HK1172415A1 - 提供安全邊界的方法 - Google Patents
提供安全邊界的方法Info
- Publication number
- HK1172415A1 HK1172415A1 HK12113197.0A HK12113197A HK1172415A1 HK 1172415 A1 HK1172415 A1 HK 1172415A1 HK 12113197 A HK12113197 A HK 12113197A HK 1172415 A1 HK1172415 A1 HK 1172415A1
- Authority
- HK
- Hong Kong
- Prior art keywords
- providing
- security boundary
- boundary
- security
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/74—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information operating in dual or compartmented mode, i.e. at least one secure mode
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/53—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Mathematical Physics (AREA)
- Automation & Control Theory (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Stored Programmes (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US12/973,907 US9003543B2 (en) | 2010-12-21 | 2010-12-21 | Providing a security boundary |
Publications (1)
Publication Number | Publication Date |
---|---|
HK1172415A1 true HK1172415A1 (zh) | 2013-04-19 |
Family
ID=46236300
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
HK12113197.0A HK1172415A1 (zh) | 2010-12-21 | 2012-12-20 | 提供安全邊界的方法 |
Country Status (7)
Country | Link |
---|---|
US (1) | US9003543B2 (zh) |
EP (1) | EP2656271B1 (zh) |
JP (1) | JP5922149B2 (zh) |
CN (1) | CN102592077B (zh) |
HK (1) | HK1172415A1 (zh) |
TW (1) | TWI554879B (zh) |
WO (1) | WO2012088109A2 (zh) |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8667399B1 (en) * | 2010-12-29 | 2014-03-04 | Amazon Technologies, Inc. | Cost tracking for virtual control planes |
WO2012098554A1 (en) * | 2011-01-17 | 2012-07-26 | Infosys Technologies Limited | Method and system for preemptive detection of occurrence of faulty conditions based on resource usage |
US8688734B1 (en) | 2011-02-04 | 2014-04-01 | hopTo Inc. | System for and methods of controlling user access and/or visibility to directories and files of a computer |
US20140090019A1 (en) * | 2011-05-19 | 2014-03-27 | Nippon Hoso Kyokai | Integrated broadcasting communications receiver, resource access controlling program, and integrated broadcasting communications system |
WO2013001332A1 (en) * | 2011-06-27 | 2013-01-03 | Nokia Corporation | System, method and apparatus for facilitating resource security |
US9419848B1 (en) | 2012-05-25 | 2016-08-16 | hopTo Inc. | System for and method of providing a document sharing service in combination with remote access to document applications |
US8856907B1 (en) | 2012-05-25 | 2014-10-07 | hopTo Inc. | System for and methods of providing single sign-on (SSO) capability in an application publishing and/or document sharing environment |
US8713658B1 (en) | 2012-05-25 | 2014-04-29 | Graphon Corporation | System for and method of providing single sign-on (SSO) capability in an application publishing environment |
CN102750493B (zh) * | 2012-06-26 | 2016-01-06 | 华为终端有限公司 | 访问权限控制方法、装置及系统 |
US9239812B1 (en) | 2012-08-08 | 2016-01-19 | hopTo Inc. | System for and method of providing a universal I/O command translation framework in an application publishing environment |
CN102819715A (zh) * | 2012-08-15 | 2012-12-12 | 腾讯科技(深圳)有限公司 | Api监控方法和装置 |
US8990942B2 (en) | 2013-02-18 | 2015-03-24 | Wipro Limited | Methods and systems for API-level intrusion detection |
CN104166820B (zh) * | 2013-05-16 | 2017-09-29 | 北京畅游天下网络技术有限公司 | 一种数据管理方法和系统 |
CN103310149B (zh) * | 2013-05-27 | 2018-06-26 | 华为终端(东莞)有限公司 | 系统功能调用的方法、装置及终端 |
WO2015065398A1 (en) * | 2013-10-30 | 2015-05-07 | Hewlett-Packard Development Company, L.P. | Application programable interface (api) discovery |
