IN2014CN03105A - - Google Patents

Info

Publication number
IN2014CN03105A
IN2014CN03105A IN3105CHN2014A IN2014CN03105A IN 2014CN03105 A IN2014CN03105 A IN 2014CN03105A IN 3105CHN2014 A IN3105CHN2014 A IN 3105CHN2014A IN 2014CN03105 A IN2014CN03105 A IN 2014CN03105A
Authority
IN
India
Prior art keywords
labels
code
allowed
javascript
values
Prior art date
Application number
Other languages
English (en)
Inventor
Christoph Kerschbaumer
Mohammad H Reshadi
Original Assignee
Qualcomm Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qualcomm Inc filed Critical Qualcomm Inc
Publication of IN2014CN03105A publication Critical patent/IN2014CN03105A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2113Multi-level security, e.g. mandatory access control
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S40/00Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
    • Y04S40/20Information technology specific aspects, e.g. CAD, simulation, modelling, system security

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Devices For Executing Special Programs (AREA)
  • Stored Programmes (AREA)
  • Computer And Data Communications (AREA)
  • Information Transfer Between Computers (AREA)
IN3105CHN2014 2011-11-07 2012-09-28 IN2014CN03105A (enrdf_load_stackoverflow)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201161556658P 2011-11-07 2011-11-07
US13/399,136 US8898780B2 (en) 2011-11-07 2012-02-17 Encoding labels in values to capture information flows
PCT/US2012/057682 WO2013070334A1 (en) 2011-11-07 2012-09-28 Encoding labels in values to capture information flows

Publications (1)

Publication Number Publication Date
IN2014CN03105A true IN2014CN03105A (enrdf_load_stackoverflow) 2015-07-03

Family

ID=48224691

Family Applications (1)

Application Number Title Priority Date Filing Date
IN3105CHN2014 IN2014CN03105A (enrdf_load_stackoverflow) 2011-11-07 2012-09-28

Country Status (9)

Country Link
US (1) US8898780B2 (enrdf_load_stackoverflow)
EP (1) EP2776970B1 (enrdf_load_stackoverflow)
JP (1) JP5707542B2 (enrdf_load_stackoverflow)
KR (1) KR101542335B1 (enrdf_load_stackoverflow)
CN (1) CN103975336B (enrdf_load_stackoverflow)
ES (1) ES2707866T3 (enrdf_load_stackoverflow)
HU (1) HUE041676T2 (enrdf_load_stackoverflow)
IN (1) IN2014CN03105A (enrdf_load_stackoverflow)
WO (1) WO2013070334A1 (enrdf_load_stackoverflow)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9171028B1 (en) * 2013-06-11 2015-10-27 Google Inc. Method of maintaining a large set of taint labels
WO2016024480A1 (ja) * 2014-08-11 2016-02-18 日本電信電話株式会社 ブラウザエミュレータ装置、構築装置、ブラウザエミュレート方法、ブラウザエミュレートプログラム、構築方法、および、構築プログラム
WO2017075546A1 (en) * 2015-10-28 2017-05-04 Hrl Laboratories, Llc System and method for maintaining security tags and reference counts for objects in computer memory
JP6472545B2 (ja) * 2016-01-27 2019-02-20 優太 竹田 処理システム、処理方法及びプログラム
US11403418B2 (en) * 2018-08-30 2022-08-02 Netskope, Inc. Enriching document metadata using contextual information
US10382518B2 (en) * 2016-03-22 2019-08-13 Google Llc Low latency applications using multiple servers
CN109213502B (zh) * 2017-06-30 2022-09-27 上海尚往网络科技有限公司 应用更新方法和装置
US11165704B2 (en) * 2019-04-30 2021-11-02 Ebay Inc. Adaptive encoding network
CN111770170B (zh) 2020-06-29 2023-04-07 北京百度网讯科技有限公司 请求处理方法、装置、设备和计算机存储介质
CN111949950A (zh) * 2020-08-20 2020-11-17 郑州昂视信息科技有限公司 一种应用软件的异构方法及系统
US11848949B2 (en) 2021-01-30 2023-12-19 Netskope, Inc. Dynamic distribution of unified policies in a cloud-based policy enforcement system
CN113808252B (zh) * 2021-08-19 2024-02-27 广西电网有限责任公司 基于交互性标签和宏的三维模型逐级重建方法
US11336689B1 (en) 2021-09-14 2022-05-17 Netskope, Inc. Detecting phishing websites via a machine learning-based system using URL feature hashes, HTML encodings and embedded images of content pages
CN114003412A (zh) * 2021-12-27 2022-02-01 支付宝(杭州)信息技术有限公司 小程序和宿主程序进行通信的方法和装置

