IN2014CN03486A - - Google Patents

Info

Publication number
IN2014CN03486A
IN2014CN03486A IN3486CHN2014A IN2014CN03486A IN 2014CN03486 A IN2014CN03486 A IN 2014CN03486A IN 3486CHN2014 A IN3486CHN2014 A IN 3486CHN2014A IN 2014CN03486 A IN2014CN03486 A IN 2014CN03486A
Authority
IN
India
Prior art keywords
perimeter
resource
assigned
access
single device
Prior art date
Application number
Inventor
Geordon Thomas Ferguson
Christopher Lyle Bender
Alberto Daniel Zubiri
Kenneth Cyril Schneider
Oliver Whitehouse
Christopher William Lewis Hobbs
Original Assignee
Blackberry Ltd
Ontario Inc 2236008
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Blackberry Ltd, Ontario Inc 2236008 filed Critical Blackberry Ltd
Publication of IN2014CN03486A publication Critical patent/IN2014CN03486A/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6236Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database between heterogeneous systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

In some implementations a method of managing access to resources in a single device including receiving from a first resource assigned to a first perimeter a request to access a second resource assigned to a second perimeter different from the first perimeter. The single device includes the first perimeter and the second perimeter. Whether access to the second resource is prohibited is determined based on a management policy for the first perimeter. The management policy defining one or more rules for accessing resources assigned to the second perimeter including the second resource.
IN3486CHN2014 2011-11-10 2012-11-09 IN2014CN03486A (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
EP11188696.6A EP2592578A1 (en) 2011-11-10 2011-11-10 Managing cross perimeter access
PCT/CA2012/050796 WO2013067644A1 (en) 2011-11-10 2012-11-09 Managing cross perimeter access

Publications (1)

Publication Number Publication Date
IN2014CN03486A true IN2014CN03486A (en) 2015-10-09

Family

ID=45044368

Family Applications (1)

Application Number Title Priority Date Filing Date
IN3486CHN2014 IN2014CN03486A (en) 2011-11-10 2012-11-09

Country Status (5)

Country Link
EP (1) EP2592578A1 (en)
CN (1) CN104054088B (en)
CA (1) CA2854540C (en)
IN (1) IN2014CN03486A (en)
WO (1) WO2013067644A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220353241A1 (en) * 2021-05-01 2022-11-03 AtScale, Inc. Policy compilation and dissemination as a layer 7 firewall

Family Cites Families (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0605106A1 (en) * 1992-12-03 1994-07-06 Data Security, Inc. Computer security metapolicy system
US7543331B2 (en) * 2003-12-22 2009-06-02 Sun Microsystems, Inc. Framework for providing a configurable firewall for computing systems
WO2005121968A2 (en) * 2004-06-07 2005-12-22 Wms Gaming Inc. Gaming device with resource swapping
US7770206B2 (en) * 2005-03-11 2010-08-03 Microsoft Corporation Delegating right to access resource or the like in access management system
US7739731B2 (en) * 2006-01-09 2010-06-15 Oracle America, Inc. Method and apparatus for protection domain based security
CN101004776B (en) * 2006-01-09 2010-06-16 太阳微系统有限公司 Method and apparatus for protection domain based security
US7721087B1 (en) * 2006-03-24 2010-05-18 Symantec Corporation Cross UI platform alerting of security status
CN101536465B (en) * 2006-09-27 2012-05-23 意大利电信股份公司 An apparatus and method for implementing configurable resource management policies
US9418219B2 (en) * 2008-04-11 2016-08-16 Microsoft Technology Licensing, Llc Inter-process message security
CA2760692C (en) * 2009-05-03 2016-10-25 Research In Motion Limited Systems and methods for mobility server administration
US8849717B2 (en) * 2009-07-09 2014-09-30 Simon Cooper Methods and systems for upgrade and synchronization of securely installed applications on a computing device
EP2337300B1 (en) * 2009-12-21 2014-01-22 BlackBerry Limited Method of Securely Transferring Services Between Mobile Devices
WO2012109497A1 (en) * 2011-02-09 2012-08-16 Epals, Inc. Access control system and method

Also Published As

Publication number Publication date
EP2592578A1 (en) 2013-05-15
WO2013067644A1 (en) 2013-05-16
CA2854540C (en) 2020-11-10
CA2854540A1 (en) 2013-05-16
CN104054088A (en) 2014-09-17
CN104054088B (en) 2019-09-27

Similar Documents

Publication Publication Date Title
EP3069466A4 (en) Method and system for dynamically and automatically managing resource access permissions
WO2013044107A3 (en) Authentication procedures for managing mobile device applications
GB2535068A (en) Method and apparatus for managing remote devices and accessing remote device information
MX369302B (en) Methods and systems for managing permissions to access mobile device resources.
WO2013181556A3 (en) Authorized shared access carrier aggregation with sensing
AU2014235181A8 (en) Certificate based profile confirmation
WO2015017664A3 (en) Systems and methods for providing on demand business resources
GB2504411A (en) Shared resource and virtual resource management in a networked environment
GB2535104A (en) Apparatus and method for managing access to a resource
GB201210845D0 (en) Improvements in and relating to location based data access policies
IN2015DN02532A (en)
GB2494491B (en) Managing data access in mobile devices
GB2525361A (en) User authentication
EP2663053A3 (en) Methods and apparatus for creating and implementing security policies for resources on a network
CL2013000041A1 (en) A method for operating a mobile device that has a plurality of authentication states including a higher closing state and a lower closing state comprising receiving a first data entry requesting the invocation of a capture request and invoking the application requested in the device
MX2016003897A (en) Capability matching method, device, and system.
WO2012022835A3 (en) Method and apparatus for managing application resources via policy rules
WO2014071360A3 (en) Systems and methods for provisioning and managing an elastic computing infrastructure
WO2012142178A3 (en) Information security systems and methods
WO2010023148A3 (en) Method and system for policy based lifecycle management of virtual software appliances
MX2016000228A (en) Third-party captive portal.
BR112013030551A2 (en) device and method for managing a licensable item
MX2015017317A (en) Frequency spectral management apparatus and method, geographical location database and secondary system apparatus.
WO2012177651A3 (en) Computing system for managing data
GB2519263A (en) Prioritized token based arbiter and method