US9258315B2 (en) * | 2014-01-13 | 2016-02-09 | Cisco Technology, Inc. | Dynamic filtering for SDN API calls across a security boundary |
US9971582B2 (en) * | 2015-06-23 | 2018-05-15 | Ca, Inc. | Selecting application wrapper logic components based on features of a mobile application to be wrapped |
CN106326764A (zh) * | 2015-06-30 | 2017-01-11 | 西安中兴新软件有限责任公司 | 一种信息安全管理方法和装置 |
JP6516870B2 (ja) | 2016-02-09 | 2019-05-22 | シーメンス アクチエンゲゼルシヤフトSiemens Aktiengesellschaft | プログラム命令を安全に実行する方法及び該方法用プログラム |
GB2552966B (en) | 2016-08-15 | 2019-12-11 | Arm Ip Ltd | Methods and apparatus for protecting domains of a device from unauthorised accesses |
US10360082B2 (en) * | 2017-01-19 | 2019-07-23 | International Business Machines Corporation | Analysis of application programming interface usage for improving a computer system |
US11507653B2 (en) * | 2018-08-21 | 2022-11-22 | Vmware, Inc. | Computer whitelist update service |
KR20210026233A (ko) | 2019-08-29 | 2021-03-10 | 삼성전자주식회사 | 디바이스 리소스에 대한 접근을 제어하기 위한 전자 장치 및 그의 동작 방법 |
US11184454B1 (en) * | 2020-12-21 | 2021-11-23 | Coupang Corp. | Systems and methods for managing perpetual data requests to conserve resources |
WO2023141014A1 (en) * | 2022-01-18 | 2023-07-27 | Cisco Technology, Inc. | Detecting broken object level and function level authorization issues with api services |
Family Cites Families (29)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US5974549A (en) * | 1997-03-27 | 1999-10-26 | Soliton Ltd. | Security monitor |
US6970081B1 (en) * | 1998-09-17 | 2005-11-29 | Koninklijke Philips Electronics N.V. | Distributed software controlled theft detection |
US7017188B1 (en) | 1998-11-16 | 2006-03-21 | Softricity, Inc. | Method and apparatus for secure content delivery over broadband access networks |
US6763370B1 (en) | 1998-11-16 | 2004-07-13 | Softricity, Inc. | Method and apparatus for content protection in a secure content delivery system |
US7225264B2 (en) | 1998-11-16 | 2007-05-29 | Softricity, Inc. | Systems and methods for delivering content over a computer network |
US6938096B1 (en) | 1999-04-12 | 2005-08-30 | Softricity, Inc. | Method and system for remote networking using port proxying by detecting if the designated port on a client computer is blocked, then encapsulating the communications in a different format and redirecting to an open port |
US7200632B1 (en) | 1999-04-12 | 2007-04-03 | Softricity, Inc. | Method and system for serving software applications to client computers |
US7730169B1 (en) | 1999-04-12 | 2010-06-01 | Softricity, Inc. | Business method and system for serving third party software applications |
US7370071B2 (en) | 2000-03-17 | 2008-05-06 | Microsoft Corporation | Method for serving third party software applications from servers to client computers |
US6711686B1 (en) * | 1999-06-29 | 2004-03-23 | Dell Usa L.P. | Security management tool for managing security attributes in computer systems |
US7320141B2 (en) * | 2001-03-21 | 2008-01-15 | International Business Machines Corporation | Method and system for server support for pluggable authorization systems |
US7028305B2 (en) | 2001-05-16 | 2006-04-11 | Softricity, Inc. | Operating system abstraction and protection layer |
US7590743B2 (en) | 2003-12-23 | 2009-09-15 | Softricity, Inc. | Method and system for associating a process on a multi-user device with a host address unique to a user session associated with the process |
EP1779245B1 (en) | 2004-07-20 | 2018-06-13 | Microsoft Technology Licensing, LLC | Method and system for minimizing loss in a computer application |
FR2881854B1 (fr) | 2005-02-04 | 2008-01-11 | Radiotelephone Sfr | Procede de gestion securisee de l'execution d'une application |
JP4628149B2 (ja) * | 2005-03-14 | 2011-02-09 | 株式会社エヌ・ティ・ティ・ドコモ | アクセス制御装置及びアクセス制御方法 |
