA2553780A1 (en) 2004-01-15 2005-12-08 Vir2Us, Inc. Isolated multiplexed multi-dimensional processing in a virtual processing space having virus, spyware, and hacker protection features
US7437721B2 (en) 2004-09-29 2008-10-14 Microsoft Corporation Isolating software deployment over a network from external malicious intrusion
US8849968B2 (en) 2005-06-20 2014-09-30 Microsoft Corporation Secure and stable hosting of third-party extensions to web services
US7747785B2 (en) * 2006-04-14 2010-06-29 Microsoft Corporation Instant messaging plug-ins
US20080148298A1 (en) 2006-12-18 2008-06-19 Palm, Inc. System and Methods for Providing Granular Security for Locally Running Scripted Environments and Web Applications
US8584147B2 (en) 2006-12-21 2013-11-12 Microsoft Corporation Managed execution environment for software application interfacing
US20080184135A1 (en) 2007-01-26 2008-07-31 Microsoft Corporation Web authoring plugin implementation
US20080209316A1 (en) * 2007-02-27 2008-08-28 Yahoo! Inc. System and method of implementing an extensible command-line interface
US8079039B2 (en) 2007-03-09 2011-12-13 Microsoft Corporation Isolating, managing and communicating with user interface elements
US20080295164A1 (en) * 2007-05-24 2008-11-27 International Business Machines Corporation Mashup component isolation via server-side analysis and instrumentation
US7856517B2 (en) * 2007-05-25 2010-12-21 Red Hat, Inc. Data management interface with configurable plugins that determines whether to monitor for configuration data
US9063765B2 (en) * 2008-04-28 2015-06-23 Kaazing Corporation System and methods for distributed execution of computer executable programs utilizing asymmetric translation
WO2009139843A1 (en) * 2008-05-13 2009-11-19 Google Inc. Separate plug-in processes in browsers and applications thereof
WO2009152499A2 (en) * 2008-06-13 2009-12-17 Skribel, Inc. Methods and systems for handling annotations and using calculation of addresses in tree-based structures
US20100146523A1 (en) * 2008-12-05 2010-06-10 Tripod Ventures Inc./ Entreprises Tripod Inc. Browser environment application and local file server application system
CN101876897A (zh) * 2009-04-30 2010-11-03 国际商业机器公司 用于在Web浏览器上处理Widget的系统和方法

Also Published As

Publication number Publication date
CN102246157A (zh) 2011-11-16
WO2010077443A3 (en) 2010-08-26
EP2356582A4 (en) 2012-09-19
US9594900B2 (en) 2017-03-14
EP2356582A2 (en) 2011-08-17
JP6026108B2 (ja) 2016-11-16
KR101719378B1 (ko) 2017-03-23
US20170185769A1 (en) 2017-06-29
WO2010077443A2 (en) 2010-07-08
US20100146379A1 (en) 2010-06-10
EP2356582B1 (en) 2019-06-19
JP2012511776A (ja) 2012-05-24
CN102246157B (zh) 2013-05-01
KR20110098735A (ko) 2011-09-01
US10242181B2 (en) 2019-03-26

Similar Documents

Publication Publication Date Title
ES2738574T3 (es) Aislamiento de aplicaciones hospedadas por código de complemento
Merseedi A comprehensive study of kernel (issues and concepts) in different operating systems
US12021892B2 (en) Managed software remediation
US8352967B2 (en) Safe browser plugins using native code modules
US8272048B2 (en) Restriction of program process capabilities
US10824716B2 (en) Executing native-code applications in a browser
US20170090929A1 (en) Hardware-assisted software verification and secure execution
Rosenthal Emulation & virtualization as preservation strategies
JP2012074071A (ja) 階層化された仮想化アーキテクチャにおける仮想化イベント処理
US20050166064A1 (en) Trusted user interface for a secure mobile wireless device
CN105574411A (zh) 一种动态脱壳方法、装置和设备
WO2008112385A1 (en) Isolating, managing and communicating with user interface elements
KR102226218B1 (ko) 크로스플랫폼 개발 프레임워크로 제작된 애플리케이션을 식별하기 위한 특징정보 추출 장치 및 방법
Davidson et al. Secure integration of web content and applications on commodity mobile operating systems
US7591021B2 (en) Object model document for obfuscating object model therein
Šilić et al. Security vulnerabilities in modern web browser architecture
CN102467632A (zh) 一种浏览器隔离使用的方法
US9917922B2 (en) Extensibility bundles for a cloud and devices suite
Bodden et al. Reducing human factors in software security architectures
Walfish Treehouse: Javascript sandboxes to help web developers help themselves
US20250383997A1 (en) Memory access locking and logging for trusted execution environments
Allen Windows Vista Application Development Requirements for User Account Control Compatibility
Geater ARM® TrustZone®
Estrela Android Security by Introspection
Huynh et al. Alternate Versions of the Three Dimensional Wind Field (3DWF) Graphical User Interface (GUI) with and without Using Internet Explorer's ActiveX Controls