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7320129B2 (en) * 2003-05-14 2008-01-15 Hewlett-Packard Development Company, L.P. Native language verification system and method
US7627766B2 (en) * 2003-07-11 2009-12-01 Computer Associates Think, Inc. System and method for providing java server page security
US20060026181A1 (en) * 2004-05-28 2006-02-02 Jeff Glickman Image processing systems and methods with tag-based communications protocol
US8732856B2 (en) * 2004-12-30 2014-05-20 Oracle International Corporation Cross-domain security for data vault
US20070006294A1 (en) * 2005-06-30 2007-01-04 Hunter G K Secure flow control for a data flow in a computer and data flow in a computer network
US20070107057A1 (en) * 2005-11-10 2007-05-10 Docomo Communications Laboratories Usa, Inc. Method and apparatus for detecting and preventing unsafe behavior of javascript programs
US8028908B2 (en) * 2006-05-01 2011-10-04 Patrick Shomo Systems and methods for the secure control of data within heterogeneous systems and networks
NO326590B1 (no) * 2007-04-16 2009-01-19 Kubekit As Fremgangsmate og anordning for verifikasjon av informasjonstilgang i IKT-system med flere sikkerhetsdimensjoner og sikkerhetsniva.
KR101742525B1 (ko) 2007-05-18 2017-06-15 씨큐어 키즈 피티와이 리미티드 보안 토큰과 그 보안 토큰을 생성하고 복호화하는 시스템 및 방법
JP4395178B2 (ja) * 2007-05-29 2010-01-06 インターナショナル・ビジネス・マシーンズ・コーポレーション コンテンツ処理システム、方法及びプログラム
CN101662460B (zh) * 2008-08-25 2015-07-15 阿里巴巴集团控股有限公司 一种跨域通讯的方法、系统和装置
US8997217B2 (en) 2010-01-25 2015-03-31 Samsung Electronics Co., Ltd. Safely processing and presenting documents with executable text

Also Published As

Publication number Publication date
US8898780B2 (en) 2014-11-25
JP5707542B2 (ja) 2015-04-30
HUE041676T2 (hu) 2019-05-28
EP2776970A1 (en) 2014-09-17
WO2013070334A1 (en) 2013-05-16
KR101542335B1 (ko) 2015-08-05
EP2776970B1 (en) 2018-10-24
CN103975336A (zh) 2014-08-06
KR20140090240A (ko) 2014-07-16
JP2015501961A (ja) 2015-01-19
US20130117845A1 (en) 2013-05-09
CN103975336B (zh) 2016-10-26
ES2707866T3 (es) 2019-04-05

Similar Documents

Publication Publication Date Title
IN2014CN03105A (enrdf_load_stackoverflow)
US11165820B2 (en) Web injection protection method and system
WO2013185101A3 (en) Dashboards for displaying threat insight information
WO2011112347A3 (en) System and method for malware detection
IN2014DN08257A (enrdf_load_stackoverflow)
WO2012166873A3 (en) Computer program, method, and system for preventing execution of viruses and malware
GB2497018A (en) A method and system to automatically testing a web application
GB2491751A (en) Method of optimizing the interaction between a software application and a database server or other kind of remote data source
WO2012061335A3 (en) Data delivery
WO2012071498A4 (en) Securing sensitive information with a trusted proxy frame
BR112015018082A8 (pt) Sistema e método implementado em computador para permitir que os desenvolvedores de aplicativos de software incorporem scripts de terceiros nos aplicativos de software dos mesmos
GB201015283D0 (en) Data security in a cloud computing environment
IN2015DN02657A (enrdf_load_stackoverflow)
WO2009154945A3 (en) Distributed security provisioning
GB2518091A (en) Creation and exposure of embedded secondary content data relevant to a primary content page of an electronic book
HK1213107A1 (zh) 裝置,系統和方法識別和減少惡意網絡威脅
PH12010000301A1 (en) Automated deployment of computer-specific software updates
GB2511017A (en) Providing a malware analysis using a secure malware detection process
GB2497366B (en) Phishing processing method and system and computer readable storage medium applying the method
US10554682B2 (en) Detecting and removing injected elements from content interfaces
GB2484879A (en) Method and apparatus for security validation of input data
HK1249603A1 (zh) 用於生成網絡威脅情報的系統及方法
WO2009125005A3 (en) System amd method for application level access to virtual server environments
HK1243512A1 (zh) 利用統計分析識別潛在的ddos攻擊
PH12018502397A1 (en) Processing method for presenting copy attack, and server and client