JP4849941B2 (ja) * | 2006-04-12 | 2012-01-11 | 株式会社エヌ・ティ・ティ・ドコモ | ソフトウェア動作モデル化装置 |
JP2007286905A (ja) * | 2006-04-17 | 2007-11-01 | Nec System Technologies Ltd | 情報処理端末装置、ファイル流出防止方法およびファイル流出防止プログラム |
US20070294699A1 (en) | 2006-06-16 | 2007-12-20 | Microsoft Corporation | Conditionally reserving resources in an operating system |
KR100843701B1 (ko) | 2006-11-07 | 2008-07-04 | 소프트캠프(주) | 콜 스택에 기록된 정보를 이용한 에이피아이 확인방법 |
JP4473256B2 (ja) * | 2006-12-27 | 2010-06-02 | インターナショナル・ビジネス・マシーンズ・コーポレーション | アプリケーションプログラムによるリソースアクセスを制御するための情報処理装置、方法、及びプログラム |
US8291227B2 (en) * | 2007-02-02 | 2012-10-16 | Red Hat, Inc. | Method and apparatus for secure communication |
JP2009048359A (ja) * | 2007-08-17 | 2009-03-05 | System Integrate Co Ltd | 情報処理装置の監視・管理システム |
WO2009102006A1 (ja) * | 2008-02-14 | 2009-08-20 | Nec Corporation | アクセス制御装置、その方法及び情報記録媒体 |
US8196175B2 (en) | 2008-03-05 | 2012-06-05 | Microsoft Corporation | Self-describing authorization policy for accessing cloud-based resources |
US8510805B2 (en) * | 2008-04-23 | 2013-08-13 | Samsung Electronics Co., Ltd. | Safe and efficient access control mechanisms for computing environments |
KR100951852B1 (ko) | 2008-06-17 | 2010-04-12 | 한국전자통신연구원 | 응용 프로그램 비정상행위 차단 장치 및 방법 |
JP4653230B2 (ja) | 2008-09-22 | 2011-03-16 | 株式会社エヌ・ティ・ティ・ドコモ | Api検査装置及び状態監視装置 |
EP2194456A1 (en) * | 2008-12-05 | 2010-06-09 | NTT DoCoMo, Inc. | Method and apparatus for performing a file operation |
-
2010
- 2010-12-21 US US12/973,907 patent/US9003543B2/en active Active
-
2011
- 2011-11-11 TW TW100141289A patent/TWI554879B/zh not_active IP Right Cessation
- 2011-12-20 JP JP2013546326A patent/JP5922149B2/ja active Active
- 2011-12-20 WO PCT/US2011/066153 patent/WO2012088109A2/en unknown
- 2011-12-20 EP EP11850186.5A patent/EP2656271B1/en active Active
- 2011-12-20 CN CN201110430834.2A patent/CN102592077B/zh active Active
-
2012
- 2012-12-20 HK HK12113197.0A patent/HK1172415A1/zh not_active IP Right Cessation
Also Published As
Publication number | Publication date |
---|---|
WO2012088109A2 (en) | 2012-06-28 |
WO2012088109A3 (en) | 2012-09-27 |
US20120159570A1 (en) | 2012-06-21 |
EP2656271A4 (en) | 2017-06-28 |
US9003543B2 (en) | 2015-04-07 |
CN102592077A (zh) | 2012-07-18 |
TW201227285A (en) | 2012-07-01 |
JP5922149B2 (ja) | 2016-05-24 |
EP2656271B1 (en) | 2018-09-05 |
TWI554879B (zh) | 2016-10-21 |
EP2656271A2 (en) | 2013-10-30 |
CN102592077B (zh) | 2014-11-19 |
JP2014501409A (ja) | 2014-01-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
HK1172415A1 (zh) | 提供安全邊界的方法 | |
GB201001833D0 (en) | Method | |
PL2722378T3 (pl) | Sposób kruszenia lub szczelinowania odwiertu | |
GB201010439D0 (en) | A method | |
GB201007353D0 (en) | Method | |
GB201007354D0 (en) | Method | |
GB201011513D0 (en) | Method | |
GB201004759D0 (en) | Method | |
GB201012148D0 (en) | Method | |
HUE037376T2 (hu) | Töltõállomás és eljárás egy töltõállomás biztosításához | |
GB201006306D0 (en) | Method | |
ZA201104839B (en) | Method for preparing a ketone | |
GB201010855D0 (en) | Method | |
ZA201300700B (en) | A brewing method | |
GB2479370A9 (en) | A security apparatus | |
GB201012784D0 (en) | Method | |
GB201007207D0 (en) | Method | |
GB201017003D0 (en) | Method | |
GB201007522D0 (en) | Method | |
GB201019203D0 (en) | A method | |
IL212026A0 (en) | A lock and method therefor | |
GB201105395D0 (en) | A method | |
HK1146192A2 (en) | A distance acquiring method | |
PL2492108T3 (pl) | Sposób wykonywania okładek | |
GB201216726D0 (en) | A method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PC | Patent ceased (i.e. patent has lapsed due to the failure to pay the renewal fee) |
Effective date: 20191223 |