IN2014CN03486A - - Google Patents
Info
- Publication number
- IN2014CN03486A IN2014CN03486A IN3486CHN2014A IN2014CN03486A IN 2014CN03486 A IN2014CN03486 A IN 2014CN03486A IN 3486CHN2014 A IN3486CHN2014 A IN 3486CHN2014A IN 2014CN03486 A IN2014CN03486 A IN 2014CN03486A
- Authority
- IN
- India
- Prior art keywords
- perimeter
- resource
- assigned
- access
- single device
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6236—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
In some implementations a method of managing access to resources in a single device including receiving from a first resource assigned to a first perimeter a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11188696.6A EP2592578A1 (en) | 2011-11-10 | 2011-11-10 | Managing cross perimeter access |
PCT/CA2012/050796 WO2013067644A1 (en) | 2011-11-10 | 2012-11-09 | Managing cross perimeter access |
Publications (1)
Publication Number | Publication Date |
---|---|
IN2014CN03486A true IN2014CN03486A (en) | 2015-10-09 |
Family
ID=45044368
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
IN3486CHN2014 IN2014CN03486A (en) | 2011-11-10 | 2012-11-09 |
Country Status (5)
Country | Link |
---|---|
EP (1) | EP2592578A1 (en) |
CN (1) | CN104054088B (en) |
CA (1) | CA2854540C (en) |
IN (1) | IN2014CN03486A (en) |
WO (1) | WO2013067644A1 (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20220353241A1 (en) * | 2021-05-01 | 2022-11-03 | AtScale, Inc. | Policy compilation and dissemination as a layer 7 firewall |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP0605106A1 (en) * | 1992-12-03 | 1994-07-06 | Data Security, Inc. | Computer security metapolicy system |
US7543331B2 (en) * | 2003-12-22 | 2009-06-02 | Sun Microsystems, Inc. | Framework for providing a configurable firewall for computing systems |
WO2005121968A2 (en) * | 2004-06-07 | 2005-12-22 | Wms Gaming Inc. | Gaming device with resource swapping |
US7770206B2 (en) * | 2005-03-11 | 2010-08-03 | Microsoft Corporation | Delegating right to access resource or the like in access management system |
US7739731B2 (en) * | 2006-01-09 | 2010-06-15 | Oracle America, Inc. | Method and apparatus for protection domain based security |
CN101004776B (en) * | 2006-01-09 | 2010-06-16 | 太阳微系统有限公司 | Method and apparatus for protection domain based security |
US7721087B1 (en) * | 2006-03-24 | 2010-05-18 | Symantec Corporation | Cross UI platform alerting of security status |
CN101536465B (en) * | 2006-09-27 | 2012-05-23 | 意大利电信股份公司 | An apparatus and method for implementing configurable resource management policies |
US9418219B2 (en) * | 2008-04-11 | 2016-08-16 | Microsoft Technology Licensing, Llc | Inter-process message security |
CA2760692C (en) * | 2009-05-03 | 2016-10-25 | Research In Motion Limited | Systems and methods for mobility server administration |
US8849717B2 (en) * | 2009-07-09 | 2014-09-30 | Simon Cooper | Methods and systems for upgrade and synchronization of securely installed applications on a computing device |
EP2337300B1 (en) * | 2009-12-21 | 2014-01-22 | BlackBerry Limited | Method of Securely Transferring Services Between Mobile Devices |
WO2012109497A1 (en) * | 2011-02-09 | 2012-08-16 | Epals, Inc. | Access control system and method |
-
2011
- 2011-11-10 EP EP11188696.6A patent/EP2592578A1/en not_active Ceased
-
2012
- 2012-11-09 CN CN201280066715.6A patent/CN104054088B/en active Active
- 2012-11-09 WO PCT/CA2012/050796 patent/WO2013067644A1/en active Application Filing
- 2012-11-09 CA CA2854540A patent/CA2854540C/en active Active
- 2012-11-09 IN IN3486CHN2014 patent/IN2014CN03486A/en unknown
Also Published As
Publication number | Publication date |
---|---|
EP2592578A1 (en) | 2013-05-15 |
WO2013067644A1 (en) | 2013-05-16 |
CA2854540C (en) | 2020-11-10 |
CA2854540A1 (en) | 2013-05-16 |
CN104054088A (en) | 2014-09-17 |
CN104054088B (en) | 2019-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3069466A4 (en) | Method and system for dynamically and automatically managing resource access permissions | |
WO2013044107A3 (en) | Authentication procedures for managing mobile device applications | |
GB2535068A (en) | Method and apparatus for managing remote devices and accessing remote device information | |
MX369302B (en) | Methods and systems for managing permissions to access mobile device resources. | |
WO2013181556A3 (en) | Authorized shared access carrier aggregation with sensing | |
AU2014235181A8 (en) | Certificate based profile confirmation | |
WO2015017664A3 (en) | Systems and methods for providing on demand business resources | |
GB2504411A (en) | Shared resource and virtual resource management in a networked environment | |
GB2535104A (en) | Apparatus and method for managing access to a resource | |
GB201210845D0 (en) | Improvements in and relating to location based data access policies | |
IN2015DN02532A (en) | ||
GB2494491B (en) | Managing data access in mobile devices | |
GB2525361A (en) | User authentication | |
EP2663053A3 (en) | Methods and apparatus for creating and implementing security policies for resources on a network | |
CL2013000041A1 (en) | A method for operating a mobile device that has a plurality of authentication states including a higher closing state and a lower closing state comprising receiving a first data entry requesting the invocation of a capture request and invoking the application requested in the device | |
MX2016003897A (en) | Capability matching method, device, and system. | |
WO2012022835A3 (en) | Method and apparatus for managing application resources via policy rules | |
WO2014071360A3 (en) | Systems and methods for provisioning and managing an elastic computing infrastructure | |
WO2012142178A3 (en) | Information security systems and methods | |
WO2010023148A3 (en) | Method and system for policy based lifecycle management of virtual software appliances | |
MX2016000228A (en) | Third-party captive portal. | |
BR112013030551A2 (en) | device and method for managing a licensable item | |
MX2015017317A (en) | Frequency spectral management apparatus and method, geographical location database and secondary system apparatus. | |
WO2012177651A3 (en) | Computing system for managing data | |
GB2519263A (en) | Prioritized token based arbiter